[vc_row][vc_column][fancy_heading h1=”0″ style=”line” title=”Virtual Private Network (VPN): Getting Started”][/fancy_heading][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tour style=”modern” shape=”round” color=”sky” spacing=”30″ controls_size=”md” active_section=”1″][vc_tta_section title=”Goals ” tab_id=”1604049547682-d49bdc81-8e40″][vc_column_text]
- Evaluate, implement and manage secure remote access techniques
- Allow remote users and multiple sites to communicate securely
[/vc_column_text][/vc_tta_section][vc_tta_section title=”Public ” tab_id=”1604049547713-8de3bd29-2f14″][vc_column_text]Network or system administrators, technicians, security specialists, consultants, system integrators.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Prerequisites ” tab_id=”1604049577493-1174f13f-6794″][vc_column_text]Basic knowledge of networks and security[/vc_column_text][/vc_tta_section][vc_tta_section title=”Duration ” tab_id=”1604049578544-c2463bd8-31be”][vc_column_text]3 Days.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Pedagogical Methods” tab_id=”1604049579366-3f6db7f1-3b84″][vc_column_text]This network training is punctuated by an alternation of presentations and practical work. For “Distance” training, they are carried out with a Teams or Zoom type videoconferencing tool depending on the case, allowing the trainer to adapt his pedagogy. our website full details on distance sessions or virtual classes.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Programs ” tab_id=”1604049580257-517f20b6-d85b”][vc_column_text]Technologies
Motivations for secure remote access VPN technologies: general VPN:. physical view. Virtual view Identifying network security issues
Management of confidential information: notions of cryptography
Objective of encryption Comparison of encryption techniques Public key infrastructure Other functions related to encryption hash, digital signature, certificates
Specification of security protocols
Protocol tunneling and encapsulationPresentation of PPTP protocol Presentation of L2TP protocol Presentation of IPSec protocol
User authentication
Authentication methods Authentication on PPPE Assessment of security systems and servers
Deploying a VPN
Configuring Incoming Dial-Up Connections Configuring VPN Ports Configuring User Incoming Call Settings
Creating a dial-up connectionConnecting to a virtual private networkInstalling and configuring a RADIUS serverConfiguring routingConfiguring on-demand connectionsExternalizing your VPNSelecting a service provider[/vc_column_text][/vc_tta_section][vc_tta_section title=”Register for training” tab_id=”1604049581510-1dad7900-25fc”][vc_column_text][contact-form-7 id=”266″ title=”Inscription”][/vc_column_text][/vc_tta_section][/vc_tta_tour][/vc_column][/vc_row]