How SSL & TLS use Cryptographic tools to secure your data - Practical TLS

แชร์
ฝัง
  • เผยแพร่เมื่อ 18 ม.ค. 2025

ความคิดเห็น • 82

  • @PracticalNetworking
    @PracticalNetworking  3 ปีที่แล้ว +6

    📢 *Holiday & New Year Promotion*
    👉 Practical TLS for only $55 _(originally $297)_
    💻 Use code *FROM2024TO2025* --> pracnet.net/tls
    📅 Offer expires Jan 4

  • @admin7541
    @admin7541 3 ปีที่แล้ว +24

    I am not an IT professional of any sort. I like learning new things. TH-cam has opened a world of knowledge to anyone. People like you lead the way to that end. I found your videos to be the best in your field. They are truly the easiest to understand both by the way you explain and the video graphics. I think your true calling is to be a teacher because you are a natural. I am from a country were teachers are highly respected. Unfortunately this not the case everywhere. I appreciate all your hard work.

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว +3

      Thanks for the kind words, Admin. Messages like this are a great encouragement to continue producing videos. I hope I can continue to contribute to the knowledge of world.
      Again, thank you.

  • @adedejiemmanuel1
    @adedejiemmanuel1 3 ปีที่แล้ว +5

    Honestly, you're still the best at this. I enjoy the enlightenment you bring. You're gifted. Thank you.

  • @adedejiemmanuel1
    @adedejiemmanuel1 3 ปีที่แล้ว +1

    I'm here again. I'm never gonna miss any of your videos. You're my best option.

  • @SaurabhKumar-zn1lz
    @SaurabhKumar-zn1lz 3 ปีที่แล้ว +2

    Just wanted to say a big thank you for these helpful videos

  • @reyparcon1333
    @reyparcon1333 3 ปีที่แล้ว +16

    Thank you for this amazing series! Now that you're done with the concept, hope you could also include real life examples on how this works (e.g. Inspection of Certificates, observing records on Wireshark, etc.) Anyway, keep it up dude! Love how you discuss these things.

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว +4

      Not done yet =). In the upcoming weeks I'm releasing videos on RSA, DH, and DSA.
      All that other stuff (certificates, records, wireshark, etc...) is covered in the full TLS course:
      classes.pracnet.net/courses/practical-tls

  • @Reem.alhamimi
    @Reem.alhamimi 2 หลายเดือนก่อน

    WOW WOW WOW from 2024 !!!!!!!!!! Thanks alot for this amazing playlist!!!!!!

  • @geraldtheblack
    @geraldtheblack 3 ปีที่แล้ว +1

    I have watch many of this series videos and plan to share them as part of my training library. Thanks for the amazing work

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      You're welcome, Gerald. I'm glad you enjoyed this series. Thank you for your support in sharing this content =)

  • @ajayb9392
    @ajayb9392 3 ปีที่แล้ว +4

    Awesome bro. Very good explanation. As always, only you can explain things in simple words. Thanks again for making these contents free.

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว

      Glad you enjoyed it, Ajay =). Thanks for the kind words.

  • @cyberghost_01
    @cyberghost_01 ปีที่แล้ว +1

    We need a cyberSecurity course by you!!! You are so great! Linux, networking, cryptogtaphy. If you can teach us this topics will be a great thing!

  • @NikhilxKumar
    @NikhilxKumar 6 หลายเดือนก่อน

    This video was amazing. The way you explain is so good.
    I'm planning to watch the entire playlist of SSL and TLS deep dive.

  • @iheartddead
    @iheartddead 3 ปีที่แล้ว +1

    Thank you for your videos and articles. They really helped me finally understand how things work and I got a dream job. Thank you!

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว

      Wohoo! Congrats! What is the job? That's awesome you got your dream job!

  • @mertcancam
    @mertcancam 3 ปีที่แล้ว +1

    Yet another wonderful session.. Thanks!

  • @vishalrugle538
    @vishalrugle538 3 ปีที่แล้ว +1

    As usual, through and complete explanation, looking for DNS, F5, Multicast, BGP, and Security related Advance stuff from you in coming days. Thanks a lot, Ed.

  • @paolonervi2208
    @paolonervi2208 3 ปีที่แล้ว +1

    Thank you again for dedicating the most important thing we have (our time) in making really well made videos.Your videos are the most technical i've seen.greetings from a TLC engineer..best regards.Paolo.

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว

      You're very welcome, Paolo. Thank you for the kind words =). Cheers!

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว

      Congrats, Paolo, You won the free course giveaway. Message me on Discord to claim your prize: pracnet.net/discord

    • @paolonervi2208
      @paolonervi2208 3 ปีที่แล้ว

      @@PracticalNetworking Thanks for the course! (More fortinet)... greetings from Paolo.

