OMG -- Thank you so much for making this video and explaining in such simpler terms. Keep adding more IT Fundas and love your easy to remember OSI Layer Mnemonics.
Finally i understand. The other youtuber "network direction" was awful. I wanted to quit and find a new career. But you was able to easyily explain to me and now im not giving up and will watch your videos instead. I was so frustrated i could not understand this .. but your pictures and your explaining made me understand it
Sublime Teaching, State of the art explanation out of so many TSL and SSL videos on youtube you have covered all the salient features with so much ease and subtlety .......Bravoo
You moved my attentions the way you have explained with tables and formula,,, it was really hard for me to udst but now am able,, thumbs up sir now am happy 😊
I fall in love with the way you explained. the examples, pic you used are awesome. Thanks a lot !! Like how the https works (TLS - symmetric and asymmetric key ), would like to see the correlation with certificate (server certificate, client certificate, root certificate, CA-self sign certificate) while using https site and their flow step wise (when certificate comes into the step and when public/private key ). Will wait for this video and thank you once again for presenting such a wonderful explanation
Thank you, sir, It was a nice video simple to understand, and most importantly Your happy smiling face inspired me a lot. I have joined an online IT Networking and Architecture 3 months course if topics I need help.
God bless you, man. I spent a lot of time watching a tutorial it was hosted by my work company and I understood better and more listening you.. That example with that 70' guy with that letter made my day. Keep it up, we need people like you more and more. I wish you a nice weekend and many thanks from Romania, a very far away country by yours one.
Thanks Sahil I totally understand I try to make content based on various requests like these along with what I currently working in. But as I said I will continue to add value thats for sure 🙏
Lot of love from Kerala ❤️❤️❤️❤️ Very easy to understand, i spent 3 year from collage and nothing understood. But now i feel its too easy if the lecture having pleasent mind ❤️
Nice video, thanks for the detailed and clear explanation. But what about the CA Authority and digital certificates part, it would had been more better if that was covered in this video as well so in one go all the concepts would be clear. Should I expect a separate video please on this.
Excellent explanation! so sym key is lightweight, and asym key used to securely share the sym / session key. asym key used at the beginning to generate this sym/ session key. Then sym/session key keeps getting used for rest of the session!
Hello, Sir. Good Evening. Hope all is well. I've been watching all your videos. Fantastically explained Mainly in a very simple easy to understand language. could I please request you to make such videos on these courses - AWS Cloud (1) Fundamentals (2)Practitioners (3) Solution Architect -Asspociate, Big Data - (1) Analytics (2)Business Intelligence (3) All leading &in-demand Big Data technologies.Many Thanks. Kind Regards.
It's a very good explanation about how asymmetric session is created. But you do not explain how a hacker cannot read data or in other words is being thrown out of the game.
This guy gives one of the best examples to demonstrate Technical stuff.
The like 👍👍👍 is not just for the innovative poetry but also for the style and techniques you broadcast in your teaching ...👏👏👏
One of the best explanation on SSL so far. thank you....
wow! Thank you so much.. The Best video I have found explaining SSL. Now i cant wait to see the other videos you have.
OMG -- Thank you so much for making this video and explaining in such simpler terms. Keep adding more IT Fundas and love your easy to remember OSI Layer Mnemonics.
You have explained the complex topic in simplest way ..hats off
Finally i understand. The other youtuber "network direction" was awful. I wanted to quit and find a new career. But you was able to easyily explain to me and now im not giving up and will watch your videos instead. I was so frustrated i could not understand this .. but your pictures and your explaining made me understand it
Clearest explanation I've found so far. Thank you so much!
Thanks Ducel ☺️
Sublime Teaching, State of the art explanation out of so many TSL and SSL videos on youtube you have covered all the salient features with so much ease and subtlety .......Bravoo
Watching from Bangladesh. Please continue your networking Playlist, it's really deep and helpful.
Best video so far. On the point, no time waste. Thank you very much.
Thanks Salman ☺️
You moved my attentions the way you have explained with tables and formula,,, it was really hard for me to udst but now am able,, thumbs up sir now am happy 😊
thank you man! finally completely understood how symmetric encryption works
Very crisp way to understand many things.Thank you !
Really good amount of knowledge and understanding provided by this video about the SSL handshake 😊
Perfect and clearly understood, so many people told encryption, but u told what is being encrypted nice full information 😃
Much THANKS !! for the easy explanation. Kudos....
I just found this channel and oh my god this is gold, thanks for your excelent content and work!
Way more interesting, easy to understand. Thanks!
Very Beautiful Example of Encryption and Decryption 😍👍👍
Thanks Syed
Very well done! So clear. 👏 Thank you!
Best teacher ever, thank you very much
Excellent... Simple and concise.. You are a good tech person, if you can make complex things simple.. It was an example
Thanks Dipankar 😊
thank you very much please don t stop i m from morocco in north africa again many thanks
good explanation with simply language sir.
every one understands easily.
thanks
I have now got clarity on this topic..kudos
I fall in love with the way you explained. the examples, pic you used are awesome. Thanks a lot !!
Like how the https works (TLS - symmetric and asymmetric key ), would like to see the correlation with certificate (server certificate, client certificate, root certificate, CA-self sign certificate) while using https site and their flow step wise (when certificate comes into the step and when public/private key ).
Will wait for this video and thank you once again for presenting such a wonderful explanation
wonderful.. clearly explained everything. I was able to understand the concepts clearly. Om Gan Ganapataye namaha
🙏ॐ गं गणपतये नमः 🙏
Thanks a lot Anshu♥️
Thank you, sir, It was a nice video simple to understand, and most importantly Your happy smiling face inspired me a lot. I have joined an online IT Networking and Architecture 3 months course if topics I need help.
