We may earn an affiliate commission when you visit our partners.
Craig Stansbury

VPNs secure business traffic over the unprotected internet. Learn how to deploy either site-to-site VPNs using Cisco routers, or remote access VPNs using an ASA, or FTD.

Read more

VPNs secure business traffic over the unprotected internet. Learn how to deploy either site-to-site VPNs using Cisco routers, or remote access VPNs using an ASA, or FTD.

The internet is an insecure way of transmitting confidential information, but dedicated circuits can be very expensive. In this course, Cisco Core Security: Describing and Configuring VPNs, you will gain the ability to understand and deploy various types of VPNs. First, you will learn about cryptography components, and how to configure cryptography on Cisco devices. Next, you will discover how to deploy various site-to-site VPNs using Cisco routers. Finally, you will explore how to configure a headend device to accept remote access VPNs using either Cisco’s Adaptive Security Appliance or Firepower Threat Defense. When you’re finished with this course, you will have the skills and knowledge of cryptography needed to deploy various types of VPNs.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Comparing Cryptography Components
Comparing Cisco VPN Types
Configuring DMVPN
Read more
Configuring FlexVPN
Configuring Cisco AnyConnect on the ASA
Configuring Cisco AnyConnect on the FTD

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores DMVPN & FlexVPN, industry-standard technologies
Teaches Cisco AnyConnect, a widely-used remote access VPN
Taught by Craig Stansbury, an experienced Cisco security instructor
Develops cryptography knowledge & skills, which are core for network security
Examines site-to-site & remote access VPNs, both common VPN types
Requires background in Cisco routers & Cisco security concepts

Save this course

Save Cisco Core Security: Describing and Configuring VPNs to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cisco Core Security: Describing and Configuring VPNs with these activities:
Review cryptography basics
Reviewing the fundamentals of cryptography will give you a solid foundation for understanding VPNs.
Browse courses on Cryptography
Show steps
  • Read up on the principles of cryptography, such as encryption, decryption, and hashing.
  • Take a practice quiz on cryptography concepts.
Volunteer at a local IT organization
Volunteering at a local IT organization will give you exposure to real-world VPN deployments and allow you to network with other IT professionals.
Show steps
  • Find a local IT organization that offers volunteer opportunities.
  • Contact the organization and inquire about volunteer opportunities.
  • Volunteer at the organization and assist with VPN-related tasks as needed.
Follow a tutorial on how to configure a remote access VPN using an ASA
Following a tutorial will provide you with step-by-step guidance on configuring a remote access VPN.
Show steps
  • Find a tutorial on how to configure a remote access VPN using an ASA.
  • Follow the steps in the tutorial to configure the VPN.
  • Test the VPN connection to ensure it is working properly.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Attend a workshop on VPN security
Attending a workshop on VPN security will expose you to the latest trends and best practices in VPN security.
Show steps
  • Find a workshop on VPN security that meets your interests and needs.
  • Register for the workshop.
  • Attend the workshop and take notes on the key takeaways.
Configure a site-to-site VPN using Cisco routers
Hands-on practice will help you solidify your understanding of site-to-site VPNs.
Show steps
  • Set up a lab environment with two Cisco routers.
  • Follow the steps in the course materials to configure a site-to-site VPN.
  • Test the VPN connection to ensure it is working properly.
Create a presentation on the different types of VPNs
Creating a presentation will help you organize and synthesize your knowledge of VPNs.
Show steps
  • Research the different types of VPNs, such as site-to-site VPNs, remote access VPNs, and IPsec VPNs.
  • Create a presentation that includes an overview of each type of VPN, its advantages and disadvantages, and its use cases.
  • Present your presentation to your classmates or colleagues.
Develop a deployment plan for a VPN solution
Creating a deployment plan will help you apply your knowledge of VPNs to a real-world scenario.
Show steps
  • Identify the requirements for the VPN solution, such as the number of users, the types of devices that will be used, and the security requirements.
  • Research different VPN solutions and select one that meets the requirements.
  • Create a deployment plan that includes step-by-step instructions for configuring and deploying the VPN solution.
Implement a VPN solution for a small business
Implementing a VPN solution for a small business will give you hands-on experience with the entire VPN deployment process.
Show steps
  • Gather the requirements for the VPN solution.
  • Research different VPN solutions and select one that meets the requirements.
  • Purchase the necessary hardware and software.
  • Configure and deploy the VPN solution.
  • Test the VPN connection to ensure it is working properly.