  • @peterchmelar8886
    @peterchmelar8886 3 ปีที่แล้ว +1

    Awesome, thank you for the regular uploads Ed :)

  • @samarthtandale9121
    @samarthtandale9121 ปีที่แล้ว

    Amazing 🤩 now it completes the full picture !

  • @upelister
    @upelister 2 ปีที่แล้ว +1

    Thank you very informative lesson.😃

  • @murattasova7598
    @murattasova7598 หลายเดือนก่อน

    Sure I enjoyed the lesson. Thanks

  • @AlexG-bc7ji
    @AlexG-bc7ji 3 ปีที่แล้ว +1

    new PN video is a great thing to wake up to!

  • @MohamedAhmed-vw5bc
    @MohamedAhmed-vw5bc 3 ปีที่แล้ว +1

    so Informational, keep the good work bro.
    you are the best.

  • @alexl2512
    @alexl2512 ปีที่แล้ว

    Amazingly clear.

  • @fortuneosadolor438
    @fortuneosadolor438 3 ปีที่แล้ว +2

    I need this course in me life

  • @CPT_Pepper
    @CPT_Pepper ปีที่แล้ว

    🎉🎉🎉wonderful training vid😊

  • @IliyaDamyanov
    @IliyaDamyanov ปีที่แล้ว

    Amazing series.

  • @satishvelluru
    @satishvelluru 3 ปีที่แล้ว +1

    Nice presentation .. which tools used for your presentaion ?

  • @BitsnBytes8
    @BitsnBytes8 ปีที่แล้ว

    Thank you so much for making this series. You have presented information extremely well and I have been able to follow your tutorials completely. One quick question - At 5:37 of this video titled "How SSL & TLS use Cryptographic tools to secure your data - Practical TLS", you mention that the Certificate is signed by CA and it provides authentication. Should it be authentication + integrity? From the previous lesson on Signatures, I understood that signatures provide authentication and integrity.

  • @renujain8911
    @renujain8911 ปีที่แล้ว

    Cool... Have been following this series from last 3 days & still wondering why it is not having more views .... 🙂

  • @nimaforoughi3008
    @nimaforoughi3008 2 ปีที่แล้ว

    Amazing as always

  • @nsanandkumarak
    @nsanandkumarak 2 ปีที่แล้ว +1

    Thanks for the video, can you please provide me link for the video regarding the MAC (Msg Auth Code)

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      Sure... here --> th-cam.com/video/doN3lzzNEIM/w-d-xo.html
      (edited, typo)

  • @jded1346
    @jded1346 ปีที่แล้ว +3

    When Asymmetric Encryption is used to perform secret key exchange, it requires 4 keys - 2 for the server (1public+1private), 2 for the client(1public+1private). This illustration shows only the server side of the asymmetric key pair. Who generates the corresponding pair for the client and how?

    • @kungfumaster298
      @kungfumaster298 ปีที่แล้ว

      From what I understand, the Client just uses the Public Key of the Server to encrypt the Symmetric Key, so that the Server gets a copy of the symmetric key. Not sure why it needs the key pair from the client, since it already has a copy of the symmetric key.

  • @fortuneosadolor438
    @fortuneosadolor438 3 ปีที่แล้ว +2

    do some of these topics also apply to SSH? like how SSH and TLS use asymmetric encryption

  • @thethaovatoquoc312
    @thethaovatoquoc312 4 หลายเดือนก่อน +1

    Why did the picture of symmetric key show 2 keys instead of 1? Is it supposed to be only 1 key for symmetric key?

    • @PracticalNetworking
      @PracticalNetworking  4 หลายเดือนก่อน

      One symmetric key for encryption, another symmetric key for MAC

  • @Don-Carillo
    @Don-Carillo 3 ปีที่แล้ว +1

    👏 thanks 😊.

  • @rahul78933
    @rahul78933 2 ปีที่แล้ว +1

    Great explanation, what if MITM occur during sharing of Secret key and attacker replace the secret key with his and encrypt it with server public key and send it to server . What will be the mitigation in this scenario

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      Great question, Rahul! You should consider the course, I have a feeling you would love it =).
      To answer your question.. in such a case, remember the Client is still going to be using the value they generated and sent to the server (which was interrupted by the MITM). So even if the MITM and the Server end up with identical session keys, it _will not_ be the Session Key used by the Client -- therefore, there is no possibility of compromising data. It's as if the MITM has it's own, independent, SSL connection with the Server.

