CBTVid
CBTVid
  • 52
  • 1 232 256

Video

9 - Cryptography Basics - SSH Protocol Explained
zhlédnutí 34KPřed 3 lety
In this video you'll learn about the details of SSH protocol.
8 - Cryptography Basics - SSL TLS Protocol Explained
zhlédnutí 11KPřed 3 lety
In video I explain the SSL/TLS protocol in details. I also capture packets involved in establishing a secure session between a client and server to see the order and content of packets.
7 - Cryptography Basics - Diffie-Hellman Key Exchange
zhlédnutí 74KPřed 3 lety
In this video you'll learn about Diffie-Hellman key exchange method.
6 - Cryptography Basics - Public Key Infrastructure
zhlédnutí 4,1KPřed 3 lety
In this video you'll learn about PKI, trust models, managing PKI, certificate policy, certificate life cycle and key management.
5 - Cryptography Basics - Types of Digital Certificates
zhlédnutí 4,4KPřed 3 lety
In this video you'll learn about three categories of digital certificates. Root certificate, domain certificate and hardware and software certificates.
4 - Cryptography Basics - Managing Digital Certificates
zhlédnutí 4,5KPřed 3 lety
In this video you'll learn about different entities and technologies involved in managing digital certificate.
3 - Cryptography Basics - Digital Certificate
zhlédnutí 14KPřed 3 lety
In this video you'll learn about Digital Certificate and it's applications
2 - Cryptography Basics - Digital Signature
zhlédnutí 28KPřed 3 lety
in this video you'll learn about digital signature and it's applications.
1 - Cryptography Basics
zhlédnutí 13KPřed 3 lety
in this video you'll learn about the basics of cryptography, hashing and different algorithms.
Configuring VoIP in GNS3
zhlédnutí 50KPřed 10 lety
In this video I show you how to configure a voice lab in GNS3 using Cisco CME.
How to Configure VirtualBox in GNS3
zhlédnutí 3,4KPřed 10 lety
In this video I show you how to configure the VirtualBox integrated in GNS3.
Configuring IP Phones and DHCP Server in Packet Tracer
zhlédnutí 36KPřed 10 lety
In this video you will learn how to configure IP Phones in a network of voice and data. This topology uses one DHCP server to assign IP addresses to both phones and PCs which are in different VLANs.
Copy and Paste Text and Graphic between Host and VirtualBox
zhlédnutí 5KPřed 10 lety
In this video I show you how to copy and paste text and graphic between host machine and VirtualBox guest machine.
Network Address Translation - Configuration
zhlédnutí 4,8KPřed 11 lety
In this video you learn how to configure different typs of NAT such as Static, Dynamic and NAT with PAT.
Configuring VoIP in Packet Tracer
zhlédnutí 87KPřed 12 lety
Configuring VoIP in Packet Tracer
How to Connect GNS3 to the Internet
zhlédnutí 31KPřed 12 lety
How to Connect GNS3 to the Internet
How to install ASDM on Cisco ASA
zhlédnutí 99KPřed 12 lety
How to install ASDM on Cisco ASA
How to write an Essay
zhlédnutí 589Před 12 lety
How to write an Essay
Annotated Bibliography in 5 min
zhlédnutí 2,7KPřed 12 lety
Annotated Bibliography in 5 min
Literature Review in 5 min
zhlédnutí 1,4KPřed 12 lety
Literature Review in 5 min
How to add Cisco ASA in GNS3
zhlédnutí 5KPřed 12 lety
How to add Cisco ASA in GNS3
Extended Access Control List (ACL) part 2
zhlédnutí 10KPřed 13 lety
Extended Access Control List (ACL) part 2
Extended Access Control List (ACL) part 1
zhlédnutí 19KPřed 13 lety
Extended Access Control List (ACL) part 1
Network Address Translation (NAT) part 5
zhlédnutí 6KPřed 13 lety
Network Address Translation (NAT) part 5
Network Address Translation (NAT) part 4
zhlédnutí 9KPřed 13 lety
Network Address Translation (NAT) part 4
Network Address Translation (NAT) part 3
zhlédnutí 13KPřed 13 lety
Network Address Translation (NAT) part 3
Network Address Translation (NAT) part 2
zhlédnutí 20KPřed 13 lety
Network Address Translation (NAT) part 2
Network Address Translation (NAT) part 1
zhlédnutí 45KPřed 13 lety
Network Address Translation (NAT) part 1
transfer files between host and virtualbox
zhlédnutí 162KPřed 13 lety
transfer files between host and virtualbox

