It & Software Online Course by Udemy, On Sale Here
Master IPSec and become a VPN pro.
An excellent training about Network & Security
Master IPSec VPN
There are many misconceptions when it relates to how IPSEC works. This class will take the student from the basics to a full understanding of IPSEC. Foundational concepts are explained thoroughly with details beyond what is typically used to explain the topic. This leads to knowledge gaps for typical network engineers. Having the thorough understanding on how things work is crucial in being able to troubleshoot IPSEc issues. Often times, network security engineers struggle to troubleshoot IPSec issues and the main reason is a lack of understanding on how the protocol stack works. This class is aimed towards getting deeper into the topics and explaining the details that are buried within RFCs. This class explains the concepts of ISAKMP, Encryption and hashing, the purpose of Diffie Hellman. The class explains the Phase 1 main mode and aggressive mode. The class progresses into phase 2 by explaining the relationship between Phase 1 and Phase 2 and the Authentication Header and Encapsulation Security Payload protocols. Other topics are discussed: informational messages, DPD and NAT traversal. In addition, the class explores the ike main cfg and XAuth extensions. Once the above concepts are understood, this will progress in understanding certificate based authentication in IPSec with examples. The foundation to understand the next iteration of IKE which is IKEv2, the class then starts to cover the IKEv2. IKEv2 is feature rich and simplifies the phases of IPSec from 2 phases to a combine phase for both phase 1 and phase 2. The lectures explain in details the concepts of IKEv2. What are traffic SelectorsHow IKEv2 generate keysWhat is HMAC and why is it relevant to IKEv2. IKEv2 authentication process for pre-shared keys. IKEv2 authentication process for Certificates authentication. IKEv2 authentication process for EAP. What is CHILD SA and what is CREATE CHILD SA. How does IKEv2 perform nat detection and traversal. NATtraversal in transport mode. Explains IKEv2 CFG request replay. Explains IKEv2 MOBIKE. Explains ESPTFC Padding. Understand ESPencryption technologies. How does AES-CTR ESP encryption work. How does AES-CBCESP encryption work. How does AES-CCM ESP encryption work. How does AES-GCM ESP encryption work. How does 3DES ESP encryption work. How does HMAC-MD5-96 bit hashed message authentication code works.
Udemy is the leading global marketplace for learning and instruction
By connecting students all over the world to the best instructors, Udemy is helping individuals reach their goals and pursue their dreams.
Study anytime, anywhere.
Reviews
There are no reviews yet.