  • @TCinT
    @TCinT 3 ปีที่แล้ว +1

    You have a new subscriber :)

  • @mr.highprofessional3828
    @mr.highprofessional3828 ปีที่แล้ว

    Isn't hashing also used for signatures as well?

  • @faizannajeeb9614
    @faizannajeeb9614 3 ปีที่แล้ว +1

    I need this course because I am intended to use this topic for final year project

  • @yotu9670
    @yotu9670 8 หลายเดือนก่อน

    Thaaaaaanks a lot. Your vid’s are Greta!
    Have a question:
    Why does a client trust a ca? Or how can a client make sure the certificate that a server provides which is signed with the private key of a ca is actually trustworthy and belongs to the server?

  • @stevenkim6869
    @stevenkim6869 หลายเดือนก่อน

    how do you 'combine' hashing with encryption? if you're sending the MAC over the internet, aren't you defeating the purpose of encryption, given that the message is sent unencrypted with the digest embedded in it?

  • @arifsiddiqui941
    @arifsiddiqui941 2 ปีที่แล้ว +1

    Please share all TLS/ SSL videos in sequence to understand better. Thanks

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว +1

      Here are all the SSL Videos: th-cam.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html

  • @qwinejude1462
    @qwinejude1462 ปีที่แล้ว

    Please I need a link for cybersecurity and cryptography

  • @adryelgainza1686
    @adryelgainza1686 2 ปีที่แล้ว

    Hey I have a couple questions. If my wording is not the best please ask for clarification lol.
    1. I notice the host does not have a pub/priv key pair. Is this just to simplify the demonstration? If not, then how would asymmetric key encryption work?
    2. MAC and CA work together by using the certified public key to encrypt the hash. If the host can unencrypt the sent hash with the public key, and then calculate the hash of the message, it ends up proving the integrity and the authentication. Now my question is; what if it is client-client communication? Will they instead resort to signing messages, or will they generate some kind of their own certificate.
    Thanks a bunch man you are really the G.O.A.T. I will be looking into your course for sure if i can scrap up the money. (Broke 16 year old moment)

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      1. Correct, typically only the server has a Public/Private Key pair
      1a. The exception is if DH is used as a key exchange, in which case both client and server have "public key and private key" (but they aren't used for encryption.... more details in the link below).
      2. You're confusing Signatures and MAC.... Signatures use _Asymmetric Keys_ ... MAC uses _Symmetric_ keys.
      To learn more about Asymmetric Crypto: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/

  • @pretbadha
    @pretbadha ปีที่แล้ว +2

    Brother in CIA A is not authN nor authZ, rather availability (read highAvailability) but I'm sure you already know that and here your A is the AuthN part only... keep up the great work that you are doing

    • @dmfh5646
      @dmfh5646 10 หลายเดือนก่อน +2

      You're thinking of the CIA triad for cybersecurity. This video is not talking about that. It's focusing on what TLS provides.

  • @asikhscreations2132
    @asikhscreations2132 2 ปีที่แล้ว

    System has effected by ransomware QQLC so how can I solve this

  • @PracticalNetworking
    @PracticalNetworking  3 ปีที่แล้ว +1

    🥳🥳- Promotion Ended - Congrats @Paolo Nervi 🥳🥳
    For the rest of you, you can use this discount code for $100 off the course: YT100
    classes.pracnet.net/courses/practical-tls
    Subscribe + Notification bell to increase your odds of winning when the next video (and giveaway) releases!
    📢📢 Practical TLS - Course Giveaway 📢📢
    I'll be picking a random person from all the comments in the next 7 days on this video to give a scholarship for free access to the full Practical TLS course.
    All you have to do is make a post to enter. Check back in a week to see if you won. =)

    • @calebchapman9119
      @calebchapman9119 3 ปีที่แล้ว +1

      I really enjoy all of your content
      I am able to learn without brain fog
      I would love if you could teach me all about CISSP I'm sure I would pass with flying colors if you teach it. Thanks

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว

      @@calebchapman9119 Hi Caleb, Glad you are able to learn from my content =).
      The CISSP is a monster of a cert =). Good luck! It's unfortunately not a Cert I hold or would be comfortable trying to train (it's too much memorization for my taste).

  • @imacomputerbuddie
    @imacomputerbuddie 2 ปีที่แล้ว +1

    Expanded stuff I use all the tije

  • @rafay1708
    @rafay1708 3 ปีที่แล้ว +4

    Hi Sir, I will always remain indebted to you. Thanks for going that extra mile to make this day a success with such a useful video. Thanks Waiting for next one 👍✌

    • @PracticalNetworking
      @PracticalNetworking  3 ปีที่แล้ว

      Thanks for the kind words, Rafay =). Glad you're enjoying this series!