SIMOS 1.0: Fundamentals of VPN Technologies and Cryptography

This course is included in our On-demand training solution.


VPNs form the basis of secure communication across a shared or public infrastructure. In this course, you’ll about the basics of VPNs and the cryptographic systems that underpin them. This course is one of a series in the SkillSoft learning path that prepares the learner for Cisco certification exam 300-209 SIMOS. This exam counts toward CCNP Security certification.

Target Audience

Network security engineers and learners preparing for Cisco CCNP Security certification



Expected Duration

90 min.

Course Objectives

Course Introduction

VPN Definition

  • define virtual private networks in the enterprise network
  • Key Threats to WANs and Remote Access (Part 1)

  • describe script-based and man-in-the-middle attacks on WAN and remote access infrastructure
  • Key Threats to WANs and Remote Access (Part 2)

  • describe masquerading attacks on WAN and remote access infrastructure
  • Cisco Modular Network Architecture and VPNs

  • describe how VPNs fit into the Cisco modular network architecture
  • VPN Types

  • describe clientless and Client-based AnyConnect VPNs
  • VPN Components

  • list the components of a VPN
  • Secure Communication and Cryptographic Services

  • describe cryptography in the context of secure communications
  • Cryptographic Algorithms

  • describe symmetric and asymmetric key cryptographic systems
  • Confidentiality Using Cryptographic Controls

  • describe how encryption protocols provide confidentiality in communication systems
  • Integrity Using Cryptographic Controls

  • describe how key hashed-message authentication code is used to ensure message integrity
  • Authentication Using Cryptographic Controls

  • describe challenge response authentication with hash message authentication code
  • Nonrepudiation Using Cryptographic Controls

  • describe how PKI and revocation provide nonrepudiation in cryptographic systems
  • Keys in Cryptography

  • describe keys and key exchange algorithms in cryptographic systems
  • Public Key Infrastructure (Part 1)

  • describe how digital certificates are used in public key infrastructure to secure communications
  • Public Key Infrastructure (Part 2)

  • describe revocation mechanisms in public key infrastructure
  • Next-Generation Encryption

  • list next-generation encryption mechanisms
  • Dependencies in Cryptographic Services

  • match security levels in security policies on communication end points
  • Exercise: Using VPNs and Cryptography Features