The traffic we send across the network is subject to viewing by anyone along the way. In this video, you’ll learn about which protocols and services should be used to ensure a secure communications channel.
We use a number of algorithms to maintain the security of our data as it flows across the network. In this video, you’ll learn about SSL, SSH, and IPsec encryption protocols.
Without encryption, we would not be able to securely use our network connections. In this videos, you’ll learn how your browser encrypts all of the information you send to a web server using HTTPS or TLS/SSL.
Our specialized application protocols make it very easy for us to surf the net, transfer files, and send our email messages. In this video, you’ll learn about common application protocols used by HTTP, IMAP, and VoIP applications.
We rely on encryption to protect our data across the network. In this video, you’ll learn about HTTPS and how we use TLS/SSL to encrypt our network traffic.
Transporting information across the networks requires a high level of security. In this video, you’ll learn how SSL/TLS, HTTPS, and IPsec allow the transmission of encrypted data to anyone in the world.