These videos played a small part in helping me study and pass my CompTIA A+ and Network+ exam. Even though I've now been qualified in these fields, I like to still come back to refresh my memory with your videos. Thank you!
Really great to see Brilliant sponsoring PowerCert. Imo it's a little bit of a marker of a channel's success to be sponsored by certain companies, and I consider Brilliant to be one of them. Go PowerCert!
You are my saviour, currently I am implementing the IPSec rule from the controller to windows node. This video gave a lot of information. Thanks a lot buddy
Working in roadway transportation, these videos' visuals and transcripts are so well done they help me to better communicate and understand networking. Know these videos are helping so many people. Thank you!
It feels cool when you have literally watched all of the videos of this channel and after couple of weeks,another brand new brilliant video pops up on the front page.wow,thank you my friend
Great video However I have noticed a reduction in the videos that you produced. I am grateful for the videos that you make I just wish they were more of them for me to learn more.
Brilliantly explained in a simplified way. I’ve watched this being explained by other instructors and how you explained it actually makes sense. Thank you!
Hey Man I just wanted to take a moment to thank you so much for these helpful animations. I’m a visual person and animation is the only way I learn. And your videos make it so easy for me to understand concepts I work with on a daily basis but for some reason havnt been able to really understand till I watched your videos. Thank you so much man. God bless you.
Good overview, clearly explained like nowhere else. But moderator might have also explained two major paradigms: S2S vs C2S. What is C2S VPN? A client-to-site VPN is a type of VPN that connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate or cloud network. It allows the device to access the network resources and services securely, as if it were physically connected to the network.Mar 4, 2023 What is S2S VPN? What is Site-to-Site VPN | Fortinet Site-to-Site VPN Defined (Gateway router to Gateway router, typically separated by public internet and great geogrraphical distance): A site-to-site virtual private network (VPN) refers to a connection set up between multiple networks. This could be a corporate network where multiple offices work in conjunction with each other or a branch office network with a central office and multiple branch locations. S2S IPSec VPNs operate in Layer 3 of the Seven Layer OSI Model. Where do C2S VPNs operate? What different kinds of C2S VPNs exist?
Fantastic educational ❤❤❤ Please make an episode about the difference between GPT and MBR...I am having difficulty when creating software for the computer
Only a month before you uploaded a video but seems like an year before. Such is the quality and content of your video that is worth the wait. One kind request could you please start doing videos on security aspect more as others who do mostly concentrate on the entertainment purpose rather than the education aspect. Thank you very much ❤🙏👍👌👏
Can you make a video on Mac address randomisation This term I came across a device like USB type a/c to lan adapter, the moment I connect it to different CPU I can different Mac address. (HP type c to lan I faced this) I used one more from tp-link where I did not face issue of Mac address variation. Please see if you can make a video on this
Dear Sirs, I am senior lecturer at a Hungarian University. I have to produce e-learning materials in Hungaryian language. Can I ask, which animation software do you use? (I do not would like to make a competitor RUclips channel!) Thanks, Dr. Adam Horvath
There's a class of encryption algorithms which are used for creating a secure connection over an insecure channel. The most basic of which is the Diffie-Hellman Key Exchange. There's a computerphile video that goes over the basics without going into the mathematics. Or there's a Wikipedia article on the subject. ruclips.net/video/NmM9HA2MQGI/видео.html en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
There's a public and private key. Public key is only useful if you know the private key, so people intercepting the public key is no big deal. If you want to send a message to your friend, you get your friend's public key and use that to encrypt the message. That message is only decryptable using your friend's private key, so your friend is the only one who's able to make sense of the encrypted message.
SSL and TLS are both implemented at the application layer. So web browsers and web servers for TLS, and SSH clients and servers for SSH. IPSec is used to secure the connection between two networks, not between two machines. The difference being that the connection is not encrypted en-route through the initial network, or once decrypted at the other end. Ideally you would want to use another form of security atop IPSec.
Can You Please Make a video Explaining How Routers Split Bandwidth Between Devices, I Heard If Say U Got 500GB P/Sec speed it is Shared Between All The Devices You Have Inside the House So the more devices You have online the less Bandwidth they'll have, i dont get it please make an explanatory vid 🎉
Visit brilliant.org/PowerCert/ for a free 30 day trial. The first 200 people will get 20% off their annual premium subscription.
These videos played a small part in helping me study and pass my CompTIA A+ and Network+ exam. Even though I've now been qualified in these fields, I like to still come back to refresh my memory with your videos. Thank you!
Thank you professor powercert! You helped me pass the Security+.
Really great to see Brilliant sponsoring PowerCert. Imo it's a little bit of a marker of a channel's success to be sponsored by certain companies, and I consider Brilliant to be one of them. Go PowerCert!
