TLS / SSL - The complete sequence - Practical TLS
Vložit
- čas přidán 2. 06. 2024
- Understanding TLS/SSL involves understanding the interaction between the Client (web browsers, SSL VPN clients, etc...), the Server (websites, VPN endpoints, etc), and the Certificate Authority (the entity that issues Certificates). This video outlines the exact sequence of events that occur in the TLS ecosystem, and will explain the function of the Certificate, CSR, Public Key, and Private Key.
Seeing the whole process at 10,000 ft view will help you understand the smaller individual working parts as we continue to dive deeper and deeper into TLS and SSL.
This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
🔐 More details about the course:
classes.pracnet.net/courses/p...
👨🏫 More free sample lessons:
• Practical TLS - Free L...
🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
#ssl #tls #csr
💬 Join Practical Networking Discord
/ discord
🖧 Want to learn how how data moves through a network?
• Networking Fundamentals
Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
YT100 - Věda a technologie
👉 *More free lessons:* czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
✨ *Full course:* pracnet.net/tls
💲 *Coupon Code* for 50% off: youtube50
How do I translate it
the best explanation I have come across by far - thank you!
Probably the best explanation of digital certificate mechanism. Thank you
This really is a great overview that 'puts together' the full course. It's a great course, especially for those who appreciate visual aids for comprehension and 'putting the pieces together'.
Thank you, Scott =).
Best practical explantation I've seen and I viewed a lot of videos before this and had to exit them, thank you!
Glad you enjoyed this, Tom. I'd be willing to bet you'd enjoy the full course as well. =)
Best explanation ever! This is brief, clear, thorough and easy to follow and understand. Thanks for sharing!
You're very welcome =).
Could you do me a favor? Do you mind sharing this video on Linked In, Reddit, Twitter, Facebook, or any other social media you use? As an independent creator, that would be an _enormous_ help, and I would appreciate it _greatly_ .
Wow.. what a series you have created.. End to end overview with simple explanation. Hats off to you Ed! Great work. Thanks for these videos.
If you enjoyed this, you'll enjoy the full Practical TLS course too! =)
Practicly impossible for supercomputers yet invented by human creative mind by applying logic and imagination. Amazing!
A really great explanation of how all things work out in TLS. Thanks for making easily understandable diagrams, explanations. These concepts weren't clear well to me during engineering, and always used to scare the shit out of me. I believe these concepts will help me to atleast read few articles now independently to use these concepts in my work. Thanks again !
Watched all this playlist, incredibly useful lessons. Information is straightforward and very easy to understand even for those who haven't had any experience with encryption algos (like me). Highly recommended for any IT folks.
Glad you enjoyed this, Ray. =)
This is brilliant! Thanks a ton for the explanation
Excellent explanation video! Studying for the Sec+ and this helped alot thank you.
This is perfect. You make it look easy. I am always impressed. Thank you.
You're welcome, Azza =)
Amazing explanation, thank you so much!
This is the best explanation I have ever seen
Thanks for all this great content.
You simplified all crypto/pki concept I’ve been struggling with.
Would love to see videos on EC, ECDHE, etc ..
Enjoyed the series!! Excited to help in the industry soon!!
Amazing efforts, thank you!
You're welcome!
Thank you! This is really intuitive and informative!
Glad it was helpful!
This is the one which is connecting all the dots. Awesome.
1) In reality do we use 2 different symmetric keys? Just one symmetric key can do both encryption & hashing, right?
2) Do they negotiate which algorithms to use for encryption & hashing during SSL handshake?
A key is just a string of bits. Yes, you could absolutely use the same key (string of bits) to do both encryption & hashing. But it costs nearly nothing to generate more bits from a starting secret, and makes it twice as hard to brute force if you use two keys, so often the keys are used for only one purpose.
In reality, 4 keys are generated, so you have different keys for encryption and hashing, *in each direction*.
More details in the full TLS course =). Also, you might enjoy the DH section of this article if you want to learn more: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
@@PracticalNetworking Got it. Thanks for sharing more info.
The entire series is very informative. Exactly all that I wanted to learn.
Glad you enjoyed it =). I'd be willing to bet you'd enjoy the full TLS course as well. =)
@@PracticalNetworking Definitely did enjoy it. I finished half the course in a day. Remaining half is for the next day. So much knowledge in the series.
Sincere thanks for this.
@@master_zenrade Wohoo! Keep up the good work =)
WOW. I didn't know that all that happens when A server is accessed. Thanks a lot.
Indeed! And even this was a simplification, so much more actually happens on the wire =).
Thank you for the video sir 🙏
You're welcome, Arun!
Straight to jargon and presumption
Thank you sir for this video
You're welcome, Ayrad!
insane thanks for this.
You're very welcome.
Hello. Great video and great way of explaining this concept. I have question, am i right if i say that https request for web page is sent after client and server establish session keys?
Correct. The HTTP* request is sent *within* the SSL/TLS tunnel, and therefore after the session keys have been established by SSL/TLS.
@@PracticalNetworking Thank you sir for answer
@@mirzadzafic8999 You're welcome.
@@mirzadzafic8999 PS, more details on "HTTP conversation" within SSL Tunnel in this video: czcams.com/video/E5bSumTAHZE/video.html
Trying to buy the TLS course. I am from India. The payment is getting declined using VISA Credit / Debit cards. And paypal payment is kind of getting stuck. Can you please help me get this Cyber Monday sale?
Reach out to me on Discord or by e-mail (use the contact form on my blog). We'll make sure you're sorted. =)
pracnet.net/discord
@@PracticalNetworking Never mind, Ed. I tried using a different card and it worked. I had sent you an email before that - please ignore. Looking forward to the course. Please keep up the great work.
謝謝!
You're very welcome! Thank you for supporting the channel!
are the keys generated via RSA? is signing via RSA?
The asymmetric keys can be generated with RSA, yes. Although, more recently that is beginning to fall out of favor .
@@PracticalNetworking so when we say signing we always refer to actual data encryption with symmetric keys?
👍👍👍
4:51