VPNs and Secure Network Protocols
- Description
- Curriculum
- Reviews
This course introduces VPNs and the secure network protocols that enable confidential, authenticated, and trustworthy communication over untrusted networks. Learners will understand how VPNs are deployed in common topologies and how IPsec uses protocols such as AH/ESP together with IKE to establish secure tunnels. The course also explains how TLS and HTTPS protect data in transit, how PKI and certificate chains create trust, and how identity protocols (SSO, OAuth/OIDC, Kerberos) support secure access to services. Finally, it explores privacy and secure communication technologies such as Tor and PGP, highlighting key benefits, limitations, and real-world security considerations. The course is designed to be self-sustainable and is assessed through quizzes at the end of each module.