Virtual Private Networks thumbnail
slide-image
Pause
Mute
Subtitles not available
Playback speed
0.25
0.5
0.75
1
1.25
1.5
1.75
2
Full screen

Virtual Private Networks

Published on Sep 13, 202151 Views

Chapter list

VPN - Virtual Private Networks00:00
VPN basics00:17
What is VPN?00:20
Access to remote networks or devices00:52
Hiding real IP address01:16
Protection from hacker’s snooping02:21
Protection from government snooping03:30
Protection from blocking05:17
Protection from government cenzorship05:48
Additional services - 107:17
Additional services - 207:30
Hidden services08:53
Example: hidden NAS server09:52
Private bridges to distant networks13:46
Connection notifications15:29
Intrusion detection18:24
Blocking unwanted domains19:47
Security22:02
Why your own infrastructure? - 122:07
Why your own infrastructure? - 224:24
Why your own infrastructure? - 326:11
Why your own infrastructure? - 427:24
Why your own infrastructure? - 528:35
Why your own infrastructure? - 630:13
Full disk encryption32:57
Remote management console access34:13
Zero trust policy for access36:05
VPN server - 137:27
VPN server - 238:22
Endpoint device security42:38
Network traffic obfuscation45:22
Traffic obfuscation45:29
Port sharing - 146:24
Port sharing - 248:14
TCP over DNS (Iodine)50:22
VPN over websocket51:46
WSVPN (Websocket VPN) - 152:27
WSVPN (Websocket VPN) - 253:49
WSVPN device - 154:18
WSVPN device - 255:23
WSVPN – testing in China56:26
WSVPN – testing in Uzbekistan and Moscow58:04
Netflow data analysis - 201:02:19
Netflow data analysis - 301:03:33
Netflow data analysis - 401:04:02
Netflow data analysis - 101:06:46
Network polluting01:07:10
P2P VPN01:09:34
Questions?01:14:04