Practical Networking
Practical Networking
  • 143
  • 12 121 685
Symmetric Cryptography is a category
In this video we introduce the category of Symmetric Cryptography, and quickly define the 3 types of operations that it includes: Symmetric Encryption, Message Authentication Codes (MACs), Pseudo Random Functions (PRFs).
Each of these will be explored in more details in the upcoming videos in the series.
// FULL SERIES - Cryptography Essentials //
This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate.
The full series is available here:
📋 ua-cam.com/play/PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ.html
(or use this shortcut: pracnet.net/ce)
00 Series Introduction
01 Hashing
02 Keys / Secret Keys
03 Symmetric Cryptography
04 Encryption
05 MAC / HMAC
06 Pseudo Random Function
07 Asymmetric Cryptography
08 Asymmetric Encryption (RSA)
09 Signatures
10 RSA Signatures
11 DSA Signatures
12 Key Exchanges
13 RSA Key Exchanges
14 DH Key Exchanges
15 Elliptic Curve Cryptography
// SUPPORT PRACTICAL NETWORKING //
If this content benefited you, then here are TOTALLY FREE ways to show your appreciation:
- 👍 Like to help this video reach more viewers
- 💬 Comment to boost the channel's visibility
- 🔔 Subscribe to help me attract sponsors (this is the number they care about)
Переглядів: 1 379