You are my saviour, currently I am implementing the IPSec rule from the controller to windows node. This video gave a lot of information. Thanks a lot buddy
You're welcome!
This channel is a treasure for learning tech
Working in roadway transportation, these videos' visuals and transcripts are so well done they help me to better communicate and understand networking. Know these videos are helping so many people. Thank you!
It feels cool when you have literally watched all of the videos of this channel and after couple of weeks,another brand new brilliant video pops up on the front page.wow,thank you my friend
next time ospf and bgp maybe? i still learning about it
That would be awesome, to understand the OSPF LSA's and the BGP Attributes.
Putting my vote in for BGP.
yes
How about saying ‘thank you’?
I hope such! Ospf would be amazing for upcoming exams
Щиро дякую за інформацію і її подачу! Процвітання каналу!
I love these. You are amazing at explaining computers you got me through many tests. :)
This is a fascinating and complex topic. Thanks for this snippet to help provide additional visuals (visuals always help, I think).
Great video
However I have noticed a reduction in the videos that you produced.
I am grateful for the videos that you make I just wish they were more of them for me to learn more.
Your videos are the clearest that I have encountered so far. Thanks!
Brilliantly explained in a simplified way. I’ve watched this being explained by other instructors and how you explained it actually makes sense. Thank you!
I have been following your channel for a long time...I hope you will create more and more lessons and not make us wait too long.🎉❤❤
Taking my Net+ tommorow, perfect time for you to post this, thank you!
Goodluck!!
@@KC-kp9nq passed🙏 shoutout mr.powercert
@@supergunk congrats bro!!
This guy is a master at clearly demosntrating how something works.
It makes me happy you got a sponser! Your videos deserve it.
Thank you!
looked at all the other videos. this guy still explains the best!
This channel is a treasure for learning tech’ thank you 🙏
This channels is a treasure
Amazing video, great explanation, easy to understand, please continue launching new videos , thank for your time ! We appreciate it !
Hey Man I just wanted to take a moment to thank you so much for these helpful animations. I’m a visual person and animation is the only way I learn. And your videos make it so easy for me to understand concepts I work with on a daily basis but for some reason havnt been able to really understand till I watched your videos. Thank you so much man. God bless you.
Followed, liked and turned the bell on. God bless you adn your family Mr, you are a good man.
Thank you, thank you, thank you!!! Keep it coming, please!
You are amazing with your explanation and grafics
Thanks from Kurdistan
Thank you so much for the video. All of your videos are so informative and very helpful!
Very good job, excellent presentation and very easy to comprehend.
I was waiting for this video as you can´t imagine!!!
Good overview, clearly explained like nowhere else. But moderator might have also explained two major paradigms: S2S vs C2S. What is C2S VPN?
A client-to-site VPN is a type of VPN that connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate or cloud network. It allows the device to access the network resources and services securely, as if it were physically connected to the network.Mar 4, 2023 What is S2S VPN? What is Site-to-Site VPN | Fortinet
Site-to-Site VPN Defined (Gateway router to Gateway router, typically separated by public internet and great geogrraphical distance):
A site-to-site virtual private network (VPN) refers to a connection set up between multiple networks. This could be a corporate network where multiple offices work in conjunction with each other or a branch office network with a central office and multiple branch locations.
S2S IPSec VPNs operate in Layer 3 of the Seven Layer OSI Model. Where do C2S VPNs operate? What different kinds of C2S VPNs exist?
Amazing Channel!!!! would love to see more contents about cybersecurity, AI and blockchain :)
Noted!
I really like how you explain it!
Sir please make video on
OSI model your animation is best and understanding
Fantastic educational ❤❤❤
Please make an episode about the difference between GPT and MBR...I am having difficulty when creating software for the computer
Only a month before you uploaded a video but seems like an year before.
Such is the quality and content of your video that is worth the wait.
One kind request could you please start doing videos on security aspect more as others who do mostly concentrate on the entertainment purpose rather than the education aspect. Thank you very much ❤🙏👍👌👏
Can you make a video on Mac address randomisation
This term I came across a device like USB type a/c to lan adapter, the moment I connect it to different CPU I can different Mac address. (HP type c to lan I faced this)
I used one more from tp-link where I did not face issue of Mac address variation.
Please see if you can make a video on this
Amazing breakdown! Thank you
It's amazing how the security tech keep evolving (not sure if I can say thanks to bad people sometimes).
Thanks!
these are incredible! basic concepts and im getting it now! thank you so much!
You’re amazing man, keep up the great work
Thank you for your efforts and creativity, it would be much appreciated if the CompTIA A+ 101+102 gets updated. Thanks again!
