VPN Fundamentals for CCNP Security
Posted by Superadmin on May 28 2021 16:31:35

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0101.Course Overview



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0200. Course Introduction and Key Threats to Transit Data



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0201. Topology Review



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0202. Eavesdropping and Masquerading Attacks



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0203. Man-in-the-middle Attacks



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0204. Module Summary



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0300. VPN Benefits



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0301. VPN Types



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0302. VPN Types Topology Example



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0303. Components of a VPN and Integrity



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0304. Integrity Algorithms and Key Management



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0305. Non-repudiation



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0306. Application and Protocol Support



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0400. Crypto Algorithms and Encryption



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0401. Symmetric and Asymmetric Algorithms



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0402. Providing Data Integrity



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0403. Digital Signatures



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0404. Non-repudiation



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0500. Introduction to PKI



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0501. Certificate Authorities



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines

VPN Fundamentals for CCNP Security

Created by Brandon Carroll


0502. Next-generation Encryption and General Guidelines



Description

At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.



      
Course Contents
01. Course Overview 02. Understanding Key Threats to Data in Transit 03. Understanding VPN Benefits, Options, and Components 04. Understanding Confidentiality, Integrity, and Origin Authentication with a VPN 05. Understanding PKI, NGE, and General Guidelines