Відео

Understanding Secret Keys: A Simple Explanation
Переглядів 3,5 тис.День тому
In this video, we formally define a term used throughout cryptography: Keys & Secret Keys. Nearly every operation in Cryptography makes use of these keys, so it makes sense to spend a few minutes discussing them. // CHAPTERS // 0:00 - What are Secret Keys? 0:36 - Key Sizes and Bits 1:59 - All keys are susceptible to brute force 2:34 - Why do we use Secret Keys in Cryptography? 3:41 - Symmetric ...
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials
Переглядів 2,9 тис.14 днів тому
In this video, we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms, like MD5 and SHA, convert messages into unique, fixed-length strings called digests. Hashing plays a critical role in ensuring data integrity and security, making it a foundational concept in cryptography and networking. We break down the basics of hashing with simple ex...
Cryptography Essentials - Series Intro
Переглядів 2,6 тис.21 день тому
The first video in a series of videos covering the essentials of modern cryptography This series will give you the foundation necessary to understand protocols like SSL, TLS, IPsec, SSH, and many other elements of online and offline digital security. But it won't be like other Cryptography lessons... I'm going to focus only on the core, essential knowledge that everyone needs. All the while rem...
OSI Model Layer 5, 6, and 7 -- Session, Presentation, & Application Layers -- what they actually do
Переглядів 41 тис.9 місяців тому
Plenty of attention is given to L1-L4 of the OSI model... but very little attention is given to the Session Layer, the Presentation Layer, and the Application layer (Layers 5, Layer 6, and Layer 7). That's led to a lot of bad information existing about these three errors. So I decided to create a video that explained how these three layers work, and how they contribute towards the goal of Netwo...
HTTP vs HTML: Unveiling Network Protocols using Telnet
Переглядів 34 тис.10 місяців тому
At the surface, this video is about HTTP, HTML, and Telnet. But beneath that this video is actually a demonstration of how every Network Protocol works. A Connection is made via TCP or UDP, a request is sent, a response is received. We demonstration this with HTTP / HTML / Telnet, but this same sequence occurs with nearly all other protocols as well. In this demonstration, we show you exactly w...
TLS 1.3 Handshake - many CHANGES from prior versions!
Переглядів 16 тис.Рік тому
TLS 1.3 Handshake - many CHANGES from prior versions!
TLS 1.3 Cipher Suites - Here is what CHANGES!
Переглядів 12 тис.Рік тому
TLS 1.3 Cipher Suites - Here is what CHANGES!
TLS 1.3 - What Changes? What stays the same?
Переглядів 15 тис.Рік тому
TLS 1.3 - What Changes? What stays the same?
Ask Me Anything - 150k Subscribers - THANK YOU
Переглядів 2,8 тис.Рік тому
Ask Me Anything - 150k Subscribers - THANK YOU
UDP doesn't suck! It's the BEST L4 protocol for THESE types of applications...
Переглядів 29 тис.Рік тому
UDP doesn't suck! It's the BEST L4 protocol for THESE types of applications...
TCP - 12 simple ideas to explain the Transmission Control Protocol
Переглядів 124 тис.Рік тому
TCP - 12 simple ideas to explain the Transmission Control Protocol
TCP vs UDP - Explaining Facts and Debunking Myths - TCP Masterclass
Переглядів 88 тис.Рік тому
TCP vs UDP - Explaining Facts and Debunking Myths - TCP Masterclass
Can I rebuild an OSPF topology using ONLY the LSDB?
Переглядів 11 тис.Рік тому
Can I rebuild an OSPF topology using ONLY the LSDB?
Keychains / Key Rotation / hmac-sha keys - OSPF Authentication - Practical OSPF
Переглядів 6 тис.Рік тому
Keychains / Key Rotation / hmac-sha keys - OSPF Authentication - Practical OSPF
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
Переглядів 112 тис.Рік тому
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
OSPF Area Types - Stub, NSSA, Totally Stub, Totally NSSA - Practical OSPF
Переглядів 25 тис.Рік тому
OSPF Area Types - Stub, NSSA, Totally Stub, Totally NSSA - Practical OSPF
OSPF Network Types - FINALLY, an explanation that makes sense - Practical OSPF
Переглядів 32 тис.2 роки тому
OSPF Network Types - FINALLY, an explanation that makes sense - Practical OSPF
OSPF LSA - the BEST explanation of the Types of OSPF LSAs
Переглядів 37 тис.2 роки тому
OSPF LSA - the BEST explanation of the Types of OSPF LSAs
Designated Router // Backup Designated Router // DR BDR Election // Practical OSPF // Lesson 6
Переглядів 27 тис.2 роки тому
Designated Router // Backup Designated Router // DR BDR Election // Practical OSPF // Lesson 6
HSTS - HTTP Strict Transport Security - Protect against SSL Stripping attack - Practical TLS
Переглядів 36 тис.2 роки тому
HSTS - HTTP Strict Transport Security - Protect against SSL Stripping attack - Practical TLS
What are Cipher Suites? - Practical TLS
Переглядів 45 тис.2 роки тому
What are Cipher Suites? - Practical TLS
OSPF Configuration & Show Commands - Practical OSPF
Переглядів 56 тис.2 роки тому
OSPF Configuration & Show Commands - Practical OSPF
OSPF Neighbor Adjacency States: DOWN ATTEMPT INIT 2-WAY EXSTART EXCHANGE LOADING FULL
Переглядів 31 тис.2 роки тому
OSPF Neighbor Adjacency States: DOWN ATTEMPT INIT 2-WAY EXSTART EXCHANGE LOADING FULL
OSPF Hello Packets :: Area Types (Stub/NSSA) :: BDR/DR :: Practical OSPF
Переглядів 34 тис.2 роки тому
OSPF Hello Packets :: Area Types (Stub/NSSA) :: BDR/DR :: Practical OSPF
OSPF Areas and OSPF Types of Routers - Practical OSPF - Lesson 2
Переглядів 39 тис.2 роки тому
OSPF Areas and OSPF Types of Routers - Practical OSPF - Lesson 2
OSPF Framework & OSPF Packets: LSDB, LSA, Hello, DBD, LSR, LSU, LSAck
Переглядів 59 тис.2 роки тому
OSPF Framework & OSPF Packets: LSDB, LSA, Hello, DBD, LSR, LSU, LSAck
Practical OSPF - Series Introduction
Переглядів 63 тис.2 роки тому
Practical OSPF - Series Introduction
EGP / IGP :: Distance Vector / Link State :: Dynamic Routing Protocols :: OSPF EIGRP BGP RIP IS-IS
Переглядів 55 тис.2 роки тому
EGP / IGP :: Distance Vector / Link State :: Dynamic Routing Protocols :: OSPF EIGRP BGP RIP IS-IS
Looking inside an SSL Certificate with OpenSSL
Переглядів 13 тис.2 роки тому
Looking inside an SSL Certificate with OpenSSL

КОМЕНТАРІ

  • @larrybrusso1815
    @larrybrusso1815 2 години тому

    Without a doubt, the best description I've ever heard of layers 5-7 and examples of how abstraction takes place, and why. Well done Ed!

