hi sharma thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thank you very much sir.Your videos are really helpful to so many students.I kindly requesting you to place videos on Intrusion techniques,password protection, Intrusion detection,viruses and related threats
hi priyanka thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel. intrusion , viruses and all are theory concepts and it would be very easily understandable while reading the text book so i am planning to ignore those concepts but i will try to upload them and i am sure about that.
Sir every client web browser for example google chrome has it's certificate signed by trusted authority, because for server certificate we need to pay money for third party who is signing certificate so my question is we don't purchase certificate for web browser so how web browser's are identified in the network
Hi it's really awesome video but missing some information like how ciphers are checked and how public key and private key got exchanged and encrypted. This will be helpful if you add these stuff.
Hi Sir. First of all excellent work! I have a question about SSL stack protocol. The SSL Record Protocol is above TCP and under the Handshake Protocol. I know that the SSL Record Protocol is used to provide authentication and confidentiality for the application message. Now, my (stupid) question is: when the SSL Handshake Protocol to create the session is used? I mean, is the SSL Record Protocol used before or after the exchange of parameters for MAC and cipher suite is make?? Thanks :)
Sundeep Saradhi Kanthety I think you were wrong. The handshake protocol is used before any application data is transmitted. So first share the encryption suite with handshake and then use the record protocol to send the application data
Hi Sundeep its a very nice video. I have a one query here when client will send its hello first time the hello will be in plain text or encrypted ? these days automatcally http is redirected to HTTPS if i am talking to HTTP site it will be redirected to https automatically but client hello would be send on port 80 or 443 ? second question is when server will send its certificate with port num 443 and in this case client doesn't have the ssl certificate what will happen ?
Hi Sandeep , the exponentiation was nice here .. can you please upload videos on troubleshooting scenario that will help us to better understand ..Thanks is advance.
hi kunal sorry to say i cant upload more videos on Computer Graphics as many of them are theory related and almost the problematic concepts have been uploaded.
hi prasanna sure i will upload it in a couple of days. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
All the videos are very nice. And the whole syllabus is covered. Thank you for your efforts, sir. Videos are really helpful.
Very clear explanation tq sir
You are the best teacher for me
Very nice tutorial on SSL. Thanks for explaining in concise and clear manner and at the right speed. You have made it very easy to follow.
Nice...videoes sir
Easy to learn n remember
Very helpful
hi sharma
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
NICE SUPER EXCELLENT MOTIVATED
Very helpful and Nice Explanation
Congratulations sir.. Really love ur clear explanation
thank you sir you have helped me a lot, continue with your good heart may God bless you my teacher..🤣🤣🤣😇😇
Very informative and helpful 🙂
It help me alot for my interview
Thanks a lot..sir u have explained very well and u saved my time ...
Thanks Mr. Sundeep Sir
Excellent lecture...
Nuv devudayya 🙏🙏🙏🙏
thanks a lot for the detailed information ....
Sir,can u make a. Video on TLS as well
Thank you very much sir.Your videos are really helpful to so many students.I kindly requesting you to place videos on Intrusion techniques,password protection, Intrusion detection,viruses and related threats
hi priyanka
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
intrusion , viruses and all are theory concepts and it would be very easily understandable while reading the text book so i am planning to ignore those concepts but i will try to upload them and i am sure about that.
Sir every client web browser for example google chrome has it's certificate signed by trusted authority, because for server certificate we need to pay money for third party who is signing certificate so my question is we don't purchase certificate for web browser so how web browser's are identified in the network
Hi it's really awesome video but missing some information like how ciphers are checked and how public key and private key got exchanged and encrypted. This will be helpful if you add these stuff.
Thank you sir, your lecture has helped a lot.
Tq so much Sir.. Very helpful with complete concept..., 😍😍😍
thank you for helping me out sir u r amazing
Sir.. In hanshake protocol what info will be send in client hello and server hello?? Phase 1 as u explained?
Please confirm one doubt, in this video session ,the protocol sequence explained is at receiver end or sender side.
Hi Sir. First of all excellent work!
I have a question about SSL stack protocol.
The SSL Record Protocol is above TCP and under the Handshake Protocol. I know that the SSL Record Protocol is used to provide authentication and confidentiality for the application message.
Now, my (stupid) question is: when the SSL Handshake Protocol to create the session is used?
I mean, is the SSL Record Protocol used before or after the exchange of parameters for MAC and cipher suite is make??
Thanks :)
hi
SSL record protocol was first implemented and then all the other protocols will get implemented.
Sundeep Saradhi Kanthety I think you were wrong. The handshake protocol is used before any application data is transmitted.
So first share the encryption suite with handshake and then use the record protocol to send the application data
From Stalling’s book “CRYPTOGRAPHY and network security” 7ed. Pag 556 :)
sir thanks for excellent presentation
hi omer
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Hi Sundeep its a very nice video. I have a one query here when client will send its hello first time the hello will be in plain text or encrypted ? these days automatcally http is redirected to HTTPS if i am talking to HTTP site it will be redirected to https automatically but client hello would be send on port 80 or 443 ? second question is when server will send its certificate with port num 443 and in this case client doesn't have the ssl certificate what will happen ?
How many keys sent or receive. Can explain please. How it will exactly achieve CIA
Hi Sandeep , the exponentiation was nice here .. can you please upload videos on troubleshooting scenario that will help us to better understand ..Thanks is advance.
sir thanks for share your information. sir, could you please talk about share the key of in the SSL (Between Server & Client ) ???
Network security lectures are coming to end. Next post videos on operating systems sir. Iam eagerly waiting for them
hi Prasanna
sure you can expect the videos of Operating System after completion of Network Security.
Thanks for your interest towards our channel.
Sundeep Saradhi Thank you sir
sir can you teach us about whirlpool alg,X.509,diffehell-man alg,blowfish alg,RC-5 alg also know sir
hi tarun
i have already uploaded the diffehell-man algorithm and rest of them i will upload soon.
Sir plz make more videos on Computer Graphics....as soon if possible
hi kunal
sorry to say i cant upload more videos on Computer Graphics as many of them are theory related and almost the problematic concepts have been uploaded.
Sundeep Saradhi okay sir👍
thank you sir 💕
Thank you sir , your videos are really helpful .
Can u please post video's on VPN (Virtual Private Network) sir..
Thank you .
Sir please upload video on block cipher modes of operation
hi prasanna
sure i will upload it in a couple of days.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
Sundeep Saradhi thank you sir and sure I will do it
sir can u post lecture on x.509 certification ......??
Thanks sir
Heartbleed bug,Sweet32 attack,rc4 attack,poodle attack , drown attack could you make video on these
sir your missed S/MIME protocal pls explain as soon as posible
Thank u sir
Dear Sir
Please add video about wifi security.
Sir please provide notes whatever you teach
Who r watching this video in feb2021
Please provide the references for this notes
Thanks andi. Can you please explain the same concept by taking one real time example..some tools like Using wireshark
Sir first complete all topic of Computer Graphics and than move to other Sub plzz....
thank you sir