Establishing Windows Network Connections – CompTIA A+ 220-902 – 1.6
Network connectivity in Windows can take many different forms. In this video, you’ll learn about VPN connectivity, dialup networks, wireless and wired networks, and more.
Network connectivity in Windows can take many different forms. In this video, you’ll learn about VPN connectivity, dialup networks, wireless and wired networks, and more.
As with most networking technologies, the details are in the protocols. In this video, you’ll learn about PPP, PPTP, SSL VPNs, and IPSec.
There are many different ways to configure and connect a VPN connection. In this video, you’ll learn about site-to-site, host-to-site, and host-to-host VPN connections.
If you’re offsite at a hotel or coffee shop, it helps to have a secure connection back to the corporate network. In this video, you’ll learn how VPN concentrators are used to provide large-scale VPN connectivity when you’re away from the office.
Encrypting files is important, but our network communication also requires additional privacy. In this video, you’ll learn about the cryptographic techniques used to secure our network connections.
If you do any work on open wireless networks, you may want to consider using a VPN. In this video, you’ll learn how VPNs are able to secure all of your network traffic over an insecure open wireless networks.
We’re an increasingly mobile workforce, so we therefore need technologies to keep us secure while we travel. In this video, you’ll learn how VPN concentrators can be used to provide encrypted tunnels from our favorite coffee shop to our corporate network.
Most of our modern computers are also connected to a network. In this video, you’ll learn about the different methods that Windows can use to provide us with access to resources across the network.
If you travel outside of your corporate LAN, then you’re probably using a VPN concentrator to protect your remote communications. In this video, you’ll learn about VPN technology and how organizations use VPN concentrators to secure their remote users.