text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים

Next Gen Firewall, VPN and Zero-Trust Network Access (ZTNA)

-- Generating

If download hasn't started

Course Overview

This course covers next-generation firewalls (NGFW), virtual private networks (VPN), and Zero-Trust Network Access (ZTNA). Students will learn about the key characteristics of these functions, understand their use cases, and recognize some popular vendors. The course will delve into the details of NGFW, including its deployment models, such as physical appliances, private cloud, and public cloud. It will also explore VPN protocols, including IPsec, OpenVPN, and Secure Socket Tunneling Protocol (SSTP). Additionally, the course will discuss ZTNA, its architecture, and use cases, including secure multi-cloud access and reduced third-party risk. By the end of the course, students will be able to explain what NGFW, VPN, and ZTNA are, understand their use cases, and recognize the benefits of implementing these technologies in a cloud-based environment.

Share With

Chapter 1: Next Gen Firewall, VPN and Zero-Trust Network Access (ZTNA)

Chapter List

Quiz Status

Please watch the video before taking the quiz.

Once you have watched the video, please take the quiz.

Chapter Overview

This course covers next-generation firewalls (NGFW), virtual private networks (VPN), and Zero-Trust Network Access (ZTNA). Students will learn about the key characteristics of these functions, understand their use cases, and recognize some popular vendors. The course will delve into the details of NGFW, including its deployment models, such as physical appliances, private cloud, and public cloud. It will also explore VPN protocols, including IPsec, OpenVPN, and Secure Socket Tunneling Protocol (SSTP). Additionally, the course will discuss ZTNA, its architecture, and use cases, including secure multi-cloud access and reduced third-party risk. By the end of the course, students will be able to explain what NGFW, VPN, and ZTNA are, understand their use cases, and recognize the benefits of implementing these technologies in a cloud-based environment.