VPN Usage & Safety
Configure and use your VPN without leaving gaps.
What Is VPN Usage & Safety?
A VPN encrypts your internet traffic between your device and your company's network, but only when it is configured and used correctly. In this exercise, you connect to a coffee shop Wi-Fi and attempt to access corporate resources while your VPN silently disconnects mid-session. You will work through the real consequences of that dropped connection: exposed login credentials, unencrypted file transfers, and session data leaking across a public network. The simulation then walks you through split tunneling, where some traffic bypasses the VPN entirely, and shows you exactly which applications were sending data in the clear. You will also encounter a fake VPN app on a third-party download site and decide whether to trust it. By the end, you will know how to verify your connection status, recognize when a VPN has failed, and avoid the common shortcuts that remote workers take when the VPN feels slow or inconvenient.
What You'll Learn in VPN Usage & Safety
- Verify that a VPN connection is active before accessing corporate systems on untrusted networks
- Identify the risks of split tunneling and understand which traffic it leaves unprotected
- Recognize the warning signs of a dropped or degraded VPN connection during a work session
- Distinguish legitimate corporate VPN software from fake or malicious VPN applications
- Apply correct reconnection procedures when a VPN disconnects unexpectedly on public Wi-Fi
VPN Usage & Safety — Training Steps
-
Working from Home
It's Monday morning. Today you need to access the company's internal analytics dashboard to review some confidential client reports.
-
Accessing Company Resources
Alice opens her browser and navigates to the company's internal portal to access the analytics dashboard.
-
Access Blocked
Instead of a login page, the portal displays a 'VPN Required' error. The company's internal resources are protected and can only be accessed through a secure VPN connection. Without an active VPN, the portal won't even show the login form - access is completely blocked from outside the corporate network.
-
Email from IT
Alice checks her email and finds a message from IT Security with instructions on using the corporate VPN.
-
Understanding VPN
A VPN (Virtual Private Network) creates an encrypted tunnel between your computer and the company's network. This protects your data from interception and ensures secure access to internal resources. Without a VPN, your internet traffic travels unprotected, making it vulnerable to eavesdropping - especially on home networks that may not be as secure as corporate infrastructure.
-
Opening the VPN Client
Alice opens the corporate VPN application to establish a secure connection.
-
Configuring the VPN
Before connecting, Alice needs to configure the VPN with her corporate credentials. The VPN client requires a server address, username, password, and a digital certificate to establish a secure connection. The certificate is a digital file provided by IT that verifies Alice's identity to the VPN server. It works like an electronic ID badge - even if someone steals her password, they cannot connect without this certificate installed on her device.
-
VPN Connected
The VPN is now connected. Notice the changes: The status shows 'CONNECTED' in green 'Your IP: Protected' indicates encrypted traffic Connection time and data usage are being tracked The AES-256 encryption badge confirms strong security Alice can now safely access internal company resources.
-
VPN Protected Browsing
Alice navigates back to the internal portal. This time, the page loads with a VPN shield icon visible in the browser's address bar - confirming that all traffic to this site is routed through the encrypted VPN tunnel.
-
Logging In to the Portal
With the VPN connected and the secure tunnel confirmed, the login form is now visible. Alice can safely enter her credentials.