Virtual private networks (VPNs) allow remote users to access resources on a protected network via an encrypted connection. While the technology is common, it’s helpful to understand the many protocols and platform-specific options that can be selected to best meet the needs of your organization. This course helps you understand VPN terms and technologies, so you can configure a custom VPN solution. Instructor Scott Simpson covers protocols such as PPTP, L2TP over IPSec, OpenVPN, SSTP, and WireGuard, and shows how to use SSH to secure data traveling between systems. He also shows how to set up and connect to two different VPN servers. Plus, learn about the factors to consider in your own VPN implementation, including mobile access and specialized VPN appliances.
Learn. Build. Teach.Scott Simpson has a master's in education and currently creates technology courses as an author at LinkedIn.
Scott has been interested in computers since he was about seven years old, and for most of that time, he's been teaching friends, family, and strangers how to use them. This geeky hobby turned into a job with Apple during college, and after completing his master's degree in education at San Diego State University, he has helped to shape the Developer segment here at lynda.com as a content producer. Scott enjoys building web apps and exploring new technologies. He can be found on Twitter at @scotty82.
Skills covered in this course
What is a VPN?“
- [Scott] VPN, or Virtual Private Networking, is a set of technologies that allow a device to connect through a protected tunnel to another network. VPNs are used by many organizations to provide remote access to protected resources, like a customer relations system, a purchasing system, a subscription article database, or other internal systems for users that are outside of the organization's local network. A VPN allows these remote users to connect securely to systems that would otherwise not be accessible from the outside. VPNs work by establishing a connection, usually with some kind of encryption, through the Internet, between two devices, and sending network traffic through that tunnel. The remote device could be a mobile phone or tablet, a computer, or even a router for a network, allowing all the clients on that network access to the systems on the protected network. This is commonly used to connect satellite offices to a central office or data center. VPNs are also used to…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Watch this course anytime, anywhere. Get started with a free trial today.