How HTTPS Works (...and SSL/TLS too)

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 153

  • @CraigForant
    @CraigForant 3 года назад +92

    Jeremy....I don't think many people realize the significance of the short and subtle pauses when you switch from the drawing to looking into the camera to talk to us. This style of teaching is incredibly engaging and allows the viewer's mind to refocus and absorb what they are hearing. Love the usage of different techniques and methods. Please keep doing what you are doing. You have a superhuman ability to engage your audience and break down the most difficult of subjects in the most sensible way. You inspire me on every product demo and training session I present to my clients. I would love for you to create a series on how to be a better presenter!

    • @kalkalasch
      @kalkalasch 2 года назад +1

      troof

    • @Viatto
      @Viatto  2 года назад +2

      Hugely appreciate your kind words Craig. I frequently try different styles and never know what “works.” :-)

    • @nurjehankarim9787
      @nurjehankarim9787 Год назад

      You are amazing

  • @banerjeearkajit
    @banerjeearkajit 3 года назад +17

    I have never seen anyone explain this concept so flawlessly. Appreciate you so much, Jeremy.

  • @danieltnaves
    @danieltnaves 2 года назад +1

    Excellent video... The clarification, in the end, about how the signature is verified and how the browser does that was perfect! Thanks!

  • @almasabdrazak5089
    @almasabdrazak5089 3 года назад +4

    "client encrypt session key using server's public key" that's the sentence I was looking for , it was so confusing reading other blogs saying that encryption starts as asymmetric and then switches to symmetric, this single sentence makes it clear how it works, thanks a lot

    • @matrix9046
      @matrix9046 2 года назад

      Exactly Same here 🤌

  • @JorgeAlmazan
    @JorgeAlmazan 3 года назад +38

    Best explanation of SSL/TLS I’ve every seen. Great job Jeremy!

    • @transformer889
      @transformer889 3 года назад

      Good, now you can explain it to the rest of us.

  • @MauroEnding
    @MauroEnding 3 года назад +3

    how many knowledgeable people we may have in the world if we all have someone like him teaching this way! wow! 19.38 mins being more productive than toons of classes I have been to! hands down to you!

  • @1200Moises
    @1200Moises 2 года назад

    Software engineer here. This is the best explanation I have of ssl/tls works. Thank you!

  • @pootchie28
    @pootchie28 Год назад

    Iam where Iam now because of you. 2015 I decided career switch, 30 days of career break just watching online - Jeremy's videos on CCNA, after 2 months landed a job. Thanks so much!!

  • @ajaygulani3086
    @ajaygulani3086 3 года назад +3

    Watching you teach anything is like binge watching some very addictive TV show! When this video finished I felt the almost 20min just go by so quickly, and leaving me wanting to watch the next video right away. This was so engaging!
    I always thought I knew SSL/TLS, but as you mentioned there were certain things where pieces of puzzle were just missing and after watching this video I have those pieces!
    And I have watched you videos on CBT Nuggets for my CCNA training and you managed to break down something, that for me was so complex for me to understand by other means (reading books, other training courses) where I thought there is no way I will understand this networking stuff, to explaining it in such a way that anyone can relate to and then really understand it!
    So thank you for all the teaching that you do!

  • @asemmoqbel982
    @asemmoqbel982 2 года назад

    One year later and I just watch this now.. I can't say how much helpful this video and the information is delivered so smooth especially the cryptography part.. Thank you jermey and the video is saved for future needs.

  • @lingaiahdanda6214
    @lingaiahdanda6214 10 месяцев назад

    you are an addiction jeremy. your method of teaching is unique. Thank you!

  • @antonioskokiantonis7051
    @antonioskokiantonis7051 2 года назад

    I've seen a very passionate guy trying to teach fundamentals. Really appreciated and subscribed of course!

  • @chittranjankumar5769
    @chittranjankumar5769 7 месяцев назад

    Your effort will not go waste the way you are tried to feed and inculcate the content in viewers mind. Hats off to you.

  • @RockHopper245
    @RockHopper245 3 года назад

    I've yet to find a better teacher than Jeremy who can take any subject and present in a way that anyone can understand. Top work, and thanks👍 🙌

  • @fhfolbf
    @fhfolbf 2 года назад

    Sir, your passion towards the topic simply gets us hooked in no time and make us want to stay on till the end. Kudos to you for all the efforts!

  • @MichaelWalmsleyJr
    @MichaelWalmsleyJr 2 года назад

    Fantastic explanation for someone like me who has been doing front end development for years, but never fully understand everything that was going on with https. Definitely filled in a few holes in my understanding of the process! Thanks!!!

