From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 2 Security Monitoring
Unlock the full course today
Join today to access over 24,100 courses taught by industry experts.
Outlining the different protocol versions
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 2 Security Monitoring
Outlining the different protocol versions
- [Instructor] For many years, consumers have been conducting transactions on the internet. Up until recently, a website could get away with not having a secure connection. However, today, most consumers insist on some form of encryption to protect against malicious activity. Secure Sockets Layer/Transport Layer Security based VPNs have been around since the early 1990s, Originally known as Secure Sockets Layer, or SSL, this method was widely recognized as a way to secure traffic between clients and web browsers. Now keep in mind, because of the security weaknesses in SSL, the use of an SSL VPN has been deprecated since 2015. Therefore for our discussion, we'll focus on Transport Layer Security. A Transport Layer Security VPN provides data protection for the upper layers of the OSI model while transmitting across the internet, a Transport Layer Security VPN can be used to secure HTTP, FTP, and SMTP. The protocol is…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Protecting data and networks3m 58s
-
(Locked)
Ensuring trust on the Internet4m 21s
-
(Locked)
Examining an X.509 certificate2m 12s
-
(Locked)
Describing certificate classes2m 20s
-
(Locked)
Grasping the public key cryptography standards (PKCS)2m 34s
-
(Locked)
Managing keys using IKE4m 25s
-
(Locked)
Outlining the different protocol versions2m 52s
-
(Locked)
Configuring the cipher suite4m 16s
-
(Locked)
Challenge: Certificate Authority Stores1m 26s
-
(Locked)
Solution: Certificate Authority Stores3m 59s
-
(Locked)
-