Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Fundamentals of VPN Sovereignty
- Reasons why commercial VPNs log metadata and comply with legal requests.
- OpenVPN: a mature, feature-rich protocol with TAP/TUN flexibility.
- WireGuard: a modern, minimalist, high-performance cryptographic solution.
- Selecting the appropriate protocol for your specific threat model.
OpenVPN Deployment
- Installing OpenVPN alongside Easy-RSA PKI.
- Server configuration: ciphers, HMAC, TLS-auth, and topology.
- Generating and distributing client configurations.
- Managing revocation and Certificate Revocation Lists (CRL).
WireGuard Deployment
- Installing the kernel module and WireGuard-tools.
- Generating keys and configuring peers.
- Managing wg-quick and systemd units.
- Implementing road warrior and site-to-site mesh topologies.
Authentication and Authorization
- Certificate-based authentication with OpenVPN.
- Integrating LDAP and RADIUS backends.
- Enabling two-factor authentication via TOTP plugins.
- Configuring access control lists and per-user IP allocation.
Routing and Network Design
- Differentiating between full tunnel and split tunnel routing.
- Configuring pushed routes, DNS, and WINS.
- Applying NAT and masquerading for egress traffic.
- Implementing multi-WAN and policy-based routing.
Performance and Scaling
- Comparing throughput benchmarks between WireGuard and OpenVPN.
- Optimizing for multi-core processors and kernel bypass techniques.
- Load balancing across multiple VPN servers.
- Implementing DDoS protection and connection rate limiting.
Monitoring and Maintenance
- Tracking connection logs and bandwidth accounting.
- Integrating Syslog and Prometheus exporters.
- Automating certificate renewal and setting up expiration alerts.
- Establishing disaster recovery plans and configuration backups.
Requirements
- Intermediate knowledge of Linux networking and firewall administration.
- Understanding of PKI, certificates, and encryption protocols.
- Familiarity with routing, NAT, and IP forwarding.
Target Audience
- Network administrators looking to replace commercial VPN services.
- Remote work teams requiring secure, sovereign access.
- Organizations located in regions with VPN restrictions or surveillance.
14 Hours
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer