10:20 that's wrong! Private key is never send anywhere. Server using the public key encrypts the random string of data, sends it to the user, user decrypts it with the private key and sends back to the server - only someone who has private key can decrypt it, so user who can is now positively authenticated.
50% of CKA playlist is completed .I am so happy that in era of paid one you delivered the content in free .Thank you so much sir. Remaining 50% of CKA playlist i will complete😊
Simply fantastic! You’ve done an excellent job of breaking down a complex topic like SSL/TLS into something that’s easy to understand. Keep up the great work, can’t wait to see what’s next!
Thank you and yes, go for it! Feel free to reach out if you have any doubts. I might reply late because of the number of comments/messages I am getting these days, but I will reply for sure
Thank you so much sir for providing this wonderful course and please make course of aws cloud platform course as well with realtime examples sir....its my humble request
You can use aes encryption using openSSL, for example Encryption: openssl aes-256-cbc -in attack-plan.txt -out message.enc Decryption: openssl aes-256-cbc -d -in message.enc -out plain-text.txt
Hi Piyush @22:15, Is this public key added to all browser or it's send to browser during first Ssl handshake is complete. I suppose browser only have CA public key but not actual certificate public key.
sir i really like your way of explaining. it would be helpful of how user integration ( OIDC or LDAP) is done in industries with different tools like jenkins, aws and may more
Hi Piyush, at 10:30 you mentioned Private key is transferred to the server to establish the secure connection. I think this is not the case, can you please clarify?
The content of this playlist is based on the exam curriculum because it provides a well-organized learning path. You don't have to worry about the roadmap; you can focus on learning. Even if you are not taking the exam now, you are still gaining the hands-on knowledge that a Kubernetes administrator should have; that's good enough!
At 10:28 of the video, why does the client transfer private key to server? I think we should not send private key as hacker can get the key by sending like that? I am confused with that. Could you please clarify?
Hello Partha, you mean complete course of Kubernetes or DevOps? There is no definition of a complete course. If you want to understand the kubernetes,docker fundamentals from beginner to intermediate level, this series should be sufficient. But as I said there is no end to the complete course, If I publish 1 video every day for the next 2 years, then also it would not be a complete course.
Excellent video, but unfortunately RSA key exchange has deprecated and does not exist in TLS 1.3. You guys should learn Diffie-Hellman key exchange instead. No TLS connection encrypts the symmetric key with the public key anymore.
10:20 that's wrong! Private key is never send anywhere.
Server using the public key encrypts the random string of data, sends it to the user, user decrypts it with the private key and sends back to the server - only someone who has private key can decrypt it, so user who can is now positively authenticated.
That is true, I made a mistake during the recording. Let me pin this comment so that others will not be confused, thank you for sharing.
@@TechTutorialswithPiyush all good. the outcome of this video is okay as you explain How SSL/TLS Works.
Very easily completed 50% of the course without feeling overwhelmed. Thank you, Piyush!
I'm glad you're enjoying the course! Keep it up!
Thanks
Completed 50% of this series so far and really appreciate the content! Great clarifications and demos!! Loved the simplicity of explanations.
Thank you for the support so far, I'm glad that it was helpful and I'm sure you will find it valuable till the end 😊
50% of CKA playlist is completed .I am so happy that in era of paid one you delivered the content in free .Thank you so much sir. Remaining 50% of CKA playlist i will complete😊
Let's go💪
Brilliant videos and CKA series!
Thank you so much!
Simply fantastic! You’ve done an excellent job of breaking down a complex topic like SSL/TLS into something that’s easy to understand. Keep up the great work, can’t wait to see what’s next!
Glad you enjoyed it! much appreciated 😊
This is an amazing series. I just found it today and I am going to complete the complete series. Keep making such amazing videos. God bless you !
Thank you and yes, go for it! Feel free to reach out if you have any doubts. I might reply late because of the number of comments/messages I am getting these days, but I will reply for sure
Thank you for this awesome explanations on certificates!
Welcome
Thank you. Crystal Clear explanation.
Welcome
Thanks Piyush for your work, guidance and efforts
.
welcome
I was initially confused about this topic, but now I have a clear understanding. Thank you!
Glad it was helpful!
Nice content, Piyush; keep going.
How can somebody get confused when you explain so well? Thank you, Piyush!
Thank you brother for the fantastic feedback!
Thank you Piyush, very clear explanation.
excellent explaination
Thanks
Awsm explanation broo
Thanks
Thanks
Thanks Piyush
Completed the video....!!!!!!
Thank you piyush, very good series completed 50 percent of course its really helpful all my dout getting cleared.
You're welcome! Keep going, you got this! 💪
Thank you for taking time to dymistify ssl/tls. #cka 🚀
Welcome
you are making the life easy😍😍
❤️❤️🙏🙏
Exceptional explanation and way to teaching.
Thank you so much
great!
thank you sir .. nice work
Glad you found it helpful!