  • @syedaquib1082
    @syedaquib1082 3 години тому

    This man is LEGEND🫡🫡🫡🫡

  • @landrumpeeples6684
    @landrumpeeples6684 4 години тому

    The way you breakdown and simplify networking is great! This has been beyond helpful and it’s FREE!!! Thank you so much!!!!!

  • @amrindersingh8634
    @amrindersingh8634 4 години тому

    Thanks alot for this understanding session sir it's so awesome..... thanks alot sir

  • @abdullahalhadadi3585
    @abdullahalhadadi3585 7 годин тому

    what app do u use

  • @user-xs3pt9qt2s
    @user-xs3pt9qt2s 8 годин тому

    Aghh.. Very Nice

  • @oluwaseyeayinla294
    @oluwaseyeayinla294 23 години тому

    You've explained what I have been struggling with and always running away from NETWORKING!!!

  • @abhaysharma1123
    @abhaysharma1123 День тому

    Why do one router have two mack address

  • @princesolomon4787
    @princesolomon4787 День тому

    You must be one of the FINEST teacher, making to understand...Thank you

  • @NobixLee
    @NobixLee День тому

    Thank you❤

  • @Weatherman1214
    @Weatherman1214 День тому

    Well that just clearly explained a concept I’ve been trying to understand for a LONG time - best explanation I’ve ever seen

  • @regietaganas3827
    @regietaganas3827 День тому

    Thanks a lot 🎉

  • @regietaganas3827
    @regietaganas3827 День тому

    Thank you ❤

  • @sinarchbishop5102
    @sinarchbishop5102 День тому

    Amazing Video!

  • @beinginnit
    @beinginnit День тому

    Awesome!

  • @polavarapudurgesh3937
    @polavarapudurgesh3937 День тому

    Please Do videos on IPSec and VPN

  • @NobixLee
    @NobixLee День тому

    I am three minutes in and I already feel like a master of networking. Wow😂

  • @vijaybaskar2862
    @vijaybaskar2862 День тому

    Ed... please refer the video @11.26...what if the middleman sends server his own pre-master-key encrypted using server's public key. I guess server's public key is available to everyone. In this case, how does the server ensure's that the pre-master-key (encrypted with server's public key) it receives is from the actual client and not from someone else. BTW thanks for the video Ed.

  • @zagaro5513
    @zagaro5513 День тому

    gooood

  • @joshuameaders8053
    @joshuameaders8053 2 дні тому

    Hands down best explanation

  • @kristijanaleksic6134
    @kristijanaleksic6134 2 дні тому

    My hats off to you, outstanding presentation💯

  • @prashantkumardeshmukh2047
    @prashantkumardeshmukh2047 2 дні тому

    Thanks a lot. Wonderful Explanation and lots of learning

  • @alainpannetier2543
    @alainpannetier2543 2 дні тому

    Author recorded at 0.85. Run at 0.85 speed.

  • @fastrobreetus
    @fastrobreetus 2 дні тому

    I’ve watched this video a few times. Each time I gain a better understanding. PS than you for not using the names “Alice” and “Bob!” 😂

  • @fastrobreetus
    @fastrobreetus 2 дні тому

    Looks good!

  • @Don-Carillo
    @Don-Carillo 3 дні тому

    Ed is a genius. An absolute natural at explaining things in minutes that most lecturers need hours to get it across . Him, Jeremy , Mr Bombal and Chris Geer have taught me more than anyone ever have. i have been watching his videos since he was hardly known and i am glad he has finally getting the following he deserves . Thanks for all you do

  • @123gregery
    @123gregery 3 дні тому

    6:27--> "the blue switch just did unicast flooding". I think the correct term is broadcast flooding since the switch send the frame wherever possible (I understand that switches don't cast, but I only try to convey the meaning...)

  • @freeyourmind757
    @freeyourmind757 3 дні тому

    Why switch doesn't fill its MAC Address Table while ARP process? When host A initially sends ARP request to figure out the host B MAC address, switch can fill its MAC Address Table as it knows which MAC address on which Switch port for both host A and B. Why using the Flood process?

  • @DPCEL
    @DPCEL 3 дні тому

    Excellent, interesting and makes me want to learn more! Thank you for all your hard work I do really appreciate you sharing this.

