Video is locked.

Unlock the full course today

Join today to access over 15,000 courses taught by industry experts or purchase this course individually.

Windows 10: Advanced Troubleshooting for IT Support

VPN authentication methods

From the course: Windows 10: Advanced Troubleshooting for IT Support

Start my 1-month free trial
  • Course details

    Expand your troubleshooting skill set by learning how to resolve some of the more difficult issues you might encounter when supporting Windows 10. This course covers advanced troubleshooting concepts for experienced IT support professionals in an enterprise environment. Instructor Andrew Bettany dives into a wide range of topics, including hardware devices and network and remote connectivity. Throughout the course, Andrew provides practical demonstrations and examples that can help you confidently tackle challenging situations. Discover how to troubleshoot group policy issues, solve BitLocker lock out issues, use a shim to resolve app compatibility problems, and much more.


    • Click here to view Andrew Bettany’s instructor page

      Andrew Bettany

      Azure Skills Lead for Higher Educations UK. Modern management consultant specialising in Azure, Teams and Microsoft 365.

      • Andrew Bettany is a trainer and author specializing in Microsoft technologies and social media strategy.

        Andrew focuses on cloud and mobility technologies, including Windows 10, Office 365, Microsoft Intune, and Microsoft Azure. He is a keen networker who is passionate about helping people—from young adults to apprentices and career changers—pursue and achieve their learning goals and gain certifications. For eight years, he managed and grew the IT Academy at the University of York, until deciding to focus more on other opportunities, consulting, authoring, and freelance training. He also sits on several company boards as a director and advises on business development and strategy.

    Skills covered in this course

  • Windows advanced support

    - [Instructor] When a VPN tunnel between two networks is created, each side of the connection will need to authenticate the other side. The process of authentication ensures that a recipient server knows which clients are trying to gain access, and that the clients are verified. This authentication of the participants is done using key pairs, certificates, usernames or passwords, or a combination of these. Let's look at the authentication process in more detail. The authentication process consists of several steps. The process that uses certificates to validate authentication follows this process. The client initiates the connection to the receiving server. The server presents a certificate to the client. The client verifies that the certificate is valid. If the client has a key pair, then it will encrypt this with its own certificate and send it to the server. The server is then able to verify the client's certificate. The client sends user credentials to the server. The server…

  • Download courses and learn on the go

    Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.

    Watch this course anytime, anywhere. Get started with a free trial today.