YoVDO

VPN Architectures - Looking at the Complete Picture

Offered By: Black Hat via YouTube

Tags

Black Hat Courses VPN Courses Authorization Courses Enterprise Security Courses Access Control Systems Courses

Course Description

Overview

Explore the complexities of VPN architectures and their integration with enterprise security systems in this comprehensive Black Hat USA 1999 conference talk. Delve into the multifaceted world of VPN protocols, products, and their implementation in various enterprise environments. Learn about the distinctions between Branch Office VPN (BOVPN) and Remote User VPN (RUVPN) planning, and understand the importance of QoS agreements with service providers. Examine crucial aspects of VPN deployment, including firewall integration, internal system accessibility, traffic monitoring, and optimal architectures for different scenarios. Gain insights into the careful balance between VPN functionality and security concerns, covering topics such as IDS system integration, auditing capabilities, and VPN usage management. Through a detailed syllabus, explore VPN basics, performance issues, security measures, and the future landscape of VPN technology.

Syllabus

Intro
VPN Architectures
VPN Utility
Remote Access VPN
Branch Office VPN
Traffic Volume
Egress Utilization
Management Perspectives
NMS Management Station
Unique Requirements
VPN Basics
Architecture: NAT
Performance Issues
Throughput
Reliability
Availability
VPN Security
Security: Authentication
Security: Authorization
Security: Accounting
Security: Policy Management
Security: Confidentiality
Architecture Dependencies
Piloting a VPN
Future VPN Landscape


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube