Course outline

Designing VPN Security

Categories: Cisco, Guaranteed To Run™

Duration: 5 Days

  • Cryptographic Services
  • Key Management
  • Public Key Infrastructure (PKI)
  • Secure Dial Connectivity
  • VPN Technologies
  • IPSec VPN Technology
  • Internet Key Exchange (IKE)
  • Site-to-Site VPN Design
  • Remote Access VPN Design
  • VPN Management
  • Secure Wireless Connectivity

This task-oriented course teaches the knowledge and skills needed to design a secure Cisco VPN network for an enterprise. After completing this course the student should be able to:

  • Recognize the services offered by cryptography and recommend those services to an organization to address their specific needs
  • Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation
  • Explain the role of key management in cryptography
  • Explain specific guidelines which need to be considered when deploying cryptographic systems
  • Select the best practices of key management in a design situation
  • Describe the standards and procedures used with the PKI
  • Explain the limitations of PKI technologies in various security designs
  • Design secure VPN?s using various VPN technologies.
  • Identify the benefits and drawbacks of each VPN technology
  • Implement basic IPSec using all currently supported encryption and authentication mechanisms
  • Deploy IKE to increase the scalability of IPSec solutions.
  • Design and implement site-to-site VPNs using IPSec
  • Design and implement remote access VPNs using IPSec
  • List the software products used to form the management of IPSec devices and solutions
  • Design and implement secure wireless networks

This task-oriented course teaches the knowledge and skills needed to design a secure Cisco VPN network for an enterprise. After completing this course the student should be able to:

  • Recognize the services offered by cryptography and recommend those services to an organization to address their specific needs
  • Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation
  • Explain the role of key management in cryptography
  • Explain specific guidelines which need to be considered when deploying cryptographic systems
  • Select the best practices of key management in a design situation
  • Describe the standards and procedures used with the PKI
  • Explain the limitations of PKI technologies in various security designs
  • Design secure VPN?s using various VPN technologies.
  • Identify the benefits and drawbacks of each VPN technology
  • Implement basic IPSec using all currently supported encryption and authentication mechanisms
  • Deploy IKE to increase the scalability of IPSec solutions.
  • Design and implement site-to-site VPNs using IPSec
  • Design and implement remote access VPNs using IPSec
  • List the software products used to form the management of IPSec devices and solutions
  • Design and implement secure wireless networks

This task-oriented course teaches the knowledge and skills needed to design a secure Cisco VPN network for an enterprise. After completing this course the student should be able to:

  • Recognize the services offered by cryptography and recommend those services to an organization to address their specific needs
  • Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation
  • Explain the role of key management in cryptography
  • Explain specific guidelines which need to be considered when deploying cryptographic systems
  • Select the best practices of key management in a design situation
  • Describe the standards and procedures used with the PKI
  • Explain the limitations of PKI technologies in various security designs
  • Design secure VPN?s using various VPN technologies.
  • Identify the benefits and drawbacks of each VPN technology
  • Implement basic IPSec using all currently supported encryption and authentication mechanisms
  • Deploy IKE to increase the scalability of IPSec solutions.
  • Design and implement site-to-site VPNs using IPSec
  • Design and implement remote access VPNs using IPSec
  • List the software products used to form the management of IPSec devices and solutions
  • Design and implement secure wireless networks
  • Engineers who support sales of Cisco VPN and security product solutions
  • Cisco Channel Partners who design, sell, implement and maintain VPN networks
  • Cisco Customers who design, implement and maintain VPN networks

Feel free to contact us, if you want to know the price and location of this course. A Digital Revolver representative will contact you shortly to help you with your inquiry.
Please fill out the form below

  • Guaranteed to Run™. This ensures you will attend the instructor led class or live online class you want as scheduled without any disruptive cancellations*. You book the training you need, get back to focusing on your job and are sure your training requirements will be met saving time, money and ensuring peace of mind.
  • This schedule icon the schedule indicates that this date/time will be conducted as Instructor Led Training (ILT) or a Virtual Instructor Led Training (VILT) depending on the indicated class availablity.
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial