After reading this chapter and completing the exercises, you will be able to do the following:
Use a virtual private network (VPN).
Use point-to-point tunneling protocol (PPTP) as an encryption tool for VPNs.
Use layer 2 tunneling protocol (L2TP) as an encryption tool for VPNs.
Add security ...