How SSL & TLS use Cryptographic tools to secure your data - Practical TLS

Sdílet
Vložit
  • čas přidán 20. 05. 2024
  • Hashing, Signing, Encryption, Key Exchange -- these are tools of cryptography that are used by SSL and TLS to secure data. In this lesson we unpack how each of these tools are used to provide security to your online communication.
    This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
    🔐 More details about the course:
    classes.pracnet.net/courses/p...
    🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
    💬 Join Practical Networking Discord
    / discord
    🖧 Want to learn how how data moves through a network?
    • Networking Fundamentals
    0:00 - Intro
    0:34 - Confidentiality, Integrity, Authentication
    1:12 - Hashing - Fingerprints, Message Authentication Codes (MACs)
    1:46 - Symmetric Encryption - Encryption
    2:05 - Asymmetric Encryption - Key Exchange, Signatures, Encryption
    2:38 - Bulk Data vs Limited Data
    3:04 - How SSL/TLS uses Cryptographic Tools to secure Data
    6:32 - PKI - Public Key Infrastructure
    7:25 - Outro
    Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
    YT100
  • Věda a technologie

Komentáře • 76

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +5

    👉 *More free lessons:* czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
    ✨ *Full course:* pracnet.net/tls
    💲 *Coupon Code* for 50% off: youtube50

  • @admin7541
    @admin7541 Před 2 lety +13

    I am not an IT professional of any sort. I like learning new things. CZcams has opened a world of knowledge to anyone. People like you lead the way to that end. I found your videos to be the best in your field. They are truly the easiest to understand both by the way you explain and the video graphics. I think your true calling is to be a teacher because you are a natural. I am from a country were teachers are highly respected. Unfortunately this not the case everywhere. I appreciate all your hard work.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      Thanks for the kind words, Admin. Messages like this are a great encouragement to continue producing videos. I hope I can continue to contribute to the knowledge of world.
      Again, thank you.

  • @reyparcon1333
    @reyparcon1333 Před 2 lety +15

    Thank you for this amazing series! Now that you're done with the concept, hope you could also include real life examples on how this works (e.g. Inspection of Certificates, observing records on Wireshark, etc.) Anyway, keep it up dude! Love how you discuss these things.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +4

      Not done yet =). In the upcoming weeks I'm releasing videos on RSA, DH, and DSA.
      All that other stuff (certificates, records, wireshark, etc...) is covered in the full TLS course:
      classes.pracnet.net/courses/practical-tls

  • @adedejiemmanuel1
    @adedejiemmanuel1 Před 2 lety +3

    Honestly, you're still the best at this. I enjoy the enlightenment you bring. You're gifted. Thank you.

  • @cyberghost_01
    @cyberghost_01 Před rokem +1

    We need a cyberSecurity course by you!!! You are so great! Linux, networking, cryptogtaphy. If you can teach us this topics will be a great thing!

  • @samarthtandale9121
    @samarthtandale9121 Před 8 měsíci

    Amazing 🤩 now it completes the full picture !

  • @geraldblackmon8001
    @geraldblackmon8001 Před 2 lety +1

    I have watch many of this series videos and plan to share them as part of my training library. Thanks for the amazing work

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      You're welcome, Gerald. I'm glad you enjoyed this series. Thank you for your support in sharing this content =)

  • @adedejiemmanuel1
    @adedejiemmanuel1 Před 2 lety +1

    I'm here again. I'm never gonna miss any of your videos. You're my best option.

  • @iheartddead
    @iheartddead Před 2 lety +1

    Thank you for your videos and articles. They really helped me finally understand how things work and I got a dream job. Thank you!

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Wohoo! Congrats! What is the job? That's awesome you got your dream job!

  • @vishalrugle538
    @vishalrugle538 Před 2 lety +1

    As usual, through and complete explanation, looking for DNS, F5, Multicast, BGP, and Security related Advance stuff from you in coming days. Thanks a lot, Ed.

