Companies Home Search Profile

Cisco Network Security: VPN

Focused View

Lisa Bock

1:34:34

265 View
  • 01 - Securing data in transit.mp4
    01:19
  • 02 - Discovering resources.mp4
    01:17
  • 03 - Obtaining Packet Tracer.mp4
    01:52
  • 01 - Describing a VPN.mp4
    03:01
  • 02 - Evaluating types of VPNs.mp4
    03:55
  • 03 - Recognizing VPN topologies.mp4
    04:07
  • 04 - Comparing the main types of VPNs.mp4
    03:53
  • 05 - Dissecting VPN components.mp4
    03:27
  • 06 - Discovering the Cisco ASA.mp4
    02:54
  • 07 - Using the Cisco ASDM.mp4
    03:25
  • 01 - Summarizing IPsec.mp4
    04:08
  • 02 - Reviewing IPsec components.mp4
    04:40
  • 03 - Using the IPsec AH.mp4
    03:11
  • 04 - Outlining the IPsec ESP.mp4
    04:22
  • 05 - Evaluating operating modes.mp4
    04:05
  • 01 - Connecting with an always-on VPN.mp4
    04:01
  • 02 - Comparing hairpin vs. split tunnel.mp4
    03:17
  • 03 - Translating the network address.mp4
    03:04
  • 04 - Traversing through a NAT device.mp4
    02:04
  • 01 - Challenge Clientless SSL VPN.mp4
    02:46
  • 02 - Solution Clientless SSL VPN.mp4
    04:17
  • 03 - Employing an AnyConnect SSL VPN.mp4
    02:02
  • 04 - Assessing endpoint posture.mp4
    03:25
  • 01 - Ensuring Perfect Forward Secrecy.mp4
    03:37
  • 02 - Setting up an IPsec site-to-site VPN.mp4
    03:35
  • 03 - Challenge Configure a site-to-site VPN.mp4
    05:08
  • 04 - Solution Configure a site-to-site VPN.mp4
    06:27
  • 01 - Next steps.mp4
    01:15
  • Description


    Virtual Private Networks (VPNs) provide a way for remote workers and sales staff to communicate over an insecure public network. In this course, instructor Lisa Bock covers core strategies that you can use to secure a network with a VPN, and ensure data confidentiality, integrity, and authentication. Lisa goes over different types of VPN topologies, such as hair pin, split-tunnel, always-on, and NAT traversal, along with the various components and protocols. She explains how to work with the Cisco Adaptive Security Appliance (ASA), which offers functions to secure a network that include firewall features, malware defense, intrusion prevention, and content monitoring. She also dives into the IPsec framework, VPN configuration, setting up a remote access VPN, and preparing your site for an IPsec VPN. By the end of this course, you’ll have the specialized knowledge needed to secure Cisco networks using VPN technology.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 28
    • duration 1:34:34
    • Release Date 2023/02/28

    Courses related to Cisco

    Courses related to Network Engineering