Terms you'll need to understand:
Virtual private network (VPN)
Tunnel
Transport
Encryption
Decryption
Data Encryption Standard (DES)
Triple DES (3DES)
Cipher block chaining (CBC)
Initialization value (IV)
Hashing
Hashed Message Authentication Codes Message Digest 5 (HMAC-MD5)
HMAC Secure Hash Algorithm 1 (HMAC-SHA-1)
Key management
Certificate authority (CA)
Cryptosystem
Diffie-Hellman (D-H)
Rivest, Shamir, and Adleman (RSA) digital signatures
RSA nonces
IP Security (IPSec)
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Internet Key Exchange (IKE)
Internet Security Association and Key Management Protocol (ISAKMP)
Security association (SA)
Transform sets
Techniques you'll need to master:
Defining VPN and listing its advantages
Describing tunneling and encryption
Identifying different VPN scenarios and solutions
Describing the components in cryptography
Describing the five steps of IPSec
Defining AH and ESP
Describing how IKE works
Describing how an SA is built and used
Preparing for IKE and IPSec
Configuring IKE
Configuring IPSec
Testing and verifying IPSec