Understanding IPsec in Cybersecurity ๐
Learn about IPsec with Keith Barker on CBT Nuggets, covering its features and differences in cybersecurity.

CBT Nuggets
133.2K views โข Feb 17, 2021

About this video
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, Keith Barker covers IPsec, specifically comparing and contrasting it to transport layer security. This clip serves as a brief introduction to the concept and basic tenets of IPsec, which is divided into two approaches: IKEv1 and IKEv2. These are too complex to explore in this video, but Keith tells you where you can find more information.
IPsec has two primary goals: privacy, which is achieved via encryption, and data integrity, which is generally secured through some kind of hashing algorithm. This is most often used when youโre operating across an untrusted network.
Keith will explain the theory behind IPsec and the basic process it uses to securely tunnel across the internet. Within the world of IPsec, there are two camps: IKEv1 and IKEv2 (IKE stands for Internet Key Exchange).
IKEv1 is older, simpler, and more restricted when it comes to the vendors that can fully access it. IKEv2 is much more complicated, but it is also significantly more flexible concerning which vendors it can interface with. Keith introduces his video series on each of these and outlines what youโll learn in detail.
๐ Download the Free Ultimate Security Cert Guide: https://blog.cbt.gg/1mvp
โฌ๏ธ 15-Week Study Plan: CCNP Security Core (350-701 SCOR): https://blog.cbt.gg/o7ex
Start learning with CBT Nuggets:
โข Cyber Security White Hat Hacking v10 | https://courses.cbt.gg/9kz
โข Information Security | https://courses.cbt.gg/463
In this video, Keith Barker covers IPsec, specifically comparing and contrasting it to transport layer security. This clip serves as a brief introduction to the concept and basic tenets of IPsec, which is divided into two approaches: IKEv1 and IKEv2. These are too complex to explore in this video, but Keith tells you where you can find more information.
IPsec has two primary goals: privacy, which is achieved via encryption, and data integrity, which is generally secured through some kind of hashing algorithm. This is most often used when youโre operating across an untrusted network.
Keith will explain the theory behind IPsec and the basic process it uses to securely tunnel across the internet. Within the world of IPsec, there are two camps: IKEv1 and IKEv2 (IKE stands for Internet Key Exchange).
IKEv1 is older, simpler, and more restricted when it comes to the vendors that can fully access it. IKEv2 is much more complicated, but it is also significantly more flexible concerning which vendors it can interface with. Keith introduces his video series on each of these and outlines what youโll learn in detail.
๐ Download the Free Ultimate Security Cert Guide: https://blog.cbt.gg/1mvp
โฌ๏ธ 15-Week Study Plan: CCNP Security Core (350-701 SCOR): https://blog.cbt.gg/o7ex
Start learning with CBT Nuggets:
โข Cyber Security White Hat Hacking v10 | https://courses.cbt.gg/9kz
โข Information Security | https://courses.cbt.gg/463
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
133.2K
Likes
2.0K
Duration
3:02
Published
Feb 17, 2021
User Reviews
4.7
(26)