I am learning alot here than my classroom ... kudos .. great work guys
Thanks Kartik
the best and to the point explanation so far on youtube. Thanks for making videos.
God bless you, man. I spent a lot of time watching a tutorial it was hosted by my work company and I understood better and more listening you..
That example with that 70' guy with that letter made my day. Keep it up, we need people like you more and more. I wish you a nice weekend and many thanks from Romania, a very far away country by yours one.
Thanks Flavius for a generous feedback❤️
I'd like to see videos about WAF, token based authentication/SAML, SSO, REST API`s and security related content, Thanks!
Thanks Leandro for suggestions
Same here @IT ke funde team. There are many I know who have subscribed here and want to view the same. Please consider it strongly.
Thanks Sahil I totally understand I try to make content based on various requests like these along with what I currently working in. But as I said I will continue to add value thats for sure 🙏
Please sir make video on SAML, LDAP, Kerbose and IP surrogate authentication
Jaldsejaldseyoutbepramesejabejje
Ssl communication understood clearly 😊 thanks..
Thanks Abhi☺️
Poetry & lecture was fantastic.!!!!
wow you're good at teaching, i went through lot of blogs to understand about HTTP and HTTPS but you explained really well
Lot of love from Kerala ❤️❤️❤️❤️ Very easy to understand, i spent 3 year from collage and nothing understood. But now i feel its too easy if the lecture having pleasent mind ❤️
Crystal clear explanation. Thank you!
Conteúdo excelente. Muito obrigado!
Nice video, thanks for the detailed and clear explanation. But what about the CA Authority and digital certificates part, it would had been more better if that was covered in this video as well so in one go all the concepts would be clear. Should I expect a separate video please on this.
Thank you sir it is amazing teaching go head god bless you
Thanks Ani
Wonderful explanation
Thank you for the simplified explanation, really helpful.
One of the best videos without beating around the bush with every minute detail. Good Job Sir !!!
very well explained, thank you
Great session for HTTP and HTTPs. just need one clarification what is the role of SSO certificate in browner whenever connection to any website
All I can say is thank you ❤❤️you really assisted me with understanding this topic 🙏
This explanation is top notch. Thank you so much. Till date best youtube video on https .
Glad it was helpful!
Very Nice presentation . Explanation is crystal clear. 🙏
Sir the volume on these new set of videos seems a bit less as compared to the older ones you had released. Your explanation is top notch no doubt !
Thanks Arunabha for this observation I will check and try tonsee the bottleneck
great teacher/professor, etc.
Thanks for the easy explanation
Excellent explanation! so sym key is lightweight, and asym key used to securely share the sym / session key. asym key used at the beginning to generate this sym/ session key. Then sym/session key keeps getting used for rest of the session!
Thank you for your clear explanation.Awesome!
Thanks Brother ☺️🙏
Hello, Sir. Good Evening. Hope all is well. I've been watching all your videos. Fantastically explained Mainly in a very simple easy to understand language. could I please request you to make such videos on these courses - AWS Cloud (1) Fundamentals (2)Practitioners (3) Solution Architect -Asspociate, Big Data - (1) Analytics (2)Business Intelligence (3) All leading &in-demand Big Data technologies.Many Thanks. Kind Regards.
Simply awesome...outstanding explanation...😍
How wonderful!!!! You are the best!!!!!!!
Thank you for this invaluable free lesson! - alex, singapore
Thanks Alex 😊😊
Your teaching is very nice
Thank u so much sir
So far so good, Best Explanation...💡💡💡💡💡
As a next step, where does the Certificate Authority fit into the picture ? 😕😕😕😕😕
Sir it is awesome explanation. thanks for Knowledge.
You are excellent bro, you deserve more..
I really liked the content, very understandable...but I am still giving thumbs up for the poetry you wrote😊
Thank you for the great explanation, you help me to understand much better.
Thanks Eric☺️
Thanks for explaining in such an easy way, a big thumb's up.
Brilliant! If not already covered in another of your videos, VPN & split tunneling. Thank you!
Thanks for sharing these ideas
Thanks, great job
Wonderful session 👏
Well explained 👍🏻
Great Explanation Sir, Thank you.
Thanks Jaydeep ☺☺
Awesome ❤🎉
Very well explained..keep posting such videos...
Very Helpfull
Thanks a lot sir! This was very helpful 🙏🏼
Thanks Amulya ♥️
Very well explained in simple terms
Thanks Aru
Awesome, your presentation is really great
Simple and good explanation. Thanks
Thank you very much for your explanation
Learning so much from you. Thank you for sharing your knowledge.
These guys are really really good and does awesome job explaining.
Awesome. I understood clearly
Thanks Sowmya🙏☺️
Thanks sir!! Very well explained difference between HTTP and HTTPS and especially the SSL Encryption part 🙂
Awesome Job! Thanks!
well understanded sir greate explanation
Thanks Guntakala
really good video on SSL, HTTPs protocols!
Beautiful presentation.
Excellent Video. keep going my friend
good lecture your explanation type are also awesome
Thanks Asgari
Nicely covered everything. Thanks
Thank you Shashi ☺️
Nice explained Sir,. thank you very much for wonderful class for us ..
Could you please create Active Directory class .. pls
amazing
I love your OSI model nugget more than Dominos pizza now :D
Gracias from Texas 👍
Very useful 👍... We hope more videos on VRRP, OSPF and LDAP....Thanks
Thank you. Nature bless you abundantly
Very beautifully described.
Thanks Bhim
It's a very good explanation about how asymmetric session is created. But you do not explain how a hacker cannot read data or in other words is being thrown out of the game.
Such a great explanation, thank you so much !
Thank you sir
It's really helpful thank you Sir
Thanks