TLS / SSL - The complete sequence - Practical TLS

Sdílet
Vložit
  • čas přidán 2. 06. 2024
  • Understanding TLS/SSL involves understanding the interaction between the Client (web browsers, SSL VPN clients, etc...), the Server (websites, VPN endpoints, etc), and the Certificate Authority (the entity that issues Certificates). This video outlines the exact sequence of events that occur in the TLS ecosystem, and will explain the function of the Certificate, CSR, Public Key, and Private Key.
    Seeing the whole process at 10,000 ft view will help you understand the smaller individual working parts as we continue to dive deeper and deeper into TLS and SSL.
    This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
    🔐 More details about the course:
    classes.pracnet.net/courses/p...
    👨‍🏫 More free sample lessons:
    • Practical TLS - Free L...
    🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
    #ssl #tls #csr
    💬 Join Practical Networking Discord
    / discord
    🖧 Want to learn how how data moves through a network?
    • Networking Fundamentals
    Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
    YT100
  • Věda a technologie

Komentáře • 62

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +8

    👉 *More free lessons:* czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
    ✨ *Full course:* pracnet.net/tls
    💲 *Coupon Code* for 50% off: youtube50

  • @Saiyan1987
    @Saiyan1987 Před 4 měsíci +5

    the best explanation I have come across by far - thank you!

  • @sayfakr8004
    @sayfakr8004 Před 3 měsíci +2

    Probably the best explanation of digital certificate mechanism. Thank you

  • @scottspa74
    @scottspa74 Před 2 lety +16

    This really is a great overview that 'puts together' the full course. It's a great course, especially for those who appreciate visual aids for comprehension and 'putting the pieces together'.

  • @tom.bailey
    @tom.bailey Před rokem +1

    Best practical explantation I've seen and I viewed a lot of videos before this and had to exit them, thank you!

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      Glad you enjoyed this, Tom. I'd be willing to bet you'd enjoy the full course as well. =)

  • @joqiao400
    @joqiao400 Před rokem +2

    Best explanation ever! This is brief, clear, thorough and easy to follow and understand. Thanks for sharing!

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      You're very welcome =).
      Could you do me a favor? Do you mind sharing this video on Linked In, Reddit, Twitter, Facebook, or any other social media you use? As an independent creator, that would be an _enormous_ help, and I would appreciate it _greatly_ .

  • @rids22
    @rids22 Před 2 lety +2

    Wow.. what a series you have created.. End to end overview with simple explanation. Hats off to you Ed! Great work. Thanks for these videos.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      If you enjoyed this, you'll enjoy the full Practical TLS course too! =)

  • @6e0eH732
    @6e0eH732 Před 4 měsíci +1

    Practicly impossible for supercomputers yet invented by human creative mind by applying logic and imagination. Amazing!

  • @parthkulkarni3776
    @parthkulkarni3776 Před 6 měsíci

    A really great explanation of how all things work out in TLS. Thanks for making easily understandable diagrams, explanations. These concepts weren't clear well to me during engineering, and always used to scare the shit out of me. I believe these concepts will help me to atleast read few articles now independently to use these concepts in my work. Thanks again !

  • @RayJay3000
    @RayJay3000 Před 2 lety +1

    Watched all this playlist, incredibly useful lessons. Information is straightforward and very easy to understand even for those who haven't had any experience with encryption algos (like me). Highly recommended for any IT folks.

  • @shwetachandrakar4060
    @shwetachandrakar4060 Před 8 měsíci +1

    This is brilliant! Thanks a ton for the explanation

  • @sekytwo
    @sekytwo Před 10 měsíci

    Excellent explanation video! Studying for the Sec+ and this helped alot thank you.

  • @adedejiemmanuel1
    @adedejiemmanuel1 Před 2 lety +2

    This is perfect. You make it look easy. I am always impressed. Thank you.

  • @douglasfneves
    @douglasfneves Před měsícem

    Amazing explanation, thank you so much!

  • @ssh-dev
    @ssh-dev Před 10 měsíci +1

    This is the best explanation I have ever seen

  • @achrafharkati3900
    @achrafharkati3900 Před rokem

    Thanks for all this great content.
    You simplified all crypto/pki concept I’ve been struggling with.
    Would love to see videos on EC, ECDHE, etc ..

  • @ramdogproductions
    @ramdogproductions Před 2 lety +1

    Enjoyed the series!! Excited to help in the industry soon!!