  • @SaurabhKumar-zn1lz
    @SaurabhKumar-zn1lz Před 2 lety +2

    Just wanted to say a big thank you for these helpful videos

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +1

    🥳🥳- Promotion Ended - Congrats @Paolo Nervi 🥳🥳
    For the rest of you, you can use this discount code for $100 off the course: YT100
    classes.pracnet.net/courses/practical-tls
    Subscribe + Notification bell to increase your odds of winning when the next video (and giveaway) releases!
    📢📢 Practical TLS - Course Giveaway 📢📢
    I'll be picking a random person from all the comments in the next 7 days on this video to give a scholarship for free access to the full Practical TLS course.
    All you have to do is make a post to enter. Check back in a week to see if you won. =)

    • @calebchapman9119
      @calebchapman9119 Před 2 lety +1

      I really enjoy all of your content
      I am able to learn without brain fog
      I would love if you could teach me all about CISSP I'm sure I would pass with flying colors if you teach it. Thanks

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      @@calebchapman9119 Hi Caleb, Glad you are able to learn from my content =).
      The CISSP is a monster of a cert =). Good luck! It's unfortunately not a Cert I hold or would be comfortable trying to train (it's too much memorization for my taste).

  • @ajayb9392
    @ajayb9392 Před 2 lety +4

    Awesome bro. Very good explanation. As always, only you can explain things in simple words. Thanks again for making these contents free.

  • @peterchmelar8886
    @peterchmelar8886 Před 2 lety +1

    Awesome, thank you for the regular uploads Ed :)

  • @pretbadha
    @pretbadha Před 6 měsíci +2

    Brother in CIA A is not authN nor authZ, rather availability (read highAvailability) but I'm sure you already know that and here your A is the AuthN part only... keep up the great work that you are doing

    • @dmfh5646
      @dmfh5646 Před 2 měsíci +1

      You're thinking of the CIA triad for cybersecurity. This video is not talking about that. It's focusing on what TLS provides.

  • @mertcancam
    @mertcancam Před 2 lety +1

    Yet another wonderful session.. Thanks!

  • @BitsnBytes8
    @BitsnBytes8 Před 8 měsíci

    Thank you so much for making this series. You have presented information extremely well and I have been able to follow your tutorials completely. One quick question - At 5:37 of this video titled "How SSL & TLS use Cryptographic tools to secure your data - Practical TLS", you mention that the Certificate is signed by CA and it provides authentication. Should it be authentication + integrity? From the previous lesson on Signatures, I understood that signatures provide authentication and integrity.

  • @alexl2512
    @alexl2512 Před rokem

    Amazingly clear.

  • @paolonervi2208
    @paolonervi2208 Před 2 lety +1

    Thank you again for dedicating the most important thing we have (our time) in making really well made videos.Your videos are the most technical i've seen.greetings from a TLC engineer..best regards.Paolo.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      You're very welcome, Paolo. Thank you for the kind words =). Cheers!

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Congrats, Paolo, You won the free course giveaway. Message me on Discord to claim your prize: pracnet.net/discord

    • @paolonervi2208
      @paolonervi2208 Před 2 lety

      @@PracticalNetworking Thanks for the course! (More fortinet)... greetings from Paolo.

  • @upelister
    @upelister Před rokem +1

    Thank you very informative lesson.😃

  • @IliyaDamyanov
    @IliyaDamyanov Před 7 měsíci

    Amazing series.

  • @MohamedAhmed-vw5bc
    @MohamedAhmed-vw5bc Před 2 lety +1

    so Informational, keep the good work bro.
    you are the best.

  • @renujain8911
    @renujain8911 Před rokem

    Cool... Have been following this series from last 3 days & still wondering why it is not having more views .... 🙂

  • @nimaforoughi3008
    @nimaforoughi3008 Před rokem

    Amazing as always

  • @AlexG-bc7ji
    @AlexG-bc7ji Před 2 lety +1

    new PN video is a great thing to wake up to!

  • @CPT_Pepper
    @CPT_Pepper Před rokem

    🎉🎉🎉wonderful training vid😊

  • @fortuneosadolor438
    @fortuneosadolor438 Před 2 lety +2

    I need this course in me life

  • @jded1346
    @jded1346 Před rokem +3

    When Asymmetric Encryption is used to perform secret key exchange, it requires 4 keys - 2 for the server (1public+1private), 2 for the client(1public+1private). This illustration shows only the server side of the asymmetric key pair. Who generates the corresponding pair for the client and how?

