Chapter 5 - Module 7
Ready for the real environment experience?
Time Limit5h 33m
Securing the Connection Using VPN
Activity: Recommended Encryption Standards
Using the link below to access the guidance from the NCSC on encryption standards and cipher suites to be employed when implementing IPsec, research the following and write your answers to the posed questions.
About the Author
A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.