Career center

Learners who complete Cisco Core Security: Describing and Configuring VPNs will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for computer networks and systems. This course would be very useful for Network Security Engineers as it provides a deep dive into the fundamentals of VPNs, including cryptography, and how to configure VPNs on Cisco devices. Network Security Engineers who take this course will gain the skills needed to design and implement secure VPN solutions.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course is an excellent choice for Cybersecurity Analysts wishing to develop their skills as it covers the fundamentals of VPNs, including cryptography, and how to configure VPNs on Cisco devices. A deep understanding of VPNs is essential for Cybersecurity Analysts responsible for securing an organization's network infrastructure.
Security Consultant
Security Consultants assess and mitigate security risks for businesses and other organizations. This course would be useful for them as it provides a deep dive into the fundamentals of VPNs, including cryptography, and how to configure VPNs on Cisco devices. Security Consultants who take this course will gain the knowledge and skills needed to evaluate and implement VPN solutions for their clients.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. This course is particularly useful for Information Security Analysts as it provides a solid foundation in cryptography, which is essential for securing VPNs. Additionally, the course covers how to configure VPNs on Cisco devices, a common task for Information Security Analysts.
Security Analyst
Security Analysts monitor and analyze security data to identify and respond to security incidents. This course would be useful for them as it provides a deep dive into the fundamentals of VPNs, including cryptography, and how to configure VPNs on Cisco devices. Security Analysts who take this course will gain the knowledge and skills needed to detect and respond to VPN-related security incidents.
IT Auditor
IT Auditors evaluate the security of computer networks and systems for businesses and other organizations. This course may be useful for them as it provides a deep dive into the fundamentals of VPNs, including cryptography, and how to configure VPNs on Cisco devices. IT Auditors who take this course will gain the knowledge and skills needed to assess the security of VPN solutions.
Network Engineer
Network Engineers design, implement, and maintain computer networks for businesses and other organizations. This course may be useful for someone in this role as it covers the fundamentals of VPNs, including cryptography, and how to configure VPNs on Cisco devices. Network Engineers who take this course will gain the skills needed to deploy and manage VPNs.
Network Architect
Network Architects design, implement, and maintain computer networks for businesses and other organizations. This course may be useful for them as it covers the fundamentals of VPNs, including cryptography, and how to configure VPNs on Cisco devices. Network Architects who take this course will gain the knowledge and skills needed to design and implement secure VPN solutions.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems and software for businesses and other organizations. Enrolling in this course may be useful for this career as it will teach you how to configure and deploy VPNs, a critical component of any secure network. This course will also be valuable for a Systems Engineer who aims to specialize in network security.
Network Security Specialist
Network Security Specialists design, implement, and maintain security measures for computer networks and systems. Enrolling in this course may be useful for this career as it will teach you how to configure and deploy VPNs, a critical component of any secure network. This course will also be valuable for a Network Security Specialist who aims to specialize in VPNs.
Network and Computer Systems Administrator
Network and Computer Systems Administrators install, configure, and maintain computer networks for business and other organizations. Enrolling in this course may be useful for this career as it will teach you how to configure and deploy VPNs, a critical component of any secure network. This course will also be valuable for a Network and Computer Systems Administrator who aims to specialize in network security.
Penetration Tester
Penetration Testers use their skills to identify and exploit vulnerabilities in computer systems and networks to help organizations improve their security. Enrolling in this course may be useful for this career as it will teach you how to configure and deploy VPNs, which can be used to secure an organization's network. This course will also be valuable for a Penetration Tester who aims to specialize in network security.
Ethical Hacker
Ethical Hackers use their skills to identify and exploit vulnerabilities in computer systems and networks to help organizations improve their security. Enrolling in this course may be useful for this career as it will teach you how to configure and deploy VPNs, which can be used to secure an organization's network. This course will also be valuable for an Ethical Hacker who aims to specialize in network security.
Malware Analyst
Malware Analysts investigate and analyze malware to identify its purpose and behavior and to develop defenses against it. Enrolling in this course may be useful for this career as it will teach you how to configure and deploy VPNs, which can be used to protect an organization's network from malware attacks. This course will also be valuable for a Malware Analyst who aims to specialize in network security.
Incident Responder
Incident Responders investigate and respond to security incidents to minimize damage and restore normal operations. Enrolling in this course may be useful for this career as it will teach you how to configure and deploy VPNs, which can be used to secure an organization's network. This course will also be valuable for an Incident Responder who aims to specialize in network security.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cisco Core Security: Describing and Configuring VPNs.
Provides a comprehensive overview of OpenSSL, including how to use it to create and manage VPNs.
Provides a comprehensive overview of Cisco ASA 5500-X Series Firewalls, including how to configure and troubleshoot them.
Provides a comprehensive overview of VPN security, including different types of VPNs, security threats, and mitigation strategies.
Provides a comprehensive overview of cryptography and network security, including different types of VPNs and how they work.
Provides a comprehensive overview of computer security, including different types of VPNs and how they work.
Provides a comprehensive overview of computer networking, including different types of VPNs and how they work.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cisco Core Security: Describing and Configuring VPNs.
Architecting Cisco Secure Communications
Most relevant
Configure NAT and VPNs Using Palo Alto Firewalls
Most relevant
Securing Network Communication with Cisco VPNs
Most relevant
Cisco Collaboration Core: QoS and Collaboration...
Most relevant
Cisco Collaboration Core: Implementing Cisco IOS Gateway...
Most relevant
Introduction to Cisco Networking
Most relevant
Implementing Windows Server 2016 Connectivity and Remote...
Most relevant
Cisco Data Center Core: Configuring Networking
Most relevant
Cisco Collaboration Core: Infrastructure and Design
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser