Public Key Infrastructure PKI Concepts

Поделиться
HTML-код
  • Опубликовано: 11 окт 2024

Комментарии • 63

  • @danieleberhardt235
    @danieleberhardt235 5 лет назад +14

    One of the BEST video at explaining a subject! very clear, precise/detailed, visual presentation 100%. SIMPLY AMAZING!

  • @Damorg
    @Damorg Год назад

    The best video explaining PKI! Thank you!

  • @minstreltokunbo
    @minstreltokunbo 2 года назад

    Great video, felt like someone glued the understanding of PKI. I can explain it even in my sleep. Thank you

  • @jerrywalz6308
    @jerrywalz6308 3 года назад +1

    Excellent explanation. Have to understand the fundamental concept of the Asymmetric key exchange. Maybe some people get it without exploration, but even so, it helps to understand everything with the CA and RA roles.

  • @subbaraovelivela9887
    @subbaraovelivela9887 4 года назад

    Very helpful and more informative thanks for sharing the video

  • @suchandra252
    @suchandra252 5 лет назад

    Thank you... First time i got clear picture on PKI by this video

  • @subamani77
    @subamani77 10 лет назад +74

    Around 5:20, you say that You request Alice's certificate from CA. This is incorrect. In SSL/TLS, You never ask Alice's certificate from CA. During the handshake, Alice sends her certificate to You and You verify Alice's certificate from the CA's Root Certificate.

    • @lucasgritziotis3119
      @lucasgritziotis3119 9 лет назад +8

      You are correct!

    • @decasT
      @decasT 9 лет назад +4

      +Subash Manikandan Mr., that is true for SSL (a particular implementation of a PKI concept), but could it be that she is just giving a general definition of the PKI concept? Am i wrong? Cheers.

    • @germancastillo681
      @germancastillo681 8 лет назад +7

      +decasT , yes I guess she was giving general information about PKI. the point of Lucas is correct and is great to keep that in mind, since some other users that are just starting on the PKI world may get confuse. However it is a great video to understand PKI basics, we are all human looking for perfection but we make mistakes.

    • @IDisnotscience
      @IDisnotscience 8 лет назад +2

      She says this. If you watch the video again at 5:07

    • @vvvvvv2086
      @vvvvvv2086 5 лет назад +1

      A bit of a moot point really.
      During SSL, you initiate the handshake so technically it is you who is asking and Alice is sending.

  • @tennysonchildofgod9992
    @tennysonchildofgod9992 Год назад

    Top notch presentation. Thank you.

  • @claudine7773
    @claudine7773 Год назад

    Excellent video!

  • @bendunaway8296
    @bendunaway8296 3 года назад

    Great video, informative, and you have a perfect voice for instruction.

  • @sanjeevmaheve7282
    @sanjeevmaheve7282 8 лет назад +1

    Very nice video tutorial, explained in really simple words. Thanks

  • @virendrapathronia
    @virendrapathronia 2 года назад

    great video

  • @iamdedlok
    @iamdedlok 3 года назад +1

    The way she says Beautiful isn't it while highlighting the hexadecimal bits. I just fell in love.

  • @Boneshanks
    @Boneshanks 4 года назад

    Thank you. You explained some of the material better than Cisco net academy

  • @sarathpavithra
    @sarathpavithra 7 лет назад

    great video. Very clear explanation about PKI. Thankyou

  • @ryukomatoi2152
    @ryukomatoi2152 3 года назад

    thank you for this amazing, Excellent presentation

  • @AbduBwika
    @AbduBwika 2 года назад

    Hats Off !! Explanation is top notch!!!

  • @tarunkumar-en3vt
    @tarunkumar-en3vt 10 лет назад +1

    Very nice video, in a brief and precise manner, thanks for uploading, you made my day!!

  • @eduardoanhaia
    @eduardoanhaia Год назад

    Thank you, this really help me!

  • @vigneshvicky-kk9mu
    @vigneshvicky-kk9mu 4 года назад

    Nicely explained and nice voice

  • @reizhustenistdoof
    @reizhustenistdoof 6 лет назад +1

    this video is nice...
    Contains all the important information and concept :D
    Used it to repeat the stuff I learned for class

  • @DanKardell
    @DanKardell 7 лет назад

    Great job explained concepts. Would love to see some real world examples at ta terminal of how to go about each of these concepts.

  • @pathanaslam
    @pathanaslam 5 лет назад

    Great video. Concepts were very well explained

  • @CONNECTING3NARESH
    @CONNECTING3NARESH 8 лет назад

    Real nice one.

  • @olubodeakinbolusire1531
    @olubodeakinbolusire1531 9 лет назад

    She is Great! Thanks make a lot sense now!

  • @tayabhussain1997
    @tayabhussain1997 9 лет назад +3

    very well explained....

  • @newkool100
    @newkool100 9 лет назад

    Very well explained. Thanks for the video and sharing it.

  • @IDisnotscience
    @IDisnotscience 8 лет назад

    Where are the other videos? Thanks for posting this one. It was a big help.

  • @sagarshah275
    @sagarshah275 9 лет назад +1

    Very nicely explained...thanks.

  • @ofereran7659
    @ofereran7659 8 лет назад

    Great video

  • @mannyv2270
    @mannyv2270 7 лет назад

    Nice easy explanation

  • @srikrishnarr6553
    @srikrishnarr6553 4 года назад

    just got it correctly ..thank you so much

  • @zman780
    @zman780 8 лет назад +1

    BEST TEACHER EVER!

  • @Scordroid
    @Scordroid 8 лет назад

    Great Video..Thanks a lot.

  • @jasonzackey
    @jasonzackey 6 лет назад

    nicest part about this video is her VOICE :)

  • @wenfengluo737
    @wenfengluo737 7 лет назад +1

    At 8:42, why would expired certs be on the CRL?

  • @HussainiIbrahimhilinks
    @HussainiIbrahimhilinks 10 лет назад

    Nice video. It really helped me a lot.

  • @mrunalshende1663
    @mrunalshende1663 5 лет назад +1

    thank you .....

  • @DaveyPOfficial
    @DaveyPOfficial 9 лет назад

    RadwanoVetch Great video well done thanks for posting my classmates at College got a lot of help out of it

  • @AnkitSingh-vd7ti
    @AnkitSingh-vd7ti 4 года назад

    Still a question, that means there is some relation between public and private key. Else a msg encrypted with public key cant be decrypted with private key.

  • @lordchickenzz
    @lordchickenzz 10 лет назад

    Hell yeah makes sense now thanks!

  • @sudhanshupal4427
    @sudhanshupal4427 5 лет назад

    Thanks a lot Mam so much !!!

  • @ilhamsyuhada-vti8069
    @ilhamsyuhada-vti8069 10 лет назад

    Thank you for your sharing :)

  • @hallielewis9561
    @hallielewis9561 9 лет назад

    love this.think you.

  • @walterbyrd8380
    @walterbyrd8380 7 лет назад

    If I created both the public key, and the private key; then how is it that only Alice has the private key?

    • @awkb777
      @awkb777 7 лет назад +5

      you created your own private key to use to decrypt messages that other ppl are sending to you. these messages they sent to you were encrypted with your public key on their computer before they sent them.

  • @Mooodyrecepies
    @Mooodyrecepies 6 лет назад

    How is it decided that which CA to contact ? On what basis ?

  • @abhishekrout5681
    @abhishekrout5681 5 лет назад

    Is PKI compatible with HAProxy?

  • @lendelgalyna1042
    @lendelgalyna1042 6 лет назад

    Thanks

  • @subhasishbagchi8902
    @subhasishbagchi8902 Год назад

    can you send this ppt actually, I have an presentation in this week about public key infrastructure.

  • @fariman-kashani
    @fariman-kashani 6 лет назад

    thanks

  • @ibrahimnadir
    @ibrahimnadir 7 лет назад +2

    that awkward moment that no one noticed 5:50