Cisco Core Security: Describing and Configuring VPNs

VPNs secure business traffic over the unprotected internet. Learn how to deploy either site-to-site VPNs using Cisco routers, or remote access VPNs using an ASA, or FTD.
Course info
Level
Intermediate
Updated
Nov 26, 2019
Duration
3h 40m
Table of contents
Course Overview
Comparing Cryptography Components
Comparing Cisco VPN Types
Configuring DMVPN
Configuring FlexVPN
Configuring Cisco AnyConnect on the ASA
Configuring Cisco AnyConnect on the FTD
Description
Course info
Level
Intermediate
Updated
Nov 26, 2019
Duration
3h 40m
Description

The internet is an insecure way of transmitting confidential information, but dedicated circuits can be very expensive. In this course, Cisco Core Security: Describing and Configuring VPNs, you will gain the ability to understand and deploy various types of VPNs. First, you will learn about cryptography components, and how to configure cryptography on Cisco devices. Next, you will discover how to deploy various site-to-site VPNs using Cisco routers. Finally, you will explore how to configure a headend device to accept remote access VPNs using either Cisco’s Adaptive Security Appliance or Firepower Threat Defense. When you’re finished with this course, you will have the skills and knowledge of cryptography needed to deploy various types of VPNs.

About the author
About the author

Craig is a former Marine that has over a decade of IT experience, mainly focusing on Palo Alto Firewalls and Cisco Routers and Switches, and has certifications from both vendors. When not working, Craig enjoys spending time with his family.

More from the author
Cisco Core Security: Security Concepts
Intermediate
1h 20m
Oct 14, 2019
Preventing Threats Using Palo Alto Firewalls
Intermediate
2h 47m
Aug 14, 2019
More courses by Craig Stansbury
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name is Craig Stansbury and welcome to my course Sisko Core Security describing and configuring v P N's I'm a network consultant for my company stands Tak The Internet is an insecure medium to transfer sensitive information, but dedicated circuits can be very expensive. Virtual private networks, or V P n's, are an effective way to secure your traffic without needing dedicated circuit. In this course, we're going to learn the basics of cryptography and then use it to deploy very steps of the PM's. Some of the major topics that we will cover include cryptography and BP and basics site to site deep in deployment models and remote access VPN deployments using Cisco's Any connected. By the end of this course, you'll know all about cryptography and how to deploy various types of the PM's. Before beginning this course, you should be familiar with basic networking such as I P routing and dynamic routing protocols. From here, you should feel comfortable diving into Cisco security with courses on network security, with Cisco IOS endpoint protection and detection, securing network access, using Cisco ice and securing the cloud. I hope you'll join me on this journey to learn about cryptography and deploying. VP ends with the Cisco Course security describing and configuring bps course at Peril site.