  • @MinhLêNguyễnQuang-k4z
    @MinhLêNguyễnQuang-k4z Год назад

    I am absolutely clear how ssl works. Tks for your spending time!

  • @xlugerxD
    @xlugerxD 3 года назад

    I don't usually comment, but maaaaaan, you are awesome... from your teaching methods to your charisma, keep the good work! Cheers!

  • @mk325ef
    @mk325ef 2 года назад

    "Wait a second!"..."I'm going to put this to bed right now...".. Awesome video. Thanks for trying to simplify it.

  • @mathewkargarzadeh3158
    @mathewkargarzadeh3158 3 года назад +1

    Thank you fro putting such a concerted efforts explaining this convoluted subject ( SSL/TLS ) in plain English. appreciated for sharing your working knowledge. Mat.

  • @tonynunez6539
    @tonynunez6539 2 года назад

    Great explanation of a process that even most experienced IT professionals in the DOD don't even understand. I am constantly struggling to explain the process to them.

  • @EvelioOpenMat
    @EvelioOpenMat 3 года назад

    Brother I love you........I am studying for security plus and I understand alot but you just made everything click together.

  • @damokerbs5856
    @damokerbs5856 2 года назад

    That's some damn good teaching here I wished I brought popcorn with me. Thank you for the great content !

  • @franchise2570
    @franchise2570 Год назад

    This is awesome, you did an excellent job in explaining the concept! Bravo to you sir. 🙂

  • @base4our
    @base4our 2 года назад

    At last, a clear explanation of SSL/TLS! Thanks for this!

  • @forwardfocus8649
    @forwardfocus8649 2 года назад

    This is a brilliant, informative, talented piece of teaching. I'm putting it on my twitter account. I agree with Craig that the engagement is amazing. This is how you want to teach using electronic mediums.

  • @1snico1
    @1snico1 3 года назад

    Mate, I really don't comment on youtube very often but I need to say this - absolutely brilliant video. Your method of explaining and teaching is better than virtually anything I've ever seen, both online or in actual courses (and I've been to dozens). Certificates are something that have remained as a bit of a black hole for me in my career and finding a video like this that so succinctly re-enforces everything in my head is just amazing. Definitely subscribing.

  • @garryn123
    @garryn123 3 года назад

    Hilariously serious...very engaging. You're a bit of a 'nut case' with this and I mean that in the nicest way - keep up the good work! 👍😆

  • @victorramiso4309
    @victorramiso4309 3 года назад

    Its awesome how fast you speak when you get all excited when explaining and then i get all hyped as well love all your vids

  • @jiangfrank6283
    @jiangfrank6283 3 года назад

    this is best , not one of the best explanation on SSL/TLS which I have been seen , Great !!!

  • @aimtiaz_
    @aimtiaz_ 3 года назад

    Fantastic video. One of the best that describes SSL & HTTPS out there. Would be great if you can do a video on the intricacies of certificates - root, intermediate, leaf etc.

  • @ashwanthbalajir5153
    @ashwanthbalajir5153 2 года назад

    That's really heavy. But you know this is the video where I have understood the process in a clear manner.

  • @027vishal
    @027vishal 2 года назад +1

    Thank you Jeremy, One of the best explanation I have ever seen on HTTPS

  • @oebelus
    @oebelus 2 года назад

    The best explanation ever! Thank you so much for this video.

  • @ranti013
    @ranti013 Год назад

    one of the best videos on the internet. Thank You.

  • @manuelaraica3964
    @manuelaraica3964 3 года назад +1

    Thanks Jeremy! Always love that passion that you bring sharing the knowledge.

  • @syedamin6690
    @syedamin6690 3 года назад

    This is the best video on the internet on this topic.

  • @boysweetpotato6575
    @boysweetpotato6575 3 года назад

    man you're a legend! you're the one who made networking understandable for me during my college days and now you still rockin and im still learning from you. such good stuff!
    Edit: Helped me aced my job application last week! im really happy i bumped into this content! Thanks Jeremy, All the best!

  • @EBay_Dev
    @EBay_Dev 9 месяцев назад

    after 2 3 years, finally I got it and I got it right :)) thank you so much

  • @GauravSingh-fu3dn
    @GauravSingh-fu3dn 3 года назад +1

    Loved the pen 🖊 and paper 📄. Nice explanation 😊

  • @aliyousef9580
    @aliyousef9580 10 месяцев назад

    Huge effort , thanks jeremy ,keep watching this video and cant get enogh ..
    Many thanks from syria.

