Certificates and Certificate Authority Explained

Certificates and Certificate Authority Explained

Hussein Nasser

4 года назад

132,977 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Svalyava Svalyava
Svalyava Svalyava - 17.10.2023 20:24

amazing explanation, thank you ☺️

Ответить
Abdullah Al Muzaki
Abdullah Al Muzaki - 10.10.2023 16:37

best explanation still

Ответить
Aswini Vayyala
Aswini Vayyala - 17.09.2023 15:06

Did not lose my attention for 1 sec..it was quite deeply informative and engaging

Ответить
1-minute Tips
1-minute Tips - 08.09.2023 18:36

Can we share zscaler root certificate to anyone??

Ответить
slawek nos
slawek nos - 31.08.2023 00:36

Amazing video !

Ответить
Komeil Mehranfar
Komeil Mehranfar - 24.08.2023 15:32

Maaaaan, That was crazy simple explaination. Enjoyed it. Thanks a lot.

Ответить
Ugo Demy
Ugo Demy - 10.08.2023 12:07

Absolutely awesome ! Very well explained and I loved the Kazakhstan anecdote to illustrate the problem that could happen. Thank you so much !

Ответить
aspirohk
aspirohk - 30.07.2023 11:27

Please make a video on how they are created and also about root certificate aaaaand certification with regards to antivirus and application software

Ответить
Jurg
Jurg - 14.07.2023 19:24

Hussein, thank you for your videos I've been watching a few of them last few days and noticed today in your background you have a bunch of programming books. How useful would you say it is reading books to truly understand a concept vs just either just getting dug in the problem or watching videos etc.?

E.g. lets say there is a concept I really need to understand in Azure and how to setup certificates, key rotation and be able to setup some form of automation testing. Now I have such limited knowledge on everything that entails.. when do you think is a good idea to just slow down and pick a book up rather than attack the problem head on always? This might be a video idea for you!

Ответить
shweta khetre
shweta khetre - 14.06.2023 21:55

Really helpful video. Excellent and clear explanation. Just subscribed ur channel, continue to create more such videos 👍

Ответить
dhia salah
dhia salah - 16.05.2023 19:46

you just made things simple.good job!

Ответить
Duwayne Forbes
Duwayne Forbes - 29.03.2023 00:44

I have a Skills Proficiency certificate for Basic Plumbing... Those that mean I'm a Plumber?

Ответить
Yazan Alaboudi
Yazan Alaboudi - 20.03.2023 20:43

Thanks Hussein for all of this. Helps a lot! Can you (or anyone reading this) expand on why the man-in-the-middle can't just forward the certificate provided by Google to impersonate Google for example. That's the only piece im missing!

Ответить
abhiteja mandava
abhiteja mandava - 20.03.2023 11:08

What if there happens to be a MITM attack between google server and certificate authority and the attacker gets certificate sent by CA to google?

Ответить
Ahmed Sayed
Ahmed Sayed - 21.02.2023 01:37

If I on my browser can get google signed certificate, can't man-in-the-middle get it too and forward it back to the client?

Ответить
r t
r t - 14.02.2023 18:48

@hnasr, can you help me pls? I am opening exe file with 7zip and have .tls (empty file in Windows CRLF encoding) and CERTIFICATE ( file in Macintosh CR encoding, where all symbols messed, except strings indicating urls to .crl and CA names) Can you reproduct the same on your exe and explain what this .tls stands for? And how to decode CERTIFICATE?

Ответить
Abdulazeez
Abdulazeez - 13.01.2023 14:53

The example of Kazakhstan helped me understand the whole topic 😂

Ответить
Joseph Jones
Joseph Jones - 15.12.2022 06:08

I could be mistaken but it may be wise to apply Preventative maintenance efforts when it comes to the CMOS battery. Again I could be misunderstanding but if the CMOS battery fails or the NTP server, this may require manual peer list to align with the domain controllers. Are these concerns? Maybe a good discussion you can shine light on? I’m guessing locking out all end user accounts will allow to re-sync. Is this paranoia? Or do I have the right idea?

Ответить
L. Asher Shimshon Burrows
L. Asher Shimshon Burrows - 23.10.2022 11:52

Excellent! Thank you! One question: What stops the man-in-the-middle from taking the certificate he recieves from google and passing it on to the client?

Ответить
Darksalmon
Darksalmon - 17.09.2022 17:36

STOP TRAILING OFF YOUR SENTENCES INTO LOW VOLUME!!! Some of us are trying to HEAR things explained.

Ответить
Aidan Goetzinger
Aidan Goetzinger - 17.09.2022 08:16

This video was literally so helpful. We really need more people who teach like you in computer science.

