Secure Communications and VPNs
Implement encryption and authentication technologies for safe Internet communications.
This course is not currently offered by Global Knowledge. Information here is provided for reference only.
As more companies build their entire business plan around the Internet, including customer purchases and business partner relationships, the need for security is paramount. Mistakes no longer mean just a cash register shortage or an incorrect invoice. A hacker, with tools found over the Internet, can quickly "see" your customers' most sensitive information, including their credit card numbers and account balances. Secure communications protocols are the heart of making secure transactions over the Internet.
In this course, you will learn the objectives, components, architectures, applications, and protocols for secure communications, including SSL, TLS, S/MIME, and PGP. Learn the details on VPN and tunneling protocols, including IPSec, Kerberos, SSH, PGPnet, PPTP, L2F, and L2TP.
What You'll Learn
- Public key generation and distribution and how they work to encrypt and decrypt messages
- Development of an intermediate-to-intermediate encrypted channel using Check Point FireWall-1
- SSL and S/MIME functions as secure communications protocols
- How an IPSec-based end point to intermediate secure communications implementation works
- Implement encryption and authentication technologies for safe Internet communications.
Who Needs to Attend
Security professionals including: security consultants, analysts, and security administrators, network engineers, Webmasters, e-Commerce consultants and developers, communications managers, and IS managers.
Our Network Security I: Policy, Administration, and Firewalls is a necessary prerequisite. We also recommend the level of knowledge that can be acquired in Mastering TCP/IP.
There are no follow-ons for this course.
Course OutlineTitle 1: Introduction to Secure Communications
In order to understand how to secure your network, you must first understand the threats, objectives and challenges to secure communications. In this session, you will learn about those items that you should continuously focus on to maintain a secure and operational network, i.e. integrity, authentication, access control, key generation and storage, public key infrastructure, and other vital issues.
Title 2: Cryptography Primer Cryptography
In this session, you will gain an solid understanding of the basic components: random values, keys, initialization vectors (IVs), hashing algorithms, public key systems, and secret key systems. Each of these plays a significant role in the performance, security, and costs of implementing a cryptography solution.
Title 3: Secure Communications Protocols
Examine secure communications as it applies to 3 types of applications: web-related, e-mail, and network communications. Identify varying handshake methods of each protocol, identify ciphers/algorithms used in each application, and detail the abilities of each application to meet the needs of securing your communications. Learn about SSL, PGP, IPSec, Kerberos, SSH, and define VPN and study it's challenges and implementation.
Title 4: Introduction and Tunneling Protocols
Examine the utilization of tunneling, encapsulation, and labeling technologies to achieve control over Quality or Class of Service in secure communications. Compare the various features of these technologies and learn the basic elements and operations.