Virtual Private Network (VPN): Getting Started
- Evaluate, implement and manage secure remote access techniques
- Allow remote users and multiple sites to communicate securely
Network or system administrators, technicians, security specialists, consultants, system integrators.
Basic knowledge of networks and security
This network training is punctuated by an alternation of presentations and practical work. For “Distance” training, they are carried out with a Teams or Zoom type videoconferencing tool depending on the case, allowing the trainer to adapt his pedagogy. our website full details on distance sessions or virtual classes.
Motivations for secure remote access VPN technologies: general VPN:. physical view. Virtual view Identifying network security issues
Management of confidential information: notions of cryptography
Objective of encryption Comparison of encryption techniques Public key infrastructure Other functions related to encryption hash, digital signature, certificates
Specification of security protocols
Protocol tunneling and encapsulationPresentation of PPTP protocol Presentation of L2TP protocol Presentation of IPSec protocol
Authentication methods Authentication on PPPE Assessment of security systems and servers
Deploying a VPN
Configuring Incoming Dial-Up Connections Configuring VPN Ports Configuring User Incoming Call Settings
Creating a dial-up connectionConnecting to a virtual private networkInstalling and configuring a RADIUS serverConfiguring routingConfiguring on-demand connectionsExternalizing your VPNSelecting a service provider