From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
VPNs and VPN concentrators
From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
VPNs and VPN concentrators
- [Instructor] Virtual private networks provide two important security functions to IT administrators. First, site-to-site VPNs allow the secure interconnection of remote networks, such as connecting branch offices to a corporate headquarters or each other. Second, remote access VPNs provide mobile workers with a mechanism to securely connect from remote locations back to the organization's network. VPNs work by using encryption to create a virtual tunnel between two systems over the internet. Everything that enters one end of the tunnel is encrypted and then it's decrypted when it exits the other end of the tunnel. From the user's perspective, the network appears to function normally, but if an attacker gains access to traffic between the two secure networks, all they see is encrypted information that they can't read. VPNs require an end point on the remote network that accepts VPN connections. And several different…
Contents
-
-
-
-
-
Routers, switches, and bridges3m 6s
-
(Locked)
Firewalls6m 7s
-
(Locked)
Proxy servers2m 41s
-
(Locked)
Load balancers4m 9s
-
(Locked)
VPNs and VPN concentrators4m 29s
-
(Locked)
Network intrusion detection and prevention5m 1s
-
(Locked)
Protocol analyzers8m 57s
-
(Locked)
Unified threat management1m 57s
-
(Locked)
Content distribution networks4m 4s
-
-
-
-
-
-
-
-