Most of our modern computers are also connected to a network. In this video, you’ll learn about the different methods that Windows can use to provide us with access to resources across the network.
If you travel outside of your corporate LAN, then you’re probably using a VPN concentrator to protect your remote communications. In this video, you’ll learn about VPN technology and how organizations use VPN concentrators to secure their remote users.
If you’re planning to connect securely from a remote location, then you’ll probably need a virtual private network. In this video, you’ll learn how VPN concentrators allow you protect your network communication using encryption technologies.
The information traversing our network often contains private or confidential information. In this video, you’ll learn how to use transport encryption methods to protect your sensitive data from prying eyes as it moves across insecure network links.
This second video on network devices covers the supporting cast of infrastructure hardware and software. In this video, you’ll learn about VPN concentrators, intrusion detection and prevention technologies, and protocol analyzers.
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.
DirectAccess is a new feature in Windows 7, and it brings a unique set of configuration challenges to administrators. In this video, you’ll learn about this new technology and how to configure clients to take advantage of this always-on remote access feature.
Your company’s security team has announced the rollout of a new VPN for each laptop in the organization. What will this VPN provide?
The fundamental operation of the network uses many different technologies to ensure that traffic will flow properly between devices. In this video module, you’ll learn about status indicators, duplex settings, the difference between workgroups and domains, and much more.
As network professionals, we rely on some core security devices to protect our network. In this video, you’ll learn about network-based firewalls, host-based firewalls, IDS/IPS, and VPN concentrators.