hands-on lab

Chapter 5 - Module 7 - retired

Intermediate
Up to 5h 33m
42
Get guided in a real environmentPractice with a step-by-step scenario in a real, provisioned environment.
Learn and validateUse validations to check your solutions every step of the way.
See resultsTrack your knowledge and monitor your progress.

Description

Securing the Connection Using VPN

Activity: Recommended Encryption Standards

Using the link below to access the guidance from the NCSC on encryption standards and cipher suites to be employed when implementing IPsec, research the following and write your answers to the posed questions.

About the author

Avatar
QA, opens in a new tab
Training Provider
Students
54,548
Labs
189
Courses
2,739
Learning paths
52

A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.

Lab steps

SECURING THE CONNECTION USING VPN