Тёмный

NETWORK SECURITY - SECURE SOCKET LAYER - PART 1 (SSL RECORD PROTOCOL) 

Sundeep Saradhi Kanthety
Подписаться 622 тыс.
Просмотров 170 тыс.
50% 1

SSL is implemented using SSL protocol stack
1.SSL Record Protocol
2.Handshake Protocol
3.Change Cipher Spec Protocol
4.Alert Protocol

Опубликовано:

 

22 мар 2018

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 79   
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
HI VIWERS SMALL MISTAKE WHILE WRITING THE PAD2 IN SSL PAD2 ---- 0101 1100 ( CORRECT ONE ) PAD2 ---- 0101 0110 (WRITTEN MISTAKE ) I AM SORRY FOR THIS MISTAKE. PLEASE CORRECT IT.
@samyukthamurugan
@samyukthamurugan 5 лет назад
09:34 it's Is resumable flag. It indicates if the existing connection can be resumed or should a new connection should be established
@nandkishorenangre3541
@nandkishorenangre3541 5 лет назад
You should Pin this comment
@englishwithbharathi7126
@englishwithbharathi7126 3 года назад
Your class will be more interested than the my lecturer class.thank u sir for uploading this video.
@ssc5188
@ssc5188 5 лет назад
Your explanation is very good sir, thank you so much sir....
@joelanandraj4194
@joelanandraj4194 5 лет назад
Very good and clear explanation.... Thank you so much for your contribution.....
@arunnivaz
@arunnivaz 5 лет назад
Clearly explained about the encryption formula
@targetmission8234
@targetmission8234 5 лет назад
You are a great teacher! thank you
@chandra7314
@chandra7314 4 года назад
Hi sir, I've been preparing for CEH exam and my goal is to be a good PenTester.. whenever I get doubts I just refer your topics for brush up!! excellent sir.. chala helpful avtunnay!! thanks!! god bless you.. ___/\____
@kprvibes1142
@kprvibes1142 3 года назад
neekante chinna ayyuntene god bless you anali sodara
@vinishagupta6004
@vinishagupta6004 5 лет назад
Thnk u soo much fr such informative video which provides good conceptual clarity! :).....
@anirbanchakraborty7563
@anirbanchakraborty7563 4 года назад
very good tutorial helped us for encryption technique......upload more video about data security...
@vinayvinnu3590
@vinayvinnu3590 4 года назад
Awesome explaination sir...
@BiswasTharakath
@BiswasTharakath 5 лет назад
Thank you for all these videos and your hard work. This has helped many poor btech lads pass their exams. But going through this, I'm feeling hopeless and sad about the state of the indian education system. We are mugging these up just to be forgotten in a couple of days.
@gencirugova
@gencirugova 6 лет назад
Why didn't u make any tutorial for random number PRNG TRNG etc,theyre also needed in cryptography. Ps thesee tutorials were very helpful thankss
@dineshthiyanesh7059
@dineshthiyanesh7059 4 года назад
Good explanation. can you clarify "is the Pad2 value(5C in hex - 92 in dec) fixed for x times in MD5 and pad1 value (36h) for x times in MD5 while calculating Hash in SSL header ? Does this value comes from algo selected? what would be the pad value in case of SHA256 ?
@manitejamurarishetti
@manitejamurarishetti 6 лет назад
thank you sir, really help full for my last minute preparation
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi mani thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@jksharma7
@jksharma7 6 лет назад
One of the BEST Sir..... Thanks
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi sharma thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@suryatejaanneboina5606
@suryatejaanneboina5606 3 года назад
i have exam on 8th march , still i have no material for computer netowrks and security expect syllabus copy .after listening this lectures damn shure i clear the subject in my semester .great work sir thanks a lot .GURUDEVOBAAVA
@sundeepsaradhi
@sundeepsaradhi 3 года назад
All the very best
@lekpjedits18
@lekpjedits18 4 года назад
Thankz a lot sir.. clear explanation 👏
@tejaswinithanda4934
@tejaswinithanda4934 5 лет назад
And also about secure shell in network security
@saharmashoor6067
@saharmashoor6067 6 лет назад
Thank you ..very useful .. plz upload more of these videos
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi mashoor thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@aashaypatil7745
@aashaypatil7745 3 года назад
Very nice and simple explanation thanks sir
@amrutamahadik1868
@amrutamahadik1868 5 лет назад
Thank u sir....it is very useful
@chithrakrishnan3454
@chithrakrishnan3454 4 года назад
Thank u sir.This is very helpful...
@kalubaeliza4147
@kalubaeliza4147 Год назад
thank you, well explained
@tejaswinithanda4934
@tejaswinithanda4934 5 лет назад
Sir, can u please explain about HTTPs in network security
@ambilyjoseph9797
@ambilyjoseph9797 6 лет назад
Good class on SSL
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi ambily thanks for your interest towards our channel.
@fahad9739
@fahad9739 6 лет назад
Thanks for the video.
@sundeepsaradhi
@sundeepsaradhi 5 лет назад
hi Fahad thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@derickbarthelot
@derickbarthelot 6 лет назад
Why SSL is Hybrid encription protocol? you don't mention this on your video
@prakashjangir412
@prakashjangir412 4 года назад
Sir please make a video on "Birthday attack on digital signature " in cryptography
@akashkamal6806
@akashkamal6806 6 лет назад
sir ap ne Bhut accha explain kiya
