Time
1 hour 53 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
welcome back to end user VP and Security course in this lesson, I will be talking about benefits of using VPN.
00:10
So why do we use VPN for private use? We use it for three reasons. We have
00:17
security reason. We have evasion and we have protection and I'm going to talk about these things. And I'm just going to talk about essentially things about VPN for private use, because when we talk about companies, that
00:32
situation is absolutely clear. The benefits are very overweighting the any,
00:38
you know bad thing about it. Sometimes we pian is the only way to allow some things like people working from home or from the field. So that's the only way to make it work.
00:52
And But if you were using it for private use and you want more security,
00:58
basically you have Ah, we have two things. You have encrypted communication,
01:03
so it seems impervious to their for sneaking. Its firm used to surveillance
01:08
and you kept it, um
01:11
s you have the safety undergo because if you're using a VPN on a regular basis, you have your PC and you go toe
01:19
holiday and you have loved in the interval hotels or some bars Internet to look at things. And then you realize you have to pay your bill
01:32
so usually banking application, and then you have to log in to the application.
01:38
If you're
01:38
If you were you not using VPN,
01:42
you have a problem that somebody can do the key logging off your traffic while you're
01:48
connections to the
01:49
T there router basically there because it can be spied on nor can be
01:59
replaced by it can be hacked by hacker there.
02:02
So, um,
02:05
if you use the VPN old traffic, including all the passwords you type there secure their encrypted so they have no much use of
02:14
also you. You have it also at home because somebody can eavesdrop to your communication home and pick up your
02:23
no social network passwords. And then
02:27
probably you're using the same password for banking because people have a tendency to remember one password, maybe two, and that's it.
02:35
So this is a security part off
02:38
benefits. Ah, fusing BBN
02:40
Evasion is, of course, I spoke about that. It's a some kind of government monitoring or monitoring by some kind of entity doesn't matter,
02:51
so no one can know which pages are you visited when your own life.
02:57
They don't know your surfing history. They cannot read your email. If you're using some kind of popular online male provider like Gmail or
03:13
outlook,
03:15
they all everything going from your PC. To them, it's encrypted, so
03:21
any kind of monitoring is useless,
03:23
or
03:24
at least
03:25
very much difficult toe break into.
03:30
And, of course, if you want toward your walking,
03:32
you can choose with some of the providers where you connect to the Internet.
03:38
And then you have the ability to,
03:40
uh, saying, OK, I need to be in United States toe Use the service. Sybille. Choose my VPN provider to
03:50
to put me through and and get on the Internet in the United States, while I'm actually, for example, in the holiday in Greece. So it's a good thing,
04:01
and the third thing is a protection because it mentioned the fake WiFi hot spots.
04:08
They simply don't benefit much from from your,
04:12
uh from spying when you if you connected to them. If you are using VPN
04:17
and of course, you have protection off you all your passwords because even if you type them every time, they are not transferred in the unencrypted form over the over the by Pray connection. It is always so all the communications encrypted, including the packages to send. When you you
04:36
enter your user name and password on some
04:40
e banking page whatever, or even if it's automatic thes date a still transferred. So if you have it remembered in your browser,
04:47
it's there. They're still being transferred, so if you're using BPM, it's transferred in encrypted form.
04:54
But there are some downsides of BBN,
04:58
which in some cases are good side. But sometimes it's bad. For example, location services
05:05
if you if your VPN from some country Mediterranean and you'll live in the South America and you're walking to your weather page will every time, have to tell them your location because they won't see it because your location will be
05:23
in the country where you're exiting on the Internet. So if it's for example, United States, you will see a weather for
05:29
some town in the United States where your VPN provider has a hub,
05:33
um
05:35
on and you wanted to be for that's a grease and then you have a problem
05:41
aan den. The other thing is search engine localization. I remember when I was working in HB
05:47
and that we were using VPN all the time. Every time I along into Google, I was getting, uh, Dutch page of Google.
05:58
Uh, because, uh, my corporate VPN was exiting on the Internet of the time in Holland
06:06
and then it Z it was a problem because every time I had to tell it, man and I have to change because,
06:15
honestly, I don't understand Dutch so
06:18
and the results were induction, it was a problem.
06:23
Um, also, there are issues with connections because the VP in tow work needs certain level off Internet connection quality. So if you're sharing Internet over your mobile phone because you're somewhere where there's no WiFi, no nothing, but you have some kind off, you know,
06:41
typical tourist card that we should buy when you get into the country,
06:45
and it allows you to have Internet for a week or two weeks on your phone for a certain amount of money. Unlimited one.
06:53
But then you share it to your PC or something. Sometimes we pian doesn't work. In my experience, it doesn't work every time, especially that if you're the place where the signal is not so good
07:06
while If you don't connect to the European, you will still have reasonably good connection.
07:14
So it means if you have low speed connection or using WiFi and signal is bad,
07:19
then you can have a problem with the VPN because it won't work.
07:25
So these air downsides they're very small and there were limited. But if you're using weepy and you, you should know these things. For example, if you were in your home and
07:38
there is also one thing and you working on your company weepy and so you're logging to a company can't do You want to print something on your home printer
07:46
and it's a network printer. You won't be able to do that because when you log in tow VPN on your corporate network, your I P address becomes
07:55
I p address off the I P range that is used inside companies. Usually something beginning with
08:03
10 or something within
08:05
tens,
08:07
which is used by companies
08:09
on your home network, is usually in the other a stranger 1 90 to 1 68 something,
08:18
so in these cases you simply don't see your printer, so in order to print, you have toe save the file, walk out of VPN print and then log into again. I had that experience for quite some time and I know how it's working. So either you have Ah ah, printer that is connected to your PC at home.
08:37
Why use Be
08:39
or you have tow, disconnect and connect every time you want to print something. So these things are
08:46
rather complicated. Can get rather complicated that if you don't have the infrastructure to support it
08:54
Okay, let me ask you a question. At the end of this lesson,
08:58
what are you awaiting? When you're using VPN is key loggers Is attack authorities monitoring your bank accounts or is it governed government monitoring your browsing
09:09
And, uh,
09:11
when you using VPN you are essentially
09:15
abating. Government monitoring your browsing. Yeah, Okay, Q orders also don't work, But this is not what you are awaiting. This is this is this is part of security and privacy thing.
09:24
I also text authoritarians monitoring your bank account. They they can do it without monitoring your internet traffic. They can go to the bank,
09:35
most of the countries.
09:37
So
09:39
in this lesson you have learned the benefits of VPN and
09:46
these air many and you have also learned some of the downsides of BP and music and the things that you have to have in mind when you use PM in the next lesson, I will be talking about how secure is the PM.

Up Next

End User VPN Security

In this course, students will learn the history of VPNs (Virtual Private Network) and who needs to use a VPN. This course will also teach students about the different types of VPNs and the hardware that is needed to implement VPNs.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor