@practicalnetworking Practical NetworkingPractical Networking posts on YouTube about what is, key, youtube, ip the most. They currently have [-------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.
Social category influence social networks technology brands finance currencies
Social topic influence what is #3393, key, youtube, ip #260, protocol, intro #1234, tls #22, internet #1920, list, shorts
Top accounts mentioned or mentioned by @mr @networkingbyubaid
Top posts by engagements in the last [--] hours
"RSA Algorithm - How does it work - I'll PROVE it with an Example -- Cryptography - Practical TLS In this we discuss RSA and the RSA algorithm. We walk our way through a math example of generating RSA keys and then proving the ability to encrypt a message with one key and decrypt with the other (in both directions). We show you how RSA uses prime numbers to create keys and encrypt/decrypt messages. And discuss how the Security of RSA lies in the difficulty of Semi Prime factorization. Asymmetric encryption is often described as "you can encrypt with the public and decrypt with the private. And"
YouTube Link 2021-11-08T14:45Z 328K followers, 198.6K engagements
"How to solve ANY Subnetting Problems in [--] seconds or less - Subnetting Mastery - Part [--] of [--] This is Video [--] and the cornerstone of the Subnetting Mastery video series. In this video we will show you how to use the Subnetting Cheat Sheet to solve for all seven attributes of Subnetting: Network ID Broadcast IP First Host IP Last Host IP Number of IP Addresses Next Network and CIDR to Subnet Mask conversions. Each of these attributes were defined in Video [--] of the series. EVERY Subnetting problem you encounter is simply asking you to solve for one or more of these seven attributes. In this"
YouTube Link 2018-05-25T00:28Z 328K followers, 428.2K engagements
"Everything Switches do - Part [--] - Networking Fundamentals - Lesson [--] Switching is the process of facilitating communication within a network. Switches are simply device's whose primary purpose is Switching. This definition is intentionally worded as such because there are many devices that claim to do "switching" -- and all of those devices will follow the same rules and processes that Switches do to facilitate communication within a network. In this video we discuss Switches as L2 devices MAC address tables and the three fundamental switch actions: Learning Flooding Forwarding. We then"
YouTube Link 2021-01-28T20:17Z 328K followers, 253.1K engagements
"What is Subnetting - Subnetting Mastery - Part [--] of [--] This video will teach you the basics of subnetting. Every Subnetting problem will ask you to solve for one or more of seven possible attributes: Network ID Broadcast IP First Host IP Last Host IP Next Network Number of IP Addresses and CIDR/Subnet Mask conversions. This video explains what each of the attributes are. What if there were a single video series that could make you a Subnetting Master What if that video series were available for free for everyone Look no further. This is it. This is video [--] of the series. The complete video"
YouTube Link 2018-05-22T23:32Z 328K followers, 624.7K engagements
"Hub Bridge Switch Router - Network Devices - Networking Fundamentals - Lesson 1b Module [--] of the Networking Fundamentals course will illustrate the core of networking: How data moves through the Internet. Crucial to that is understanding the various Network Devices which exist to accomplish that goal. In Lesson [--] we'll unpack the following devices and related concepts: Hosts IP Addresses Networks Repeaters Hubs Bridges Switches Routers. This is a two part lesson. In the prior video we explored Hosts IP Addresses and Networks. In this video we will explore Repeaters Hubs Bridges Switches and"
YouTube Link 2020-12-16T21:21Z 328K followers, 709K engagements
"Network Devices - Hosts IP Addresses Networks - Networking Fundamentals - Lesson 1a Module [--] of the Networking Fundamentals course will illustrate the core of networking: How data moves through the Internet. Crucial to that is understanding the various Network Devices which exist to accomplish that goal. In Lesson [--] we'll unpack the following devices and related concepts: Hosts IP Addresses Networks Repeaters Hubs Bridges Switches Routers. This is a two part lesson. In this video we'll explore Hosts IP Addresses and Networks. In the next lesson we'll explore Repeaters Hubs Bridges Switches"
YouTube Link 2020-12-11T21:29Z 328K followers, 1.5M engagements
"Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is provided using a Hashing Algorithm. but not simply by itself that leaves you open to an attacker modifying your message and re-calculating the digest. Instead something else must be done in addition to Hashing. In this video we discuss that "something else". This will have us introduce the concept of a Message Authentication Code (MAC) and the most common implementation of a MAC known"
YouTube Link 2021-10-04T14:00Z 328K followers, 84.1K engagements
"OSPF Area Types - Stub NSSA Totally Stub Totally NSSA - Practical OSPF By default every OSPF area starts as a "Normal" area. Inside a Normal area every type of LSA / Route is allowed. But OSPF also has the ability to designate areas as Stub or Not-So-Stubby-Areas (NSSA) which allows an OSPF engineer to optimize the types of Routes and LSAs which exist inside an Area. In this video we explore the five OSPF area types (Stub Totally Stubby NSSA Totally NSSA). We also introduce the concept of a Type [--] LSA and how they are used within Not So Stubby Areas and translated by ABRs which border an"