Dear Sirs, I am senior lecturer at a Hungarian University. I have to produce e-learning materials in Hungaryian language. Can I ask, which animation software do you use? (I do not would like to make a competitor RUclips channel!) Thanks, Dr. Adam Horvath
This is great. But what I don't understand is how the keys are exchanged and the authentication occurs without someone stealing those? 1:35 Thanks
There's a class of encryption algorithms which are used for creating a secure connection over an insecure channel. The most basic of which is the Diffie-Hellman Key Exchange.
There's a computerphile video that goes over the basics without going into the mathematics. Or there's a Wikipedia article on the subject.
ruclips.net/video/NmM9HA2MQGI/видео.html
en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
There's a public and private key. Public key is only useful if you know the private key, so people intercepting the public key is no big deal. If you want to send a message to your friend, you get your friend's public key and use that to encrypt the message. That message is only decryptable using your friend's private key, so your friend is the only one who's able to make sense of the encrypted message.
@@kenmenpianoyou can do a MITM attack by providing your keys to each end host and they'll think they are talking to the desired host
Well explained!Very informative!
Glad it was helpful!
Please explain Authentication Header (AH) protocol guess missing here
well explained 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼
Thanks for the lesson!!
Anyone in 2024! The 06:02 Video lectures is better than 16 years education in university.
please add subtitle to understand well ,all of the Old vedios have this feature that help non native learners to understand.
Thank you so much for sharing the video
But I also request you please make more videos I hope next video coming soon 🔜 ⏩😊🎉❤
Thank you
yes, this month
@@PowerCertAnimatedVideos thank you for reply
Great vid. You have any future plans to explain OSI model/layer's?
Eventually
Merci pour vos explications !
Please do more content like this
Always a fantastic educational video. Does HTTPS provide encryption as well?
Yes, but IPsec does encrypts at a deeper level.
I need more power cert in my life
U should do a video what Tunneling is in networking
Wow. I learnt something that I coulnd't clearly learn. Thanks.
wonderfully explained! Thank U
your videos so helpful !!! thanks !!!
Wouldn’t the ISP significantly throttle the bandwidth on IPsec protocol if not outright blocking those ports ?
Please make a complete video on OSI layer functioning
❤ Thank you!! Preparing N+
We need full ccna course latest ❤❤❤❤
Expecting dynamic routing protocols like RIP, EIGRP, OSPF and one dedicated video for BGP
Please make a video on How to select Graphics card for a PC or Laptop ?
Please can you do a video of STP, BPDU and OSPF especially STP( spanning-tree protocol )
Would be nice to see an actual implementation of this solution.
I wonder, how you do this animation?
Can you please tell me on which software you use for creating the videos......??🙌🙌🙌🙌🙏
PowerPoint.
@@KevanTess ty bro...❤️🙌
Do you have PowerPoint versions of your videos? They would be perfect for studying!!!
0:45 So then SSL and TLS don't exist?
They do, but IPsec uses deeper security.
@@PowerCertAnimatedVideos
But the way you put it across in your video raises that doubt.
Maybe you could’ve clarified better?
And I believe it’s TLS. Not TSL
SSL and TLS are both implemented at the application layer. So web browsers and web servers for TLS, and SSH clients and servers for SSH.
IPSec is used to secure the connection between two networks, not between two machines. The difference being that the connection is not encrypted en-route through the initial network, or once decrypted at the other end. Ideally you would want to use another form of security atop IPSec.
Thank you for the video
I'm stuck in snmp. Please can you make a video on it 🙏
what is the difference between IPsec and VPN TLS
Thank you!
What do you use to create the animations?
powerpoint
Thanks
VPNs should also prevent screen recording, screen shots, and blocking the microphone. I've yet to see any VPNs doing this.
?? Those are very different things that have nothing to do with the concept of using VPNs.
@@JJFlores197 They can use those to spy on you
That literally defeats the purpose of a VPN.
thank you
Great WOrk Team
Porfavor para de subir videos mi profe calvo no me deja en paz
CAN YOU PLEASE EXPLAIN SD-WAN
Can You Please Make a video Explaining How Routers Split Bandwidth Between Devices, I Heard If Say U Got 500GB P/Sec speed it is Shared Between All The Devices You Have Inside the House So the more devices You have online the less Bandwidth they'll have, i dont get it please make an explanatory vid 🎉
that's the long-waited video
upload a video on pfsense firewall
You don't send credit card information in plain text, sites would typically be using TLS encryption. This could've been better worded
0:04 I hope that’s 124 Fahrenheit and not 124 Celsius otherwise you have a big problem.
I'm watching this from a self hosted IPsec server lets goo
Even if things where send in clear text from site 2 site, how would you sniff it? infiltrate an ISP sure I guess but?
Maybe you can explain MikroTik, it's interested
Hello man.
Pretty much everything these days is TLS encrypted.
OMG
😂
This sounds also like the methods hackers use when using Ransomeware attacks. Is it the same methods they use, TechVideos?
4:29
Thank you