Home
:
Book details
:
Book description
Description of
IPSEC VPN Tunnel on MikroTik
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | SRT | Size: 3.16 GB | Duration: 3h 34m What you'll learn Understand what is VPN Understand what is IPSEC Understand the 4 features of IPSEC Understand why IPSEC is a protocol suite Understand the Protocols used in the IPSEC features Understand IPSEC modes of communications Understand IPSEC Transport mode Understand IPSEC Tunnel mode Understand what is Symmetric key encryption Understand what is Asymmetric key encryption Understand how DH works to share the secret key in a secure way Understand the encryption protocols such as: DES, 3DES, AES, Blowfish, Camellia, RSA & DH Understand Data Integrity using Hashing algorithms such as: MD5, SHA1, SHA256, SHA512 Understand the types of IPSEC authentication: Pre-shared key vs Certificate Understand IPSEC Negotiation Protocols: AH vs ESP Understand the IPSEC negotiation process Understand what is the initiator to start the IPSEC VPN Understand IKE Phase 1 (ISAKMP) Understand the difference between Main and Aggressive mode on IKE Phase 1 Understand IKE Phase 2 Understand what is PFS Group Understand the difference between IKEv1 & IKEv2 Configuring IPSEC site-to-site using IKEv1 Configuring IPSEC site-to-site using IKEv2 Configure IPSEC IKv2 Remote Access using certificates Requirements Have a TCP/IP knowledge Have an experience with networking Ideally have an MTCNA certificate Description However, configuring IPSEC correctly is a challenge because IPSEC is considered as a Framework protocol which has many sub-protocols and phases under its umbrella. I have designed this course to help you to understand how IPSEC works, that means that big part of this course is going to be a theoretical part explaining in details all parts of IPSEC. During this course, I will explain also about a lot of security terms that we always hear and is used on IPSEC such as: Encryption, Hashing, Authentication, Deffie-Hellman, Symmetric and Asymmetric keys, etc..... After the theoretical part, I am going to do LABs where I will show you how to configure correctly IPSEC on MikroTik Routers and we will test it to see if it works good. The LABs will include both versions of IPSEC which are IKEv1 and IKEv2. I can't wait to see you in my course . Who this course is for: Students who want to learn and understand how IPSEC works and know how to configure it on MikroTik RouterOS Engineers who want to apply IPSEC tunneling protocol in their networks Homepage https://www.udemy.com/course/ipsec-vpn-tunnel-on-mikrotik/