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi akash thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@priyankaseriwala5549
@priyankaseriwala5549 6 лет назад
you are awesome sir ...plz upload more videos
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi priyanka sure i will upload more videos and keep following our channel. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
@priyankaseriwala5549
@priyankaseriwala5549 6 лет назад
Sure sir :)
@sagarparida2162
@sagarparida2162 4 года назад
sir please confirm fragmentation perform this layer ?
@rock1223
@rock1223 6 лет назад
sir please tell me about all algorithms in above you tell. 1.SHA-1 2.MD5 and in compress & MAC 2 algorithm and encryption 3 algorithm ... thanks for video sir
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi avinash thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@TheKNdheeraj0
@TheKNdheeraj0 6 лет назад
Good Video Anna!! But there is a small mistake for PAD-2 Byte Sequence is 0101 1100 not 0011 0110. Be Careful next time!!
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi dheeraj you are correct but here i have written pad2 first and pad1 next and there also as you have said i have written wrong. Thanks for correction.
@sneharam2008
@sneharam2008 5 лет назад
Hi sir can u upload total information about network and security.and plz upload the vdos like osi mdl,ipv4.....etc
@pooranivenkatesh3197
@pooranivenkatesh3197 3 года назад
Romba thanks sir
@beizhou2488
@beizhou2488 5 лет назад
Can you recommend several practical books about the network security?
@manjunathasaiuppu
@manjunathasaiuppu 4 года назад
1. cryptography and network security by William Stallings 2. cryptography and network security by Behrouz A. Forouzan
@raghavanchakravarthy4277
@raghavanchakravarthy4277 3 года назад
what is https...how do you corelate this with https protocol
@daisonraj9577
@daisonraj9577 5 лет назад
Thanks sir
@sangeethamanekar2421
@sangeethamanekar2421 5 лет назад
In ntwrk security pls explin in detail
@asishd.9557
@asishd.9557 2 года назад
Can you please share the references of this information, I have been looking out for SSL Architecture.
@srigokulnaths7020
@srigokulnaths7020 4 года назад
Thank u sir
@Ramy243
@Ramy243 6 лет назад
Thank u so much sir
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi ramya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@vaishnavibhamidipati5492
@vaishnavibhamidipati5492 4 года назад
Sir, Plz post video about firewalls and viruses
@popithachowdary4203
@popithachowdary4203 5 лет назад
Sir ssl and tls are same are not
@0007varun
@0007varun 6 лет назад
Beginners is very hard course
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi varun thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@0007varun
@0007varun 6 лет назад
Sir how many duration this course syber security.
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi varun it depends on the concepts and there is no limit for the concepts. i have uploaded around 26 videos which covers the minimum concepts.
@0007varun
@0007varun 6 лет назад
Sundeep Saradhi Kanthety thank you sir
@abhisheksingh833
@abhisheksingh833 5 лет назад
why dont you put slides?
@BuiTuyetMaiBDCAT
@BuiTuyetMaiBDCAT 3 года назад
sir, can you please add subtitle in your videos? I'm not a English speaker so it's quite difficult for me to understand all
@mmm763
@mmm763 5 лет назад
sir is compress length is in bit?
@sahilmukherjee421
@sahilmukherjee421 4 года назад
kal ajao sir barbeque mein dance karenge
@rpprashanth4235
@rpprashanth4235 5 лет назад
could anyone please pin here some good links to study about security in document form not video
@shivaprasad9876
@shivaprasad9876 6 лет назад
It is useful only for exam point of view, when it comes to real implementation, there will be no use with this tutorials.
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi shiva thanks for your comment i do agree with that i am doing these tutorials for the slow learners to attempt well in examinations. I think before going to the real implementation you have to get through the exams where these tutorials will be helpful.
@preetamchahar4475
@preetamchahar4475 5 лет назад
you explanation is quiet slow. same material can be expressed in 8-10 minutes also.
@nandkishorenangre3541
@nandkishorenangre3541 5 лет назад
There something called Speed:2X : |
@samuelsirclasses5594
@samuelsirclasses5594 4 года назад
@@nandkishorenangre3541 yes bro for his cmt even I felt the same. the proffiser intention is to understand easily if he think content should complete easily it's not a matter to him.First go through concept.
@sukanyabasu7090
@sukanyabasu7090 3 года назад
...in an enrypted format...
@pavanpolampalli5131
@pavanpolampalli5131 Год назад
Lag ekuva undi interest potundi vinali ante
@soumyadeeproy6611
@soumyadeeproy6611 5 лет назад
Only useful to know the contents,boring lectures
@abhisheksrivastava9788
@abhisheksrivastava9788 Год назад
Videos are very long
Далее
Макс Пэйн - ТРЕШ ОБЗОР на фильм
47:02
SSL, TLS, HTTP, HTTPS Explained
6:31
Просмотров 2,5 млн
Transport Layer Security (TLS) - Computerphile
15:33
Просмотров 471 тыс.
How Secure Shell Works (SSH) - Computerphile
9:20
Просмотров 812 тыс.
NETWORK SECURITY - MD5 ALGORITHM
31:30
Просмотров 134 тыс.