Module 3 Recap
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
welcome back to and use a VPN security course on this video, I will do a recap of model during which I was talking about how we play and works.
00:11
So
00:12
first thing that there was covered in this module is how weepy in what kind of technologies we pian uses to work. So what are what are the technologies behind the VPN?
00:26
Then I give you an example off European communication with some animation to see how it actually works. In real life,
00:35
you have also seen about types of weepy and exist. So I was talking about harder versus after implementation and then three types off weepy and based on the usage so you can have remote. You have more by land, site to site VPN, which are essentially different in many ways.
00:57
And in the end, I was talking about re harbor. Resource is you need to implement VPN. So
01:03
you,
01:03
from the point of if you choose the harbor implementation or suffering reputation and you have seen the differences are rather small. So from harder point, if you're doing hardware, implementation the appliances if units after implement thank you need the servers supper.
01:22
So this is all about this video and the next video I will be starting talking about personal. We peons how to use them have to set the map how to choose them, which is going to be part of module for?
Up Next
Instructed By
Similar Content