|
|
Автор:
Издательство: Cisco Press
Год издания: 2003
Количество страниц: 1050
Язык: english
Формат: PDF
Размер: 8 Мб
Каталожный номер: 12916
|
Upon completion of this course, you will be able to perform
the following tasks:
* Recognize the services offered by cryptography and
recommend those services to an organization to address their
specific needs.
* Describe various encryption, hashing, and signing algorithms
and select the best algorithm in a design situation.
* Explain the role of key management in cryptography.
* Explain specific guidelines which need to be considered when
deploying cryptographic systems.
* Select the best practices of key management in a design
situation. * Describe the standards and procedures used with the PKI.
* Explain the limitations of PKI technologies in various
security designs.
* Design secure VPN’s using various VPN technologies.
* Identify the benefits and drawbacks of each VPN
technology.
* Implement basic IPSec using all currently supported
encryption and authentication mechanisms. * Design and implement site-to-site VPNs using
IPSec.
* Design and implement remote access VPNs
using IPSec.
* List the software products used to form the
management of IPSec devices and solutions.
* Design and implement secure wireless
networks.
|
|