Join Cybrary

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

S3SS10N Wednesday – IP Security (part 1)

< Back to Blog Posts

S3SS10N Wednesday – IP Security (part 1)

Published: April 27, 2016 | By: Tatianna | Views: 2213

What is S3SS10N Wednesday?

Click here to find out more, or watch the Session below to experience it.


You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free.

Join Now


Instructor Bio-

Kelly Handerhan
Skilled and certified in CISSP, CASP, and PMP, SME Kelly has taught several courses on Cybrary and is highly praised for her ability to effectively communicate important information in a relate-able and understandable way. You can view her extended (2 minute) bio here.

Don’t forget to comment!
Tell us what you think, and share your own knowledge.


Listen to / Download the MP3

Purpose of this Session:
This lesson offers an introduction to IP Sec, which stands for IP Security. IP Security is very important to learn about because at the present time, there is no built in security to IP. This is an issue because many things are not designed with security in mind; they are merely designed to work. IP has been in use long before the invention of the Internet; the US government has been using IP Sec since the 1960s to secure phone lines. This lesson focuses on the current version which is IPv4, which isn’t designed to be secure, security is simply added as an afterthought. IPSec is an encapsulation framework that supports security. Encapsulation is often confused with encryption but they are actually different. Encapsulation is about packaging a product. An IPv4 packet consists of three components:
• The header
• The payload
• The Chore
IPv4 encapsulates all of these components in what is called tunnel mode which is the entire IPsec payload. IPv4 can also operate in transport mode which only encapsulates the payload, creating less overhead. These are the first steps in configuring IPSec and setting it up with a chosen mode based on how much security is desired. Remember encapsulation in and of itself does not provide security, it is a step in setting up the packet to be secure with some of the protocols IPsec utilizes.
< Back to Blog Posts
Enjoy this blog post? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter Google+ LinkedIn Email
Join Cybrary
  1. Thanks Kelly, great video !

  2. Thanks, Kelly. Building on @Tushar‘s question, can you please cover applications of Tunnel V. Transport in your next session?

  3. Thank you, Kelly. Your explanation is simple, straight forwards and professional. This basic knowledge needs to be remembered always.

  4. Thank you Kelly. I have a Masters Degree in Information Security. But I am missing some lower level knowledge and experience. I am a visual learner. This video helped me understand some missing components. Thank you!

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?