  • @Arayankodesouth
    @Arayankodesouth 3 года назад

    just subscribed and liked as soon as watched this.! awesome content in the RUclips today

  • @egemendemirbek
    @egemendemirbek 3 года назад

    Really appreciate your efforts... I'm looking forward to take and complete the entire series ... please don't be late :)

  • @pierrekosmas2405
    @pierrekosmas2405 3 года назад

    Great demo, many THANKS Jeremy for this video.

    • @Viatto
      @Viatto  3 года назад

      My pleasure!

  • @timurius1988
    @timurius1988 3 года назад

    Thanks Jeremy! You have explained it very simple as usual :)

  • @travelwalk539
    @travelwalk539 3 года назад

    I found this video very helpful and it helped me to understand the whole HTTPS protocol. Great work done!

  • @vighneshpp
    @vighneshpp 2 года назад

    Incredible explanation! Subscribed!!!

  • @LaurentYaish
    @LaurentYaish 3 года назад +1

    Did a great job at explaining a complex concept. Would give 2 thumbs up if I could!

    • @kalkalasch
      @kalkalasch 2 года назад

      you can't, you can do only 1

  • @bhaskartaneja6293
    @bhaskartaneja6293 2 года назад

    I liked it sir , the way you explained and your want to have that be learnt. I suppose I watched your video first time.
    Thanks

  • @josephbais7463
    @josephbais7463 2 года назад

    The best ever https explanation.

  • @miaturner5403
    @miaturner5403 3 года назад +2

    I finally understand this concept. Thank you!!

  • @NFerrari97
    @NFerrari97 3 года назад

    My head hurts after this video but amazing explanation as always !

  • @mrscbw1
    @mrscbw1 3 года назад

    Awesome explanation.. subscribed!

  • @basvarajsb3857
    @basvarajsb3857 8 месяцев назад

    Thank you, Mr Lahey. 🍻

  • @elnurvalikhanli6783
    @elnurvalikhanli6783 2 года назад

    Thanks for clear explanation! Good job!

    • @Viatto
      @Viatto  2 года назад

      Glad it was helpful!

  • @Ballzowt
    @Ballzowt 2 года назад

    Nailed IT! Thank you very much!

  • @RashadKhan007
    @RashadKhan007 3 года назад

    Was watching the same topic on ccna labs for real world and then this popped up!! Thank

  • @fokkedeboer2342
    @fokkedeboer2342 3 года назад

    This deserves more views

  • @sparkforcontracting8877
    @sparkforcontracting8877 3 года назад

    One of the best videos every explaining this topic. really thanks that helped a lot.

  • @admyc8172
    @admyc8172 3 года назад +1

    Thanks for the video. I thought that with Diffie Hellman there was no need to keep the communication to set up the symmetrical key encrypted. If so, in your example, why is the web server's public key used by the client to send information to set up the symetrical key?

  • @gourabdey91
    @gourabdey91 3 года назад

    Excellent explanation

  • @chadsexinton
    @chadsexinton 2 года назад

    Amazing explaination

  • @tund3_
    @tund3_ 2 года назад

    Thanks a lot Jeremy, very well explained.

    • @Viatto
      @Viatto  2 года назад

      Glad it was helpful!

  • @udays2
    @udays2 Год назад

    You killed it Sir!

  • @leonardo.eliziario
    @leonardo.eliziario 3 года назад

    Amazing explanation!!!

  • @alexeyvasilkov436
    @alexeyvasilkov436 3 года назад

    great work Sir! For some reason you remind me of Saul Goodman from the Breaking Bad or Better call Saul series.

    • @Viatto
      @Viatto  3 года назад +1

      Wow...Thanks?

  • @danielmarques433
    @danielmarques433 2 года назад

    Thanks, your explanation is awesome. I finally understand how the HTTPS stuff works.

    • @Viatto
      @Viatto  2 года назад

      Glad it helped!

  • @agustinzago9180
    @agustinzago9180 3 года назад +1

    If the CA encrypt their signature with their private key and u need their public key to decript it. Wouldnt that permit a hacker to decript the CA signature in between the web browser and the server? Since the public key is on public demand?

  • @swethasasikumar1234
    @swethasasikumar1234 3 года назад

    Thank you! That was very helpful!

  • @kailasphanashikar8587
    @kailasphanashikar8587 2 года назад

    Greate job...thanks for the video...

  • @gupttura2766
    @gupttura2766 3 года назад +2

    Tylenol please....but I do appreciate your efforts

  • @JinathPremaratne
    @JinathPremaratne 2 года назад

    super, I watched 3 times and got it. the is the best

  • @tamojitchakraborty3871
    @tamojitchakraborty3871 3 года назад

    Simply Awesome

  • @sid0000009
    @sid0000009 3 года назад

    can you also please make a video on mutual TLS on similar line. Great simplification of a complicated topic.

