Data has become a high value commodity and protecting it is essential, especially when your data is traversing the internet and this is where VPNs come in. Using any VPN is not enough however, as picking the right solution is highly important too.
The value of data has increased substantially over the past few years with attackers capturing data or downloading it from compromised databases and selling it on the black market. Firewalls do their best to keep attackers out but what about protecting data that's being transmitted across an untrusted network such as the internet? This is exactly what VPNs were designed for. In this course, Architecting Cisco Secure Communications, you will not only learn about the different types of site-to-site and remote access VPNs available for organisations to use but you will also learn about the different components that come together to make up the different VPN solutions. First, you will explore site-to-site VPNs, starting with IPSec VPNs and moving onto GETVPNs and DMVPNs. Next, you will go through remote access VPNs including VPNs that can be accessed anywhere from any laptop or workstation without a client installed. Finally, you will learn how IPSec encryption keys are securely exchanged between VPN peers. When you are finished with this course, you will have the skills and knowledge of Cisco VPNs needed to determine the best VPN type of a given scenario.
Martin is a network security engineer with several years experience in various markets including retail and aerospace in many different countries and at the moment works for a UK based tier 1 service provider working with technology from Cisco, F5, Checkpoint, Infoblox, and, of course, Juniper.
Course Overview [Autogenerated] Hi, everyone. My name is Martin Brown and welcome to my course architect Francisco Secure Communications. I am a Jewel CCMP certified network engineer, and I currently work for a Tier one service provider. In this course, we're going to look at the various types of sight to sight and remote access V. P N's that can be configured on Cisco devices and the scenarios in which each type should be used. We then move on to look at some design best practices, including high availability, and go through the configuration often active Standby s a. H A pair. Some of the major topics that we will cover include how, like version one negotiates the eyepiece sick tunnel parameters. Why get V pins are the most suitable VPN type for use over private one. The difference is between ___ version one on ___, version two and how encryption keys are securely exchanged between endpoints. By the end of this course, you should be able to know the benefits of the different VPN types available in IOS and on essays, and understand the process of how encrypted tunnels built before beginning the course. You should be familiar with Cisco Iris based devices and air, say firewalls. In addition to having a firm understanding of Nat access lists and routine, I hope you'll join me on this journey to learn about how to protect your data as it reverses an untrusted for public network with the architect in Cisco Secure Communications course, that plural site.