Virtual Private Networks
After reading this chapter and completing the exercises, you will be able to do the following:
Use a virtual private network (VPN).
Use Point-to-Point Tunneling Protocol (PPTP) as an encryption tool for VPNs.
Use Layer 2 Tunneling Protocol (L2TP) as an encryption tool for VPNs.
Add security and ...