How you clarified that a client isn’t actually the user but is the computer is not found on any other technology video. You break down even the simplest of concepts to ensure that the most basic / newbies to IT can follow along. Even myself I benefit when you break it down to the grassroots level, as your teaching us how to be teachers! Keep up the excellent work
Gigamon can work as the man-in-the-middle to decrypt TLS, forward traffic though the tool(s), loops back to the Gigamon where the traffic is re-encrypted..
Truthfully, the slides are probably out of date at the moment. I think I recorded this in 2020. But I got the data from here if you want the most updated statistics: w3techs.com/technologies/overview/ssl_certificate
It's funny how often "smart toaster" is used when people discuss Internet of Things. I thought it appropriate when making this video to imply that *anything* can be an SSL Client. =)
Isnt the certificate public and can be presented by a MITM to engage in a tls handshake. What mechanism is used in TLS to confirm that the server holds the private key
SSL certificate needs to be installed in the web server i.e physical computer running a server software? Which means I can buy a SSL from anywhere and if provided by my web hosting, install it on the web hosting, which is just a Physical machine running software to respond to requests?
Only from the Client's perspective. Specifically, that the Client's traffic does not have Non Repudiation guarantees because TLS does not know who the client is.
Sir...do you have more widely distributed cources thru Udemy which can provide affordable cost? your course is the best in whatever i have come across to date. It has the right graphics, width and depth and perfectly explained.
OpenSSL is simply a command set you use to manage/create certificates and keys. I'm actually 90% done with a free course unpacking all the main OpenSSL commands =). Stay tuned for that! As for which CA to use... there is actually a lot more to that question than I can answer simply. From a very simplistic perspective, I'd say just use Let's Encrypt. Beyond that, I'd refer you to the full Practical TLS course where I unpack all the nuance involved.
Absolutely! That is why we need a CA that we trust to create Certificates that we trust. We can verify the Certificate is from a legitimate CA because the Certificate is Signed by that CA. More info on Signatures: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-_zyKvPvh808.html
@@PracticalNetworking oh I see. Thanks for the response. I’m learning for CCNA to get started on networking and move to Cybersec and went down a rabbit hole with HTTPS and SSL/TLS. Thanks a ton!
@@adryelgainza1686 You're welcome. If it piques your interest, you might want to look into the full course. I'm running a Promo through the rest of March. Link on my webpage (pracnet.net). For your CCNA, make sure you check out these two resources: ru-vid.com/group/PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi www.practicalnetworking.net/index/ccna/