...

Home
Book Store
Search Classes
Consulting
Partner Program
News
About Us
Contact Information
Site Map

 
 
Detailed Course Outline
VPNs: Virtual Private Networking: Hands ON
Course: 783
Duration: 2 Days
Register
View Schedule
Course Outline
Suggested Prerequisites
Suggested Follow-Ons
Y>
 
bulletDesigning & Deploying enterprise wide virtual private networks (VPNs)
bulletAuthentication: Passwords, digital certificates, and Security Servers
bulletEncryption techniques for securing Information
bulletIPsec
bulletTunneling protocols
bulletExtending VPNs to remote locations, customers and suppliers
Introduction to the concept of VPNs
bulletDefinition of VPNs
bulletAdvantages and Disadvantages
bulletBasics of Networking and TCP/IP
bulletReview
Tunneling & Encryption
bulletConcept of Encapsulation
bulletLayer 2 versus 3 tunneling
bulletEncryption
bulletPrivate (symmetric) key
bulletPublic (asymmetric) key
bulletHashing Algorithms
bulletDigital Signatures
bulletPublic key infrastructure (PKI)
Categorization of VPN Products
bulletRouters
bulletFirewall
bulletSoftware based solutions
bulletHardware based solutions
Introduction to Key VPN Protocols
bulletHistory of L2F
bulletPPP
bulletEncapsulation
bulletLink Control Protocol (LCP)
bulletNetwork Control Protocol (NCP)
bulletPPP IP Control Protocol (IPCP)
bulletAuthentication
bulletRecent Draft Enhancements
bulletPPTP
bulletApplications of PPTP
bulletPacket Format
bulletSecurity Options
bulletWindows implementations
bulletRAS on NT

bulletLayer 2 Tunneling Protocol (L2TP)
bulletL2TP Access Concentrator (LAC)
bulletL2TP Network Server (LNS)
bulletL2TP Header
bulletControl and Data Messages

bulletVendor Specific Protocols
bulletVTP
bulletBayDVS
bulletGRE

bulletIP Security Protocol (IPSEC)
bulletTransport and Tunnel Modes
bulletDetailed IPSEC Protocols
bulletSecurity Associations
bulletContents
bulletEstablishment
bulletKey Management
bulletManual
bulletISAKMP/Oakley (IKE)
bulletANX Implementation

VPN Security
bulletNetwork Security Fundamentals
bulletRemote Access and Authentication
bulletRADIUS
bulletFirewalls
Quality Of Service and Performance in VPNs
bulletTCP and IP Headers & QOS
bulletRSVP Overview
bulletDifferentiated services
bulletIP precedence bits
bulletRED
VPN Implementation
bulletEnd to End, Hybrid and Service Provider solutions
bulletVPN configurations
bulletDesigning VPNs
bulletDeployment considerations, SLAs, networks management, and security.
Service Level Agreement in VPN Environments
bulletManaging SLAs in VPNs
Configure and Install a VPN environment using Linux servers.
bulletLab Project: Configure and Install a VPN environment using Linux servers.
Hands On Training
Numerous Labs and projects throughout the course.
bulletHands On Project: Configure and Install a VPN environment using Linux servers.