Certificates - CompTIA Security+ SY0-701 - 1.4

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 ม.ค. 2025

ความคิดเห็น • 21

  • @ghostofahorseunderthechandlier
    @ghostofahorseunderthechandlier 7 หลายเดือนก่อน +73

    whew , first domain done . the past 18 videos essentially (and more efficiently) covered everything i learned in 2-3 years of my cybersecurity community college course lol

    • @tboxcupcakes
      @tboxcupcakes 5 หลายเดือนก่อน +11

      yeah i did a "boot camp" and this is teaching me more than the boot camp did. Don't get me wrong, still a good course but prof messer goes into depth more

  • @CyOfficial0x
    @CyOfficial0x 4 หลายเดือนก่อน +36

    I feel proud of myself because I completed the first domain of SY0-701. I'll rewatch the first domain to strengthen my understanding of the basics.

    • @Richard-r7u6c
      @Richard-r7u6c 2 หลายเดือนก่อน +5

      No rush, take your time. Go through the content as slow as you need and write down solid notes after you've grasped what is being taught.

  • @yourownbox
    @yourownbox 8 หลายเดือนก่อน +69

    TH-cam, owned by Google (Alphabet), is its own Certificate Authority. They sign their own certificates, which is interesting. They are basically saying you can trust this website because we say so and there is no need to ask anyone else.

    • @ivmonday
      @ivmonday 6 หลายเดือนก่อน +22

      Don't see anything wrong with it, it leverages reputation as a form of trust.

    • @Exinthevatica-rq6vs
      @Exinthevatica-rq6vs 5 หลายเดือนก่อน +6

      Monopoly.

    • @eeka_droid
      @eeka_droid หลายเดือนก่อน +3

      Yes, it can happen in some cases and it's known as the "trust me bro" certification protocol

  • @SuperNotaku
    @SuperNotaku 6 หลายเดือนก่อน +10

    Learning alot on each video. I have to take my time and replay some of these cause how condense the terms are and what they do.

  • @maximilianoponce5388
    @maximilianoponce5388 11 หลายเดือนก่อน +8

    Thank you Professor Messer

  • @famaragueye5580
    @famaragueye5580 ปีที่แล้ว +13

    Thanks Professor

  • @gbemifola9980
    @gbemifola9980 7 หลายเดือนก่อน

    Thank you Prof Messer. You're such a great teacher.

  • @vstrxl
    @vstrxl 9 หลายเดือนก่อน

    Thank you so much for these videos, Professor Messer!

  • @MywesternfatherAsianfath-pj4wq
    @MywesternfatherAsianfath-pj4wq 9 หลายเดือนก่อน +1

    Thank you very much Professor Messer

  • @BenedictTurton
    @BenedictTurton 9 หลายเดือนก่อน +4

    awesome

  • @girlpocalypse
    @girlpocalypse หลายเดือนก่อน

    I get that you can't forge an OCSP status but what stops an operator from just preventing their applciation from updating its OCSP status once ever again once they receive the signed valid OCSP status? Do they expire?

    • @girlpocalypse
      @girlpocalypse หลายเดือนก่อน

      I see, they have a "next update" field. Sorry to bother you :)

  • @jcmlico
    @jcmlico 6 หลายเดือนก่อน

    Is there a difference between private CA and self-signed CA? As both are used internally / within the organization.

    • @alexbarajas9004
      @alexbarajas9004 3 หลายเดือนก่อน +1

      A self-signed certificate authority (CA) is an entity that signs its own certificates without involving a trusted third party. This means it can generate and validate its own certificates but is typically not trusted by default in browsers or systems because it lacks external validation.
      A private CA, on the other hand, is a CA that is operated within an organization for internal use. It can issue certificates for internal applications, services, or devices. While a private CA may also issue self-signed certificates, it can have its root certificate distributed and trusted across an organization, allowing internal systems to trust certificates issued by it.

  • @Insight_Films927
    @Insight_Films927 6 หลายเดือนก่อน

    great amazing video

  • @mylesreimonenq4368
    @mylesreimonenq4368 9 หลายเดือนก่อน +5

    Thank you Professor Messer