  • @Sesu22
    @Sesu22 3 дні тому

    i've got a question. say i had a /23 network with IP address of 10.4.120.100... what would my network ID be? 10.4.120.0 or 10.4.120.100?

  • @sumanthprithvi
    @sumanthprithvi 3 дні тому

    Hi. I've been following videos on networking basics fervently over the past few months and yours has become the guide rail for me. Thanks for making complex ideas approachable. Btw, in the example, around 4:20 the cheat sheet begins at /25 and has 64 networks at /26, whereas in the question, it starts at /21, so shouldn't /22 already contain 64 networks, by /23 we should only have 32 networks. Is this right or have I not understood yet?

  • @mahtabnassiri1221
    @mahtabnassiri1221 3 дні тому

    Thanks, very helpful.

  • @we-are-electric1445
    @we-are-electric1445 3 дні тому

    I have watched several videos from this channel over the last few days and they have been excellent.

  • @SK-ju8si
    @SK-ju8si 3 дні тому

    But far the best video of explaining about keys and encryption

  • @Unauc6
    @Unauc6 3 дні тому

    I have to subscribe to this channel. Thank you.

  • @ayimanatedofftopic
    @ayimanatedofftopic 3 дні тому

    Great series man! Our govt. cut off our internet and I realized how clueless I am about networks. Some of my friends were able to figure out how to bypass the ban and I was feeling dumb. This video helped me solidify my basics. Thanks for your effort!

  • @internetuser123
    @internetuser123 3 дні тому

    this guy makes every other network teachings seem redundant

  • @xerxesking6734
    @xerxesking6734 4 дні тому

    Thanks

  • @HubertoMadalena-rz4xs
    @HubertoMadalena-rz4xs 4 дні тому

    another important concept for RIP: split horizon, a mechanism to prevent routes in RIP from being sent back to neighbouring routers

  • @TheUCKO2
    @TheUCKO2 4 дні тому

    Was the full course ever developed if so where is it?

  • @VaaniSharma-f1v
    @VaaniSharma-f1v 4 дні тому

    you are an amazing teacher, I am preparing for interview from your videos..hope i will get this job. thank you so much!

  • @YUMYUMINMYTUMTUM
    @YUMYUMINMYTUMTUM 4 дні тому

    Best video on the internet

  • @teslimsalaudeen9993
    @teslimsalaudeen9993 4 дні тому

    My fav.

  • @bonermage420
    @bonermage420 4 дні тому

    Why is there NO ONE explaining this as plain as simple as you do?!? You are awesome 😎

  • @takhmasib4
    @takhmasib4 4 дні тому

    The whole 127.0.0.0/8 used exclusively for localhost connections also not to forget

  • @bryanguim2000
    @bryanguim2000 5 днів тому

    I really learned a lot watching your videos. Thanks

  • @AvanagantiAkshathreddy
    @AvanagantiAkshathreddy 5 днів тому

    Great explanation!

  • @francishubertovasquez2139
    @francishubertovasquez2139 5 днів тому

    The Tourists and Domestic clients accomodation areas businesses and Town houses areas businesses and Islands visitors accomodations businesses for the Primary and Secondary Trade route areas businesses can be participated by groups of businesses, by the business groups of the Caesar King, by the Holding Companies businesses, by any Alliance businesses, by Appointees businesses, by Category businesses, by Matter and Magogs businesses, when it comes to selective area real estates businesses and business investors of variety types within South East Asia Equatorial line and Equatorial sides coastlines and near sea shipping ports and shorelines and also at the sea sides of Indonesia and Australia can be participated by mentioned business groups, to speed up the progress and Infrastructure for developments to attract tourists, visitors and investors at those strategic business areas for Big business projects. Let it be

  • @francishubertovasquez2139
    @francishubertovasquez2139 5 днів тому

    Ordering the Tech group and the Research and Development groups of the Caesar King to focus on scientific components for the U.F.O type spaceships, we will be going to accelerate in sophistication with the use of very modern propulsion system of the anti gravity types and super engines and spaceships chassis that can travel in speed in space travels and with laser weapons and Electromagnetic Pulse weapons. Funds allocated from the Research and Development funds of the Tech groups and Business groups of the Caesar King, meaning the prototypes can be considered for selective clients sales by the Business groups of the Caesar King. Let it be