From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
VPNs and tunneling
From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
VPNs and tunneling
- [Narrator] Alright, let's talk about VPNs and tunneling protocols. So a tunneling protocol is something that will encapsulate other frame or a packet depending on which layer it's working at. So that it can be transmitted through some other network. Typically some network that it can't work within. Perhaps because it's using a private IP addressing scheme or it's a different architecture different protocol. It's some way to get something through something else and then it's unwrapped on the other side or de-encapsulated so that it can be put back onto a network of its type. Now we're gonna talk about three different tunneling protocols in this course. There's others, but these are the ones that you're likely to encounter in the field. So let's get right to it. The point-to-point tunneling protocol or PPTP, is primarily used or created by Microsoft. It's used in a lot of places now. Although it's a bit long in the tooth it's falling out of favor these days and it's based on an older…
Contents
-
-
-
-
(Locked)
Data security2m 44s
-
(Locked)
Access control models15m 51s
-
(Locked)
Single sign-on9m 21s
-
(Locked)
Centralized access control9m 49s
-
(Locked)
Network security: Firewalls13m
-
(Locked)
Authentication protocols4m 12s
-
(Locked)
VPNs and tunneling10m 6s
-
(Locked)
Domain names system6m 20s
-
(Locked)
Cryptography overview: Part 113m 49s
-
(Locked)
Cryptography overview: Part 212m 28s
-
(Locked)
Cryptography: Hash algorithms and digital signatures6m 4s
-
(Locked)
Cryptography: Public key infrastructure and certificates10m 27s
-
(Locked)
PBX and VOIP security7m 33s
-
(Locked)
Secure protocols7m 11s
-
(Locked)
Wireless security10m 15s
-
(Locked)
Internet of Things and endpoint security2m 42s
-
(Locked)
Third-party vendor controls4m 37s
-
(Locked)
Physical and environmental security3m 6s
-
(Locked)
Security assessment and testing4m
-
(Locked)
Evidence collection and forensics3m 27s
-
(Locked)
-
-
-