  • @diaahanna8882
    @diaahanna8882 2 года назад

    thank you for the clear explanation.

  • @davidalfaromorales3792
    @davidalfaromorales3792 3 года назад

    Great video, Thanks. Subscribed!!

  • @kalkalasch
    @kalkalasch 3 года назад +1

    Jeremy for presidnet.

  • @kuqezi294
    @kuqezi294 3 года назад

    Thank you for this video and nice explaination ! You helped me so much !

  • @samdagar4447
    @samdagar4447 Год назад

    Brilliant mate!

  • @dominadorrey7669
    @dominadorrey7669 3 года назад +1

    Really helped me Jeremy! Thank you!

  • @hesham02
    @hesham02 3 года назад

    This was an excellent explanation. Thank you!

  • @harrysearia1784
    @harrysearia1784 3 года назад

    Definitely gonna rewatch this! X4

  • @pemfiri
    @pemfiri 3 года назад

    Thank you for posting this video. I am surprised everybody else seems to have understood things. i am still confused you introduced the phrase "private key" in the beginning, but did not mention it where it comes from and where its used in the process. you said the certificate includes the public key, but then later you said half of it is actually used /sent for encryption? what is the relationship between session key and private key ? I think all of this can be explained with a concrete example. pick a few numbers call one public key, call another private, etc....

  • @proneetray
    @proneetray 3 года назад

    Thank you very much for very well explained.

  • @johnvardy9559
    @johnvardy9559 Год назад

    Great Video. So educated

  • @pj3739
    @pj3739 3 года назад

    You the man Jeremy! This really explains this topic.
    Bit of a lingering question as to when the CA encrypts the signature with it's private key, is it not giving away something, I know it doesn't give the key but like I'd to hear a bit more on this sometime.

    • @Viatto
      @Viatto  3 года назад +2

      Keep in mind that the PUBLIC keys of the "global CAs" (aka well-known CAs) are embedded in every OS/Web browser. So...that tells you that ANYONE can "decrypt" data that was originally encrypted with the CA's PRIVATE key (not that they "get" the private key, but that they can decrypt data that was encrypted with the private key). So...when a CA "signs" a certificate, what it means is they encrypt their name with their private key and put that data on the certificate... EVERYONE in the world can decrypt that signature, which validates that it came from the REAL CA.

    • @pj3739
      @pj3739 3 года назад

      @@Viatto Got it, thanks Jeremy, the private key used in a different way in asymmetric encryption, yin and yang, private key still secure.

  • @denisdemontes7737
    @denisdemontes7737 2 года назад

    Great video, thanks

  • @sa77if
    @sa77if 3 года назад

    Thanks Jeremy
    what if (let's encrypt) used as CA?
    I don't think its already installed inside any browser
    thanks

  • @olivierdeswart9961
    @olivierdeswart9961 6 месяцев назад

    Great vid, thanks!!

  • @guillaumelavigne2054
    @guillaumelavigne2054 2 года назад

    Thank you so much !!

  • @stephengoh5456
    @stephengoh5456 3 года назад

    Super helpful! Love it. Thank you.

  • @marwandahbi2650
    @marwandahbi2650 3 года назад

    Thank you!

  • @jimg1928
    @jimg1928 2 года назад

    QUESTION: The initial request/response HTTPS communication between client and server are not encrypted, except for the CA certificate in the response?
    If so, what prevents a hacker from seeing the initial client request to the server, and intercept the response from the server,
    containing its CA certificate, decrypting the certificate with the CA's public key, get the public key in the certificate,
    and use it to encrypt its own symmetric key and send to the server, thereby bypassing the client, and establishing a bogus dialog between racker and server?

  • @aruranganeshan2951
    @aruranganeshan2951 3 года назад

    Thank you for this video, and which stage "Diffie hellman" key exchange happening?
    client(pub key { "Diffie hellman" factor of Client } )------------------> Server
    client

  • @shyamsunder4008
    @shyamsunder4008 3 года назад

    Awesome. This one is worth a million views

  • @tejasc400
    @tejasc400 3 года назад

    thank you so much, you're the best teacher

  • @RahulSingh-ki3og
    @RahulSingh-ki3og 5 месяцев назад

    As the protocol itself is stateless does the session key generates for every request or how does it identify the session key and client?

  • @keepevolving7968
    @keepevolving7968 Год назад

    Wonderful

  • @jeremiahkumah1091
    @jeremiahkumah1091 3 года назад

    Love the way you teach!

  • @nqabayetugwaza5335
    @nqabayetugwaza5335 3 года назад

    Jeremy is the best