From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
VPNs and VPN concentrators
From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
VPNs and VPN concentrators
- [Instructor] Virtual private networks provide two important security functions to IT administrators. First, site to site VPNs allow the secure interconnection of remote networks, such as connecting branch offices to a corporate headquarters or each other . Second, remote access VPNs provide mobile workers with a mechanism to securely connect from remote locations back to the organization's network. VPN's work by using encryption to create a virtual tunnel between two systems over the internet. Everything that enters one end of the tunnel is encrypted. And then it's decrypted when it exits the other end of the tunnel. From the user's perspective, the network appears to function normally but if an attacker gains access to traffic between the two secure networks, all they see is encrypted information that they can't read. VPNs require an endpoint on the remote network that accepts VPN connections and several different…
Contents
-
-
-
-
-
-
-
-
-
-
Routers, switches, and bridges3m 6s
-
(Locked)
Firewalls6m 7s
-
(Locked)
VPNs and VPN concentrators4m 29s
-
(Locked)
Network intrusion detection and prevention5m 1s
-
(Locked)
Unified threat management1m 57s
-
(Locked)
VLANs and network segmentation1m 36s
-
(Locked)
Network access control4m 30s
-
(Locked)
Remote network access4m 59s
-
-
-
-
-
-