YoVDO

VPN Architectures - Looking at the Complete Picture

Offered By: Black Hat via YouTube

Tags

Black Hat Courses VPN Courses Authorization Courses Enterprise Security Courses Access Control Systems Courses

Course Description

Overview

Explore the complexities of VPN architectures and their integration with enterprise security systems in this comprehensive Black Hat USA 1999 conference talk. Delve into the multifaceted world of VPN protocols, products, and their implementation in various enterprise environments. Learn about the distinctions between Branch Office VPN (BOVPN) and Remote User VPN (RUVPN) planning, and understand the importance of QoS agreements with service providers. Examine crucial aspects of VPN deployment, including firewall integration, internal system accessibility, traffic monitoring, and optimal architectures for different scenarios. Gain insights into the careful balance between VPN functionality and security concerns, covering topics such as IDS system integration, auditing capabilities, and VPN usage management. Through a detailed syllabus, explore VPN basics, performance issues, security measures, and the future landscape of VPN technology.

Syllabus

Intro
VPN Architectures
VPN Utility
Remote Access VPN
Branch Office VPN
Traffic Volume
Egress Utilization
Management Perspectives
NMS Management Station
Unique Requirements
VPN Basics
Architecture: NAT
Performance Issues
Throughput
Reliability
Availability
VPN Security
Security: Authentication
Security: Authorization
Security: Accounting
Security: Policy Management
Security: Confidentiality
Architecture Dependencies
Piloting a VPN
Future VPN Landscape


Taught by

Black Hat

Related Courses

0-Days and Mitigations - Roadways to Exploit and Secure Connected BMW Cars
Black Hat via YouTube
Ways to Die in Mobile OAuth
Black Hat via YouTube
Ways to Bypass Your macOS Privacy Mechanisms
Black Hat via YouTube
Electronegativity - A Study of Electron Security
Black Hat via YouTube
A Titan M Odyssey
Black Hat via YouTube