YoVDO

VPN Architectures - Looking at the Complete Picture

Offered By: Black Hat via YouTube

Tags

Black Hat Courses VPN Courses Authorization Courses Enterprise Security Courses Access Control Systems Courses

Course Description

Overview

Explore the complexities of VPN architectures and their integration with enterprise security systems in this comprehensive Black Hat USA 1999 conference talk. Delve into the multifaceted world of VPN protocols, products, and their implementation in various enterprise environments. Learn about the distinctions between Branch Office VPN (BOVPN) and Remote User VPN (RUVPN) planning, and understand the importance of QoS agreements with service providers. Examine crucial aspects of VPN deployment, including firewall integration, internal system accessibility, traffic monitoring, and optimal architectures for different scenarios. Gain insights into the careful balance between VPN functionality and security concerns, covering topics such as IDS system integration, auditing capabilities, and VPN usage management. Through a detailed syllabus, explore VPN basics, performance issues, security measures, and the future landscape of VPN technology.

Syllabus

Intro
VPN Architectures
VPN Utility
Remote Access VPN
Branch Office VPN
Traffic Volume
Egress Utilization
Management Perspectives
NMS Management Station
Unique Requirements
VPN Basics
Architecture: NAT
Performance Issues
Throughput
Reliability
Availability
VPN Security
Security: Authentication
Security: Authorization
Security: Accounting
Security: Policy Management
Security: Confidentiality
Architecture Dependencies
Piloting a VPN
Future VPN Landscape


Taught by

Black Hat

Related Courses

Teaching Impacts of Technology: Global Society
University of California, San Diego via Coursera
CCNA Security and CCNP Security Deep Dive Part::1
Udemy
The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy
The Complete Ethical Hacking Course for 2016/2017!
Udemy
Clear and Simple VMware NSX 6.2 and vSphere Virtual Networks
Udemy