TLS / SSL - The complete sequence - Practical TLS

preview_player
Показать описание
Understanding TLS/SSL involves understanding the interaction between the Client (web browsers, SSL VPN clients, etc...), the Server (websites, VPN endpoints, etc), and the Certificate Authority (the entity that issues Certificates). This video outlines the exact sequence of events that occur in the TLS ecosystem, and will explain the function of the Certificate, CSR, Public Key, and Private Key.

Seeing the whole process at 10,000 ft view will help you understand the smaller individual working parts as we continue to dive deeper and deeper into TLS and SSL.

This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.

🔐 More details about the course:

👨‍🏫 More free sample lessons:

🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)

#ssl #tls #csr

💬 Join Practical Networking Discord

🖧 Want to learn how how data moves through a network?

Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
YT100
Рекомендации по теме
Комментарии
Автор

💲 *Coupon Code* for 50% off: youtube50

PracticalNetworking
Автор

This really is a great overview that 'puts together' the full course. It's a great course, especially for those who appreciate visual aids for comprehension and 'putting the pieces together'.

scottspa
Автор

the best explanation I have come across by far - thank you!

Saiyan
Автор

Wow.. what a series you have created.. End to end overview with simple explanation. Hats off to you Ed! Great work. Thanks for these videos.

rids
Автор

Probably the best explanation of digital certificate mechanism. Thank you

sayfakr
Автор

Best explanation ever! This is brief, clear, thorough and easy to follow and understand. Thanks for sharing!

joqiao
Автор

Watched all this playlist, incredibly useful lessons. Information is straightforward and very easy to understand even for those who haven't had any experience with encryption algos (like me). Highly recommended for any IT folks.

RayJay
Автор

Best practical explantation I've seen and I viewed a lot of videos before this and had to exit them, thank you!

tom.bailey
Автор

A really great explanation of how all things work out in TLS. Thanks for making easily understandable diagrams, explanations. These concepts weren't clear well to me during engineering, and always used to scare the shit out of me. I believe these concepts will help me to atleast read few articles now independently to use these concepts in my work. Thanks again !

parthkulkarni
Автор

This is brilliant! Thanks a ton for the explanation

shwetachandrakar
Автор

Excellent explanation video! Studying for the Sec+ and this helped alot thank you.

ZkyTw
Автор

This is perfect. You make it look easy. I am always impressed. Thank you.

adedejiemmanuel
Автор

Amazing explanation, thank you so much!

douglasfneves
Автор

Thanks for all this great content.
You simplified all crypto/pki concept I’ve been struggling with.
Would love to see videos on EC, ECDHE, etc ..

achrafharkati
Автор

Thank you! This is really intuitive and informative!

Yeoolw
Автор

Enjoyed the series!! Excited to help in the industry soon!!

ramdogproductions
Автор

The entire series is very informative. Exactly all that I wanted to learn.

master_zenrade
Автор

This is the best explanation I have ever seen

ssh-dev
Автор

WOW. I didn't know that all that happens when A server is accessed. Thanks a lot.

aniswlidi
Автор

This is the one which is connecting all the dots. Awesome.
1) In reality do we use 2 different symmetric keys? Just one symmetric key can do both encryption & hashing, right?
2) Do they negotiate which algorithms to use for encryption & hashing during SSL handshake?

ajayb