Ответить
Joseph M
Joseph M - 06.09.2022 01:41

Poor Karen... even "man in the middle" has become "Karen in the middle" now :D

Ответить
Brian Ske
Brian Ske - 29.08.2022 15:48

Good stuff here. I love the 'why' approach to teaching with the real life example. To solidify the knowledge you add the memorable story about Kazakhstan. Thanks for this

Ответить
Asim Ahmed
Asim Ahmed - 20.08.2022 07:48

Is he on crack

Ответить
PigeonLyfe
PigeonLyfe - 18.08.2022 12:02

Top tier video, literally watched it through and through. Thank you!

Ответить
Tech
Tech - 11.08.2022 04:34

Exchange migration could be one useful when here.. however the very real issue (most overlook) is in order to keep 'that trust' the new server must be the same...During a live migration, this is technically impossible, as two servers cannot have same name on network, and allot of things break if you try and change name on new one to old name afterwards...

So MS, and probably few others, just say "its not advised" and its more convent to just "get new one"

Well.. ya, if you wanna go down THAT path, but sometimes you just wanna keep the name.. Everyone goes silent.. And besides,,, it will save the cost of a cert by moving one over.. These days,, i think no one wants people to migrate certs is not because it cannot be done, but because everyone wants $$$$$

Ответить
EuroAdventures with Muddasar
EuroAdventures with Muddasar - 01.08.2022 02:29

very well explained

Ответить
Issam Zgybi
Issam Zgybi - 25.06.2022 16:48

great explanation thank youu

Ответить
YGorillAY
YGorillAY - 30.04.2022 11:27

It looks like you have a great content and you know a lot, but unfortunately I cannot bear your expression style. It is like too overacting to me.

So I won't dislike, but I am out. I hope you accept my honest feedback with no bad feelings, it was meant just to share opinion and maybe make you improve the delivery, so it can produce the highest value to the maximum number of people ;)

Ответить
Artem
Artem - 29.04.2022 11:47

How CA verifies that those who claiming to be google are actually guys from google and not random guy claiming to be google?

Ответить
Caron C
Caron C - 30.03.2022 11:00

My new android comes with root CA from China, Hong Kong, Taiwan, Japan, and a few other countries. Wouldn't I want to shut those off? Why would my device need to trust their site?

Ответить
Refugio Lopez
Refugio Lopez - 21.03.2022 02:37

Thank you for the explanation!

Ответить
FaK Fatkids
FaK Fatkids - 21.02.2022 06:57

Beautiful explanation thanks!

Ответить
danny farage
danny farage - 15.02.2022 17:24

Dude youre awesome! Thanks a bunch for this video!

Ответить
Leonardo Corso
Leonardo Corso - 11.02.2022 06:20

Great video. I have one question, why can't google themselves provide a certificate? For example, if they encrypt a file with their private key and send it back to you and then you use their public key to decrypt the file. Since you're using their public key to decrypt the file, that means that only the person who had the private key could have encrypted that message.

I understand this might be difficult to implement because instead of keeping track of a few CA public keys you would need to locate the public key of each endpoint you were communicating with.

Ответить
AsdSilva
AsdSilva - 10.02.2022 21:05

Hello

Nice video...can you explain what is an intermidiated certificat?

Ответить
Danish Arora
Danish Arora - 07.02.2022 13:17

THANKYOU.

Ответить
ADITYA KUMAR SINGH
ADITYA KUMAR SINGH - 03.02.2022 17:20

Great informative video Hussein; I got a doubt about how servers generate public and private keys which are already not registered with CA? suppose "server A" generated a key pair and sent it to the CA(only public key, as your pinned comment says) then "server B" generated the same key pair and send it to the CA, how CA will handle this ambiguity? I don't know what I am saying is even correct...

Ответить
John Yong
John Yong - 12.01.2022 04:53

is that possible to have a illustration it would be way more better to understand it! thanks!

Ответить
Ian
Ian - 08.12.2021 12:14

Great video, thank you for taking the time to make it.

Ответить
DrJuiceMan
DrJuiceMan - 04.12.2021 06:01

So even with an Asymmetric key using both public and private on both ends can the information still be intercepted as explained or was this lesson in reference to symmetric single key encryption?

Ответить
Littlefair
Littlefair - 16.11.2021 20:11

Is my certificate of authority downloadable? If yes what is it called on FMSCA portal? Thanks

Ответить
Erik Palacios
Erik Palacios - 29.10.2021 09:11

Thanks a lot for the great explanation.

Ответить
Toby Van der Zwart
Toby Van der Zwart - 26.10.2021 11:05

you're fantastic!! I can't wait for your videow to absolutely blow up, great quality

Ответить
Samuel Ferrer
Samuel Ferrer - 23.10.2021 11:52

I think we need to redefine what "authority" is

Ответить
Gokula Krishnan
Gokula Krishnan - 20.09.2021 15:01

Great explanation...

Ответить
Sudeep Banerjee
Sudeep Banerjee - 02.09.2021 13:02

Thanks.

Ответить