Komentáře

  • @Ashishkumar-dm4po
    @Ashishkumar-dm4po Před 11 dny

    Please provide the windows image

  • @SukuGeorge
    @SukuGeorge Před 12 dny

    Should scratch any other explanation on SSH from internet forever and keep this alone.

  • @Anonymous-vd1pb
    @Anonymous-vd1pb Před 16 dny

    best best best

  • @edvandromauricio7353
    @edvandromauricio7353 Před 24 dny

    good video bro

  • @nojozol1816
    @nojozol1816 Před měsícem

    i was wondering why signatures required encrypting with private key forever. this literally makes so much sense

  • @lordofperfection5528
    @lordofperfection5528 Před měsícem

    bro you explain it beautifully 😊😊👍👍

  • @FrancoisHarnist
    @FrancoisHarnist Před měsícem

    Thank you for this course!

  • @kiran9s
    @kiran9s Před 2 měsíci

    Where is Eve? Also, best explanation video for digital signatures on youtube!

  • @genatto
    @genatto Před 2 měsíci

    Thanks

  • @tumwesigyetomson6154
    @tumwesigyetomson6154 Před 2 měsíci

    Simplified explanation. Thanks

  • @hewramanwaran6444
    @hewramanwaran6444 Před 2 měsíci

    Thanks a lot.

  • @AbshirDaahir-vn5nz
    @AbshirDaahir-vn5nz Před 3 měsíci

  • @DirhemSaid
    @DirhemSaid Před 3 měsíci

    BEST WORK A**** THANK YOU

  • @babthooka
    @babthooka Před 3 měsíci

    Tom's number ( z=4 ) is not prime. Should it not be?

  • @ilgizsimashev2354
    @ilgizsimashev2354 Před 4 měsíci

    Wonderfull explaination, thanks buddy!

  • @natty2128V
    @natty2128V Před 4 měsíci

    Fortunately I have an assignment so your video helped me thanks bro

  • @sama3-nu1wz
    @sama3-nu1wz Před 4 měsíci

    thanks

  • @6e0eH732
    @6e0eH732 Před 4 měsíci

    Practicly impossible for supercomputers yet invented by human creative mind by applying logic and imagination. Amazing!

  • @AmmarMujtabaTariq-zv8zp
    @AmmarMujtabaTariq-zv8zp Před 4 měsíci

    very simple, free from burdensome difficult terminologies, straight to the point, and no time wasting. amazing

  • @ethanbrehin220
    @ethanbrehin220 Před 4 měsíci

    But what's the point of getting uncrypting k = 10 on the receiving end ? When and who decided that the uncrypted message would be 10 ?

  • @abdurrahmanyoosuff4284
    @abdurrahmanyoosuff4284 Před 5 měsíci

    Than you very much, may god bless you and guide you.

  • @jazz_soroyuza
    @jazz_soroyuza Před 6 měsíci

    This is fucking awesome

  • @hieuluong3032
    @hieuluong3032 Před 6 měsíci

    7:08

  • @gekobcint4973
    @gekobcint4973 Před 6 měsíci

    Bro just explained them better than my professor did in two lectures

  • @nahid3320
    @nahid3320 Před 6 měsíci

    Mind blowing and easy explanation. I am from non cs background but i understood it very clearly. ❤❤❤

  • @loping4
    @loping4 Před 6 měsíci

    This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!

