Cisco Network Security: VPN

Cisco Network Security: VPN

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 1h 34m | 219 MB

Virtual Private Networks (VPNs) provide a way for remote workers and sales staff to communicate over an insecure public network. In this course, instructor Lisa Bock covers core strategies that you can use to secure a network with a VPN, and ensure data confidentiality, integrity, and authentication. Lisa goes over different types of VPN topologies, such as hair pin, split-tunnel, always-on, and NAT traversal, along with the various components and protocols. She explains how to work with the Cisco Adaptive Security Appliance (ASA), which offers functions to secure a network that include firewall features, malware defense, intrusion prevention, and content monitoring. She also dives into the IPsec framework, VPN configuration, setting up a remote access VPN, and preparing your site for an IPsec VPN. By the end of this course, you’ll have the specialized knowledge needed to secure Cisco networks using VPN technology.

Table of Contents

Introduction
1 Securing data in transit
2 Discovering resources
3 Obtaining Packet Tracer

Understand VPN Concepts
4 Describing a VPN
5 Evaluating types of VPNs
6 Recognizing VPN topologies
7 Comparing the main types of VPNs
8 Dissecting VPN components
9 Discovering the Cisco ASA
10 Using the Cisco ASDM

Discover IP Security (IPsec)
11 Summarizing IPsec
12 Reviewing IPsec components
13 Using the IPsec AH
14 Outlining the IPsec ESP
15 Evaluating operating modes

Configure a VPN
16 Connecting with an always-on VPN
17 Comparing hairpin vs. split tunnel
18 Translating the network address
19 Traversing through a NAT device

Examine a Remote Access VPN
20 Challenge Clientless SSL VPN
21 Solution Clientless SSL VPN
22 Employing an AnyConnect SSL VPN
23 Assessing endpoint posture

Investigate a Site-to-Site VPN
24 Ensuring Perfect Forward Secrecy
25 Setting up an IPsec site-to-site VPN
26 Challenge Configure a site-to-site VPN
27 Solution Configure a site-to-site VPN

Conclusion
28 Next steps

Homepage