Chapter 5 - Module 7

Lab Steps

lock
SECURING THE CONNECTION USING VPN

Ready for the real environment experience?

DifficultyIntermediate
Time Limit5h 33m
Students39

Description

Securing the Connection Using VPN

Activity: Recommended Encryption Standards

Using the link below to access the guidance from the NCSC on encryption standards and cipher suites to be employed when implementing IPsec, research the following and write your answers to the posed questions.

About the Author
Students32378
Labs149
Courses1521
Learning paths37

A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.