  • @georgetsiklauri
    @georgetsiklauri Před 7 měsíci

    00:24 What? You say, this: "If Bob can *decrypt* the message that came from Alice, using Alice's public key, then Bob knows that the message came from Alice." But how would Bob decrypt a message with Alice's public key? maybe you wanted to say, that Bob should encrypt (not decrypt) the message? Unclear. Public keys are shared because the receiver should be able to encrypt the data with that public key, not decrypt. For decryption, private key is there. Then you continue, that Alice encrypts the message with the private key.. man, I think you're using public and private keys really incorrectly here.

    • @mateiivan4416
      @mateiivan4416 Před 2 měsíci

      I think what they are saying here is that if you can decrypt the message with the public key of the sender, then it must have been them who have encrypted it because only they know their private key (which is called signing a message). If someone encrypted the message with your public key and sent it to you to decrypt with your private key, there would be no way to prove that they are who they say they are. So the initial approach must be taken to prove this, but it can be disrupted by an attacker. Thus, certificates must be used.

  • @iamacoder8331
    @iamacoder8331 Před 7 měsíci

    good content

  • @amirtamang1488
    @amirtamang1488 Před 7 měsíci

    great video mate keep going

  • @Moii1914
    @Moii1914 Před 7 měsíci

    very good! 🇧🇷

  • @Reptil714
    @Reptil714 Před 7 měsíci

    Thanks, great video! One thing I don't understand though, it is said in the video that the certificate authority generates a hash from Alice's certificate signing request (city, state, country, etc...) then encrypts it with their private key. However, it is said that Bob creates a hash of ALL the information on the digital certificate (name of issuer, serial number, etc...). This info is not the same as the one from Alice's certificate signing request. So how can Bob get the same hash when it is generated from different info ?

  • @paulofduty9790
    @paulofduty9790 Před 7 měsíci

    Awesome thanks I was lost forever on this

  • @sunethsandaruwan392
    @sunethsandaruwan392 Před 7 měsíci

    Thank Youu ❤ 🎉 its very clear sir

  • @xyz3188
    @xyz3188 Před 7 měsíci

    hi , can i contact you pls ?

  • @nayeemshaik7867
    @nayeemshaik7867 Před 7 měsíci

    Super

  • @5FactsAnything
    @5FactsAnything Před 7 měsíci

    thanks for this video

  • @austinaaron7018
    @austinaaron7018 Před 8 měsíci

    This is the best video🎉

  • @pmanol1
    @pmanol1 Před 8 měsíci

    Finally someone explained this in a clear way! Thank you! Bowing!

  • @unemployedcse3514
    @unemployedcse3514 Před 8 měsíci

    Awesome 😍

  • @achyuthvishwamithra
    @achyuthvishwamithra Před 8 měsíci

    It is also a good thing to know that g is a primitive root modulo of n

  • @sandeepagarwal7387
    @sandeepagarwal7387 Před 9 měsíci

    so simply and brilliantly explained....not sure and wondering why this video is viewed by so less people, and liked by very few ones :

  • @momi2313
    @momi2313 Před 9 měsíci

    great and highly recommend thank you

  • @teddintersmith9683
    @teddintersmith9683 Před 9 měsíci

    Great explanation. Now, if Bob wants to send a message to Alice, how does he encrypt it? This may be a dumb question, but I'm not sure where the message fits in here. What am I missing?

  • @marthalubacha9861
    @marthalubacha9861 Před 9 měsíci

    How to find the remainder

  • @hotuankiet7530
    @hotuankiet7530 Před 10 měsíci

    When Alice sent a request to Certificate Authority, did she encrypt it with her private key?

  • @SALMANKHAN-lz4mg
    @SALMANKHAN-lz4mg Před 10 měsíci

    Thank You so much for this tutorial ❤❤❤

  • @saaransh01
    @saaransh01 Před 11 měsíci

    such a transparent crystal clear concept explanation... Thank you

  • @maidenfreek584
    @maidenfreek584 Před 11 měsíci

    Thank you! You deserve a lot more views.

  • @mmnahian
    @mmnahian Před 11 měsíci

    great

  • @aleixfalguerascasals3329
    @aleixfalguerascasals3329 Před 11 měsíci

    Thanks man!