In this chapter, you will learn about
• Telecommunications methods used to access the Internet
• Securing the Voice over Internet Protocol (VoIP) with the Secure Real-time Transport Protocol (SRTP)
• Packet filtering, stateful, and application firewalls
• Defense diversity with firewalls
• The differences between network-based and host-based firewalls
• Risks and vulnerabilities related to remote access solutions
• Different tunneling protocols used with remote access
• Authentication methods used with remote access
• Network access control
18.118.23.147