YouTube Link 2022-08-09T13:00Z 328K followers, 47.8K engagements
"Key Players of SSL & TLS: Client Server Certificate Authority (CA) - Practical TLS The TLS/SSL ecosystem involves three key players: the Client the Server and the Certificate Authority (CA). In this lesson we clearly define each of these terms and their roles in the world of SSL. This lesson is a free lesson from my new course: Practical TLS. This course is a deep dive into SSL and TLS. This SSL Training course is all you need to to fully understand SSL and TLS. 🔑 More free lessons from the course: https://www.youtube.com/playlistlist=PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY 🔐 More details about"
YouTube Link 2021-07-12T16:00Z 328K followers, 121.4K engagements
"Hashing Hashing Algorithms and Collisions - Cryptography - Practical TLS Hashing or a Hashing Algorithm takes "something" (a message a file a certificate computer code anything) and turns into a smaller representational sample of the original something. The result of a hashing algorithm is known as a Digest (among other names). To check if two files are perfectly identical you can simply run them both through a hashing algorithm and compare the digests. If the digests are the same then you know both files are also identical. In the rare cases that multiple files result in the same digest. you"
YouTube Link 2021-09-27T14:15Z 328K followers, 107.1K engagements
"TLS [---] Handshake - many CHANGES from prior versions The TLS [---] Handshake changes significantly from the TLS [---] (and prior) handshake. In this video we discuss [--] major changes to the TLS handshake with the latest version: - TLS [---] Handshake is shorter only one round trip (1RTT) - TLS [---] Handshake is mostly encrypted (everything except the Client Hello and the Server Hello) - TLS [---] Handshake encrypts the Client Certificate (as well as the Server Certificate) - TLS [---] Handshake generates many more session keys 👉 This is a sample lesson from my SSL & TLS deep dive course: Practical TLS."
YouTube Link 2023-06-15T20:44Z 328K followers, 30.7K engagements
"NAT vs PAT Static vs Dynamic -- demystified -- Network Address Translation If you've read anything about NAT you've likely come across these terms: Static NAT Static PAT Dynamic NAT Dynamic PAT. These terms are made up of two sets of two terms: Static vs Dynamic and NAT vs PAT. In this lesson we simply and clearly illustrate and explain what each of these terms mean so that you have a clear idea of what it means when you combine them. 0:00 - NAT Terminology 0:46 - NAT vs PAT 2:30 - Static vs Dynamic 5:43 - Summary 6:44 - The best NAT configuration courses =) 📌 Full NAT Playlist:"
YouTube Link 2021-12-08T21:00Z 328K followers, 86.6K engagements
"TLS / SSL - The complete sequence - Practical TLS Understanding TLS/SSL involves understanding the interaction between the Client (web browsers SSL VPN clients etc.) the Server (websites VPN endpoints etc) and the Certificate Authority (the entity that issues Certificates). This video outlines the exact sequence of events that occur in the TLS ecosystem and will explain the function of the Certificate CSR Public Key and Private Key. Seeing the whole process at [-----] ft view will help you understand the smaller individual working parts as we continue to dive deeper and deeper into TLS and SSL."
YouTube Link 2021-11-29T14:45Z 328K followers, 121.5K engagements
"Time-Saving Tricks for Subnetting - Subnetting Mastery - Part [--] of [--] This is Video [--] of the Subnetting Mastery video series. In this video we will show you four tricks that will help you solve subnetting problems even faster. With the speed tips in this video and a little practice you could be solving subnetting questions in as little as [--] seconds What if there were a single video series that could make you a Subnetting Master What if that video series were available for free for everyone Look no further. This is it. This video series will make you a Subnetting Pro. 0:00 - Start 0:11 - Intro"
YouTube Link 2018-05-25T00:29Z 328K followers, 181.1K engagements
"Address Resolution Protocol (ARP) in less than [--] minutes Address Resolution Protocol or ARP exists to create a mapping between an IP address to a MAC address. ARP's behavior differs whether you are communicating with a host on the local network or a foreign network. This video explains traditional ARP in less than [--] minutes. But there are additional iterations of ARP such as Gratuitous ARP Proxy ARP and ARP Probes and Announcements. To learn the functionality of each check out the ARP Article Series at Practical Networking .net: http://pracnet.net/arp http://www.practicalnetworking.net 📌"
YouTube Link 2017-09-08T15:58Z 328K followers, 150.9K engagements
"TLS Handshake - EVERYTHING that happens when you visit an HTTPS website TLS (formerly SSL) is the protocol that makes it safe to do anything on the Internet. It's the protocol that enables that little padlock which gives you the green light to put in your password or bank account number. In order to get the padlock however something has to occur between you and the website you are visiting. that something is known as the TLS handshake. The TLS handshake validates the two endpoints in the conversation and exchanges the cryptographic material used to create Session keys which will then protect"
