If you’re planning to connect securely from a remote location, then you’ll probably need a virtual private network. In this video, you’ll learn how VPN concentrators allow you protect your network communication using encryption technologies.
The information traversing our network often contains private or confidential information. In this video, you’ll learn how to use transport encryption methods to protect your sensitive data from prying eyes as it moves across insecure network links.
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.
DirectAccess is a new feature in Windows 7, and it brings a unique set of configuration challenges to administrators. In this video, you’ll learn about this new technology and how to configure clients to take advantage of this always-on remote access feature.
Your company’s security team has announced the rollout of a new VPN for each laptop in the organization. What will this VPN provide?
The fundamental operation of the network uses many different technologies to ensure that traffic will flow properly between devices. In this video module, you’ll learn about status indicators, duplex settings, the difference between workgroups and domains, and much more.
As network professionals, we rely on some core security devices to protect our network. In this video, you’ll learn about network-based firewalls, host-based firewalls, IDS/IPS, and VPN concentrators.
Once a network is in place, there are many different ways to communicate to other devices. In this video, you’ll learn about peer to peer, client/server, VPNs, and VLANs.
Your organization wants to provide virtual private network connectivity from outside the office, but additional security is required. The primary requirement is that each user is verified with a username, password, and a piece of information that physically identifies the user. What would be the most appropriate solution for this requirement?
Your company has implemented a VPN for secure connectivity to the network when you are working off-site. Why is a VPN considered to be a secure connection?