Time
1 hour 53 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
welcome back to and use a VPN security course on this video, I will do a recap of model during which I was talking about how we play and works.
00:11
So
00:12
first thing that there was covered in this module is how weepy in what kind of technologies we pian uses to work. So what are what are the technologies behind the VPN?
00:26
Then I give you an example off European communication with some animation to see how it actually works. In real life,
00:35
you have also seen about types of weepy and exist. So I was talking about harder versus after implementation and then three types off weepy and based on the usage so you can have remote. You have more by land, site to site VPN, which are essentially different in many ways.
00:57
And in the end, I was talking about re harbor. Resource is you need to implement VPN. So
01:03
you,
01:03
from the point of if you choose the harbor implementation or suffering reputation and you have seen the differences are rather small. So from harder point, if you're doing hardware, implementation the appliances if units after implement thank you need the servers supper.
01:22
So this is all about this video and the next video I will be starting talking about personal. We peons how to use them have to set the map how to choose them, which is going to be part of module for?

Up Next

End User VPN Security

In this course, students will learn the history of VPNs (Virtual Private Network) and who needs to use a VPN. This course will also teach students about the different types of VPNs and the hardware that is needed to implement VPNs.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor