IPsec helps us to secure our infrastructure and offer services securely to our organization. This course will teach you how to configure, verify, and analyze IPsec, as well as teach you knowledge to give you a deep understanding of the technologies.
IPsec is used in our environments and on our endpoints to secure our traffic. It enables us to transmit our information securely across unsecured connections. Learning how to configure, verify, and analyze IPsec in your environments will help you improve your organization's security posture. In this course, Protocol Deep Dive: IPsec, you will gain the skills necessary to use this technology and have a deep understanding of the protocol suite. First, you will learn all about the underlying protocols that make up IPsec and how they work together to make it work. Next, you will discover IKE and the role that it plays in the IPsec suite. Finally, you will explore IKEv1 and IKEv2, and see the differences between them so you can fully understand how and why you should implement them. When you're finished with this course, you will have a full understanding of the protocol suite and be able to utilize it effectively in many different ways and implementation methods.
Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.
Course Overview Hi everyone, my name is Joe Abraham, and welcome to my course, Protocol Deep Dive: IPsec. I'm currently a network security consultant and a Pluralsight course author for both IT operations and security domains. Are you trying to figure out the inner workings of your IPsec protection suite? Do you want a more in-depth understanding of its functionality? Well, in this course, we are going to teach you just that. We'll help you understand IPsec from a packet level so that you can know how it functions, what to do with it, and why you need it. Some of the major topics that we will cover include IPsec building blocks and components, IKEv1 and its nuances, IKEv2 and how it works, and IPsec for IPv6. By the end of this course, you'll know how to create some IPsec configurations and be able to verify its functionality via packet captures. Before beginning the course, you should be familiar with common security threats and basic network fundamentals and behavior. From here, you should feel comfortable experimenting with different IPsec implementations and their configuration options based on what your needs are and be able to interpret how the IPsec suite is functioning based on the versions you're using. I hope you'll join me on this journey to learn more about the IPsec protocol suite and how it works with the Protocol Deep Dive: IPsec course, here at Pluralsight.