  • @mohamedsel6897
    @mohamedsel6897 Před 2 lety +1

    Amazing efforts, thank you!

  • @chaowang1361
    @chaowang1361 Před 9 měsíci +1

    Thank you! This is really intuitive and informative!

  • @ajayb9392
    @ajayb9392 Před 2 lety +3

    This is the one which is connecting all the dots. Awesome.
    1) In reality do we use 2 different symmetric keys? Just one symmetric key can do both encryption & hashing, right?
    2) Do they negotiate which algorithms to use for encryption & hashing during SSL handshake?

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      A key is just a string of bits. Yes, you could absolutely use the same key (string of bits) to do both encryption & hashing. But it costs nearly nothing to generate more bits from a starting secret, and makes it twice as hard to brute force if you use two keys, so often the keys are used for only one purpose.
      In reality, 4 keys are generated, so you have different keys for encryption and hashing, *in each direction*.
      More details in the full TLS course =). Also, you might enjoy the DH section of this article if you want to learn more: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/

    • @ajayb9392
      @ajayb9392 Před 2 lety +2

      @@PracticalNetworking Got it. Thanks for sharing more info.

  • @master_zenrade
    @master_zenrade Před rokem +1

    The entire series is very informative. Exactly all that I wanted to learn.

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      Glad you enjoyed it =). I'd be willing to bet you'd enjoy the full TLS course as well. =)

    • @master_zenrade
      @master_zenrade Před rokem +1

      @@PracticalNetworking Definitely did enjoy it. I finished half the course in a day. Remaining half is for the next day. So much knowledge in the series.
      Sincere thanks for this.

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      @@master_zenrade Wohoo! Keep up the good work =)

  • @aniswlidi2012
    @aniswlidi2012 Před rokem +1

    WOW. I didn't know that all that happens when A server is accessed. Thanks a lot.

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      Indeed! And even this was a simplification, so much more actually happens on the wire =).

  • @arunsankpal4219
    @arunsankpal4219 Před 2 lety +1

    Thank you for the video sir 🙏

  • @tomknud
    @tomknud Před 6 měsíci

    Straight to jargon and presumption

  • @ayradizem2770
    @ayradizem2770 Před 2 lety +1

    Thank you sir for this video

  • @krishnamohanyerrabilli4040

    insane thanks for this.

  • @mirzadzafic8999
    @mirzadzafic8999 Před rokem +1

    Hello. Great video and great way of explaining this concept. I have question, am i right if i say that https request for web page is sent after client and server establish session keys?

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      Correct. The HTTP* request is sent *within* the SSL/TLS tunnel, and therefore after the session keys have been established by SSL/TLS.

    • @mirzadzafic8999
      @mirzadzafic8999 Před rokem +1

      @@PracticalNetworking Thank you sir for answer

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      @@mirzadzafic8999 You're welcome.

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      @@mirzadzafic8999 PS, more details on "HTTP conversation" within SSL Tunnel in this video: czcams.com/video/E5bSumTAHZE/video.html

  • @gheemail
    @gheemail Před 2 lety +1

    Trying to buy the TLS course. I am from India. The payment is getting declined using VISA Credit / Debit cards. And paypal payment is kind of getting stuck. Can you please help me get this Cyber Monday sale?

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Reach out to me on Discord or by e-mail (use the contact form on my blog). We'll make sure you're sorted. =)
      pracnet.net/discord

    • @gheemail
      @gheemail Před 2 lety +1

      @@PracticalNetworking Never mind, Ed. I tried using a different card and it worked. I had sent you an email before that - please ignore. Looking forward to the course. Please keep up the great work.

  • @mhwang408
    @mhwang408 Před 3 měsíci +1

    謝謝!

  • @matiashuartamendia7977
    @matiashuartamendia7977 Před 7 měsíci +1

    are the keys generated via RSA? is signing via RSA?

    • @PracticalNetworking
      @PracticalNetworking  Před 7 měsíci

      The asymmetric keys can be generated with RSA, yes. Although, more recently that is beginning to fall out of favor .

    • @matiashuartamendia7977
      @matiashuartamendia7977 Před 7 měsíci

      @@PracticalNetworking so when we say signing we always refer to actual data encryption with symmetric keys?

  • @admin_e
    @admin_e Před 2 lety +1

    👍👍👍

  • @ruixue6955
    @ruixue6955 Před 10 měsíci

    4:51