The internet is an insecure way of transmitting confidential information, but dedicated circuits can be very expensive. In this course, Cisco Core Security: Describing and Configuring VPNs, you will gain the ability to understand and deploy various types of VPNs. First, you will learn about cryptography components, and how to configure cryptography on Cisco devices. Next, you will discover how to deploy various site-to-site VPNs using Cisco routers. Finally, you will explore how to configure a headend device to accept remote access VPNs using either Cisco’s Adaptive Security Appliance or Firepower Threat Defense. When you’re finished with this course, you will have the skills and knowledge of cryptography needed to deploy various types of VPNs.
Craig is a former Marine that has over a decade of IT experience, mainly focusing on Palo Alto Firewalls and Cisco Routers and Switches, and has certifications from both vendors. When not working, Craig enjoys spending time with his family.
Course Overview [Autogenerated] Hi, everyone. My name is Craig Stansbury and welcome to my course Sisko Core Security describing and configuring v P N's I'm a network consultant for my company stands Tak The Internet is an insecure medium to transfer sensitive information, but dedicated circuits can be very expensive. Virtual private networks, or V P n's, are an effective way to secure your traffic without needing dedicated circuit. In this course, we're going to learn the basics of cryptography and then use it to deploy very steps of the PM's. Some of the major topics that we will cover include cryptography and BP and basics site to site deep in deployment models and remote access VPN deployments using Cisco's Any connected. By the end of this course, you'll know all about cryptography and how to deploy various types of the PM's. Before beginning this course, you should be familiar with basic networking such as I P routing and dynamic routing protocols. From here, you should feel comfortable diving into Cisco security with courses on network security, with Cisco IOS endpoint protection and detection, securing network access, using Cisco ice and securing the cloud. I hope you'll join me on this journey to learn about cryptography and deploying. VP ends with the Cisco Course security describing and configuring bps course at Peril site.