Thank you for your videos.Very informative!
welcome
Thank you bro, great explanation 🙌🙌
Appreciate the kind words!
Nice Video !
excellent explanation @piyush. Got clarity in SSL/TLS concepts.
very helpful explanation, thanks !!!
Glad to know it was helpful. 😊
Clear depiction and explanation of the topic. Kudos Sir 🤝
Thank you Prashant ❤️🙏
Thank you sir
You're welcome
great video thank u
Welcome :)
My 6th days with this series , and everythin in very simple explanation.
Glad to know that buddy! Make sure to perform the tasks by yourself after following the videos. Good luck
Kudos Piyush
Thank you!
Thank you 🙏
Loved the video, explained it so easily that a layman would understand.
That's my goal 😀💪
Thanks for creating valueable content.😀😀
You're welcome
thank you :)
thank you piyush
welcome buddy 😊
Thank you for the content and efforts. Useful fkr new bee's
You're welcome buddy
made tough topic easy.
Thank you
Thank you so much sir for providing this wonderful course and please make course of aws cloud platform course as well with realtime examples sir....its my humble request
Check out #10weeksofcloudops playlist
Thank you Sir. Do you have a full course video on SSL/TLS?
Replied on other comment
@Piyush, how user gets symmetric key?
You can use aes encryption using openSSL, for example
Encryption:
openssl aes-256-cbc -in attack-plan.txt -out message.enc
Decryption:
openssl aes-256-cbc -d -in message.enc -out plain-text.txt
Hi Piyush @22:15, Is this public key added to all browser or it's send to browser during first Ssl handshake is complete. I suppose browser only have CA public key but not actual certificate public key.
Your understanding is right, all the browser will have CA certificates, you can check that in your browser as well
sir i really like your way of explaining. it would be helpful of how user integration ( OIDC or LDAP) is done in industries with different tools like jenkins, aws and may more
I will try to do that once I'm done with this series, that's a good topic. thanks for suggesting
@ 22:13 what if hacker holds the pub cert between, same loop again, can you clarify this sir.
Public key wont do anything even if it is exposed because the private key is encrypted by a different key value pair.
Hi Piyush, at 10:30 you mentioned Private key is transferred to the server to establish the secure connection. I think this is not the case, can you please clarify?
Yes, that was a mistake, I think I have pinned a comment stating the same. private key wont be transferred to the server
@@TechTutorialswithPiyush Also I want to thank you for the great playlist. Your way of explanation is very clear and nice to listen :)
piyush , thankyou so much for all your efforts , wanted to know whats the target date for all 40 videos to be published
I am publishing 4 videos every week, so it should be completed according to that
@@TechTutorialswithPiyush Sure , thankyou !!
can normal learner also learn content of this course for interview purposes or only for admin purpose certification wise only
The content of this playlist is based on the exam curriculum because it provides a well-organized learning path. You don't have to worry about the roadmap; you can focus on learning. Even if you are not taking the exam now, you are still gaining the hands-on knowledge that a Kubernetes administrator should have; that's good enough!
Tls is recent version of SSL ❤
🚀🚀🚀💪
some versions of TLS is vulnerable to man in middle attack and higher latency
Tls is a recent version of ssl ❤
Hi piyush SSL has browser compatibility issues
hi piyush some versions of tls are vulnerable to man in middle attack
That is why we need to keep our system up-to-date with the latest security updates and patches
Thank you Sir. I'm finding your channel interested and would love to join/subscribe. Do you have a full course video on SSL/TLS?
Thank you ! I have two video related to ssl , this one and the next one which focus on how it is implemented on Kubernetes
@@TechTutorialswithPiyush thanks for the prompt response
At 10:28 of the video, why does the client transfer private key to server? I think we should not send private key as hacker can get the key by sending like that? I am confused with that. Could you please clarify?
You use the private key to ssh into your server, that's what I mean by that
Sir I want a complete course
Hello Partha, you mean complete course of Kubernetes or DevOps? There is no definition of a complete course. If you want to understand the kubernetes,docker fundamentals from beginner to intermediate level, this series should be sufficient. But as I said there is no end to the complete course, If I publish 1 video every day for the next 2 years, then also it would not be a complete course.
@@TechTutorialswithPiyush sir what do you recommend to get a job. How much is required to crack interviews?
u - symm key means u - pub key. Is it correct?
Yes correct
@@TechTutorialswithPiyush thanks
❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤
Comment for target...!!!!!!
Excellent video, but unfortunately RSA key exchange has deprecated and does not exist in TLS 1.3. You guys should learn Diffie-Hellman key exchange instead. No TLS connection encrypts the symmetric key with the public key anymore.
Thank you for sharing. I will keep that in mind for the next video.
Where are you currently staying, piyush?
I live in Canada brother
bohot confusion create kardi
It's not an easy topic bro, watch it again and try to create the diagram while watching it
thanks piyush