📢 *Holiday & New Year Promotion* 👉 Practical TLS for only $55 _(originally $297)_ 💻 Use code *FROM2024TO2025* --> pracnet.net/tls 📅 Offer expires Jan 4
This really is a great overview that 'puts together' the full course. It's a great course, especially for those who appreciate visual aids for comprehension and 'putting the pieces together'.
Watched all this playlist, incredibly useful lessons. Information is straightforward and very easy to understand even for those who haven't had any experience with encryption algos (like me). Highly recommended for any IT folks.
You're very welcome =). Could you do me a favor? Do you mind sharing this video on Linked In, Reddit, Twitter, Facebook, or any other social media you use? As an independent creator, that would be an _enormous_ help, and I would appreciate it _greatly_ .
A really great explanation of how all things work out in TLS. Thanks for making easily understandable diagrams, explanations. These concepts weren't clear well to me during engineering, and always used to scare the shit out of me. I believe these concepts will help me to atleast read few articles now independently to use these concepts in my work. Thanks again !
@@PracticalNetworking Definitely did enjoy it. I finished half the course in a day. Remaining half is for the next day. So much knowledge in the series. Sincere thanks for this.
This is the one which is connecting all the dots. Awesome. 1) In reality do we use 2 different symmetric keys? Just one symmetric key can do both encryption & hashing, right? 2) Do they negotiate which algorithms to use for encryption & hashing during SSL handshake?
A key is just a string of bits. Yes, you could absolutely use the same key (string of bits) to do both encryption & hashing. But it costs nearly nothing to generate more bits from a starting secret, and makes it twice as hard to brute force if you use two keys, so often the keys are used for only one purpose. In reality, 4 keys are generated, so you have different keys for encryption and hashing, *in each direction*. More details in the full TLS course =). Also, you might enjoy the DH section of this article if you want to learn more: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
Hello. Great video and great way of explaining this concept. I have question, am i right if i say that https request for web page is sent after client and server establish session keys?
Trying to buy the TLS course. I am from India. The payment is getting declined using VISA Credit / Debit cards. And paypal payment is kind of getting stuck. Can you please help me get this Cyber Monday sale?
@@PracticalNetworking Never mind, Ed. I tried using a different card and it worked. I had sent you an email before that - please ignore. Looking forward to the course. Please keep up the great work.
📢 *Holiday & New Year Promotion*
👉 Practical TLS for only $55 _(originally $297)_
💻 Use code *FROM2024TO2025* --> pracnet.net/tls
📅 Offer expires Jan 4
How do I translate it
This really is a great overview that 'puts together' the full course. It's a great course, especially for those who appreciate visual aids for comprehension and 'putting the pieces together'.
Thank you, Scott =).
the best explanation I have come across by far - thank you!
Probably the best explanation of digital certificate mechanism. Thank you
Wow.. what a series you have created.. End to end overview with simple explanation. Hats off to you Ed! Great work. Thanks for these videos.
If you enjoyed this, you'll enjoy the full Practical TLS course too! =)
Best practical explantation I've seen and I viewed a lot of videos before this and had to exit them, thank you!
Glad you enjoyed this, Tom. I'd be willing to bet you'd enjoy the full course as well. =)
Watched all this playlist, incredibly useful lessons. Information is straightforward and very easy to understand even for those who haven't had any experience with encryption algos (like me). Highly recommended for any IT folks.
Glad you enjoyed this, Ray. =)
Best explanation ever! This is brief, clear, thorough and easy to follow and understand. Thanks for sharing!
You're very welcome =).
Could you do me a favor? Do you mind sharing this video on Linked In, Reddit, Twitter, Facebook, or any other social media you use? As an independent creator, that would be an _enormous_ help, and I would appreciate it _greatly_ .
A really great explanation of how all things work out in TLS. Thanks for making easily understandable diagrams, explanations. These concepts weren't clear well to me during engineering, and always used to scare the shit out of me. I believe these concepts will help me to atleast read few articles now independently to use these concepts in my work. Thanks again !
This is the best explanation I have ever seen
This is perfect. You make it look easy. I am always impressed. Thank you.
You're welcome, Azza =)
Excellent explanation video! Studying for the Sec+ and this helped alot thank you.
The entire series is very informative. Exactly all that I wanted to learn.
Glad you enjoyed it =). I'd be willing to bet you'd enjoy the full TLS course as well. =)
@@PracticalNetworking Definitely did enjoy it. I finished half the course in a day. Remaining half is for the next day. So much knowledge in the series.
Sincere thanks for this.
@@master_zenrade Wohoo! Keep up the good work =)
謝謝!
You're very welcome! Thank you for supporting the channel!
Enjoyed the series!! Excited to help in the industry soon!!
WOW. I didn't know that all that happens when A server is accessed. Thanks a lot.
Indeed! And even this was a simplification, so much more actually happens on the wire =).
This is brilliant! Thanks a ton for the explanation
This is the one which is connecting all the dots. Awesome.
1) In reality do we use 2 different symmetric keys? Just one symmetric key can do both encryption & hashing, right?
2) Do they negotiate which algorithms to use for encryption & hashing during SSL handshake?
A key is just a string of bits. Yes, you could absolutely use the same key (string of bits) to do both encryption & hashing. But it costs nearly nothing to generate more bits from a starting secret, and makes it twice as hard to brute force if you use two keys, so often the keys are used for only one purpose.
In reality, 4 keys are generated, so you have different keys for encryption and hashing, *in each direction*.
More details in the full TLS course =). Also, you might enjoy the DH section of this article if you want to learn more: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
@@PracticalNetworking Got it. Thanks for sharing more info.
Thank you! This is really intuitive and informative!
Glad it was helpful!
Thanks for all this great content.
You simplified all crypto/pki concept I’ve been struggling with.
Would love to see videos on EC, ECDHE, etc ..
Thank you very much for this.
Amazing explanation, thank you so much!
Amazing efforts, thank you!
You're welcome!
Straight to jargon and presumption
Thank you for the video sir 🙏
You're welcome, Arun!
Hello. Great video and great way of explaining this concept. I have question, am i right if i say that https request for web page is sent after client and server establish session keys?
Correct. The HTTP* request is sent *within* the SSL/TLS tunnel, and therefore after the session keys have been established by SSL/TLS.
@@PracticalNetworking Thank you sir for answer
@@mirzadzafic8999 You're welcome.
@@mirzadzafic8999 PS, more details on "HTTP conversation" within SSL Tunnel in this video: th-cam.com/video/E5bSumTAHZE/w-d-xo.html
Thank you sir for this video
You're welcome, Ayrad!
are the keys generated via RSA? is signing via RSA?
The asymmetric keys can be generated with RSA, yes. Although, more recently that is beginning to fall out of favor .
@@PracticalNetworking so when we say signing we always refer to actual data encryption with symmetric keys?
Trying to buy the TLS course. I am from India. The payment is getting declined using VISA Credit / Debit cards. And paypal payment is kind of getting stuck. Can you please help me get this Cyber Monday sale?
Reach out to me on Discord or by e-mail (use the contact form on my blog). We'll make sure you're sorted. =)
pracnet.net/discord
@@PracticalNetworking Never mind, Ed. I tried using a different card and it worked. I had sent you an email before that - please ignore. Looking forward to the course. Please keep up the great work.
insane thanks for this.
You're very welcome.
Awesome!
4:51
👍👍👍
Jones Brian Williams Ruth Garcia William
Williams Shirley Brown Donald Gonzalez Richard