    • @kungfumaster298
      @kungfumaster298 Před 8 měsíci

      From what I understand, the Client just uses the Public Key of the Server to encrypt the Symmetric Key, so that the Server gets a copy of the symmetric key. Not sure why it needs the key pair from the client, since it already has a copy of the symmetric key.

  • @qwinejude1462
    @qwinejude1462 Před 9 měsíci

    Please I need a link for cybersecurity and cryptography

  • @TCinT
    @TCinT Před 2 lety +1

    You have a new subscriber :)

  • @rahul78933
    @rahul78933 Před 2 lety +1

    Great explanation, what if MITM occur during sharing of Secret key and attacker replace the secret key with his and encrypt it with server public key and send it to server . What will be the mitigation in this scenario

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Great question, Rahul! You should consider the course, I have a feeling you would love it =).
      To answer your question.. in such a case, remember the Client is still going to be using the value they generated and sent to the server (which was interrupted by the MITM). So even if the MITM and the Server end up with identical session keys, it _will not_ be the Session Key used by the Client -- therefore, there is no possibility of compromising data. It's as if the MITM has it's own, independent, SSL connection with the Server.

  • @nsanandkumarak
    @nsanandkumarak Před rokem +1

    Thanks for the video, can you please provide me link for the video regarding the MAC (Msg Auth Code)

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      Sure... here --> czcams.com/video/doN3lzzNEIM/video.html
      (edited, typo)

  • @satishvelluru
    @satishvelluru Před 2 lety +1

    Nice presentation .. which tools used for your presentaion ?

  • @yotu9670
    @yotu9670 Před 22 dny

    Thaaaaaanks a lot. Your vid’s are Greta!
    Have a question:
    Why does a client trust a ca? Or how can a client make sure the certificate that a server provides which is signed with the private key of a ca is actually trustworthy and belongs to the server?

  • @fortuneosadolor438
    @fortuneosadolor438 Před 2 lety +2

    do some of these topics also apply to SSH? like how SSH and TLS use asymmetric encryption

  • @Don-Carillo
    @Don-Carillo Před 2 lety +1

    👏 thanks 😊.

  • @mr.highprofessional3828
    @mr.highprofessional3828 Před 11 měsíci

    Isn't hashing also used for signatures as well?

  • @faizannajeeb9614
    @faizannajeeb9614 Před 2 lety +1

    I need this course because I am intended to use this topic for final year project

  • @adryelgainza1686
    @adryelgainza1686 Před 2 lety

    Hey I have a couple questions. If my wording is not the best please ask for clarification lol.
    1. I notice the host does not have a pub/priv key pair. Is this just to simplify the demonstration? If not, then how would asymmetric key encryption work?
    2. MAC and CA work together by using the certified public key to encrypt the hash. If the host can unencrypt the sent hash with the public key, and then calculate the hash of the message, it ends up proving the integrity and the authentication. Now my question is; what if it is client-client communication? Will they instead resort to signing messages, or will they generate some kind of their own certificate.
    Thanks a bunch man you are really the G.O.A.T. I will be looking into your course for sure if i can scrap up the money. (Broke 16 year old moment)

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      1. Correct, typically only the server has a Public/Private Key pair
      1a. The exception is if DH is used as a key exchange, in which case both client and server have "public key and private key" (but they aren't used for encryption.... more details in the link below).
      2. You're confusing Signatures and MAC.... Signatures use _Asymmetric Keys_ ... MAC uses _Symmetric_ keys.
      To learn more about Asymmetric Crypto: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/

  • @arifsiddiqui941
    @arifsiddiqui941 Před 2 lety +1

    Please share all TLS/ SSL videos in sequence to understand better. Thanks

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      Here are all the SSL Videos: czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html

  • @asikhscreations2132
    @asikhscreations2132 Před rokem

    System has effected by ransomware QQLC so how can I solve this

  • @imacomputerbuddie
    @imacomputerbuddie Před 2 lety +1

    Expanded stuff I use all the tije

  • @rafay1708
    @rafay1708 Před 2 lety +4

    Hi Sir, I will always remain indebted to you. Thanks for going that extra mile to make this day a success with such a useful video. Thanks Waiting for next one 👍✌

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Thanks for the kind words, Rafay =). Glad you're enjoying this series!