YouTube Link 2022-09-06T12:59Z 328K followers, 201.7K engagements
"TLS [---] Cipher Suites - Here is what CHANGES A Cipher suite is a selection of one specific protocol for four security services: Key Exchange Authentication Symmetric Encryption and Hashing. In TLS [---] and prior a single Cipher Suite selected a protocol for all four of these. in TLS [---] a Cipher Suite changes to only specify a protocol for two of these: Symmetric Encryption and Hashing. Here is what a Cipher Suite looks like in TLS 1.3: TLS_AES_128_GCM_SHA256 Here is what they looked like in TLS [---] and prior: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Beyond that there are many other changes to"
YouTube Link 2023-06-06T13:15Z 328K followers, 22.2K engagements
"Symmetric Encryption - AES ChaCha20 3DES RC4 DES - Cryptography Essentials Symmetric Encryption is the example used most often when people discuss Cryptography. It allows two parties to speak securely to each other by encrypting and decrypting content as it is sent across the wire. // CHAPTERS // 0:00 - Symmetric Encryption 0:52 - Simple Explanation 1:43 - Purpose: Why do we use Symmetric Encryption 2:21 - Efficiency of Symmetric Encryption 2:39 - Algorithms 3:28 - Outro // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern"
YouTube Link 2024-08-05T13:00Z 328K followers, 14.6K engagements
"OpenSSL - Encrypting and Decrypting Private Key Files Private Key files can exist unencrypted or encrypted. But often they exist in the opposite format that you need them in ;). In this lesson we'll look at the commands to add Encryption to a Private Key file and the commands to remove Encryption from a Private Key file (i.e. Decrypt a Private Key file). This lesson is a preview lesson from my OpenSSL Training Course: https://classes.pracnet.net/courses/openssl-training The lessons in this course follow the sections of the OpenSSL Cheat Sheet available for free at the link above (no"
YouTube Link 2022-02-09T14:15Z 328K followers, 19.7K engagements
"Twice NAT - Network Address Translation Every type of address translation we've discussed so far has one thing in common -- only the Source IP was translated -- the Destination IP was left un touched (of the outbound packet). There are times however when you need to translate both the Source and Destination and those situations are what is called a Twice NAT. To be clear a Twice NAT is simply one of the four types of translations we've already discussed (Static NAT Static PAT Dynamic PAT Dynamic NAT) applied to both the Source and Destination of a packet. A Twice NAT is sometimes referred to"
YouTube Link 2022-01-10T15:54Z 328K followers, 27.9K engagements
"Everything Routers do - Part [--] - Networking Fundamentals - Lesson [--] Routing is the process of moving data between networks. A Router is merely a device whose primary purpose is Routing. It's important to remember it this way because there are many types of devices that exist: Load Balancers Forward Proxies Reverse Proxies Firewalls IDS / IPS and so on. Many of these claim to do Routing. Well in each case they will follow the same rules of Routing which we describe in this video. === Networking Fundamentals - Module [--] === Lesson [--] - Network Devices Part 1: https://youtu.be/bj-Yfakjllc Part 2:"
YouTube Link 2021-06-17T18:00Z 328K followers, 272.4K engagements
"Encryption - Symmetric Encryption vs Asymmetric Encryption - Cryptography - Practical TLS Encryption is how data confidentiality is provided. Data before it is encrypted is referred to as Plaintext (or Cleartext) and the process of encryption turns it into Cipher text. Cipher text should be unintelligible. Only the intended recipient should have the ability to Decrypt data which turns Cipher text back into Plaintext. There are two strategies for Encryption: Symmetric Encryption vs Asymmetric Encryption. In this video we discuss each of their strengths and weaknesses and provide a simple"
YouTube Link 2021-10-11T20:26Z 328K followers, 231.1K engagements
"TLS [---] - What Changes What stays the same TLS [---] was released in [----] with RFC [----] -- a full [--] years after the version prior (TLS [---] RFC 5246). TLS [---] introduced many changes to TLS and how secure communication works. TLS [---] was in fact a major overhaul of how SSL works. Despite all the changes not everything in TLS [---] is different -- a lot stays the same. In this video we outline what remains the same and list [--] different significant changes in TLS [---]. This lesson serves as an introduction to the upcoming lessons in the series where each difference will be discussed in more detail."
YouTube Link 2023-05-31T15:26Z 328K followers, 30.6K engagements
"Anti-Replay and Non-Repudiation - Practical TLS Anti-Replay and Non-Repudiation are two terms that often come up (along with Confidentiality Integrity and Authentication) when discussing Secure Communication. In this lesson we will illustrate these two concepts. This lesson is a free lesson from my new course: Practical TLS. This course is a deep dive into SSL and TLS. This SSL Training course is all you need to to fully understand SSL and TLS. 🔐 More details about the course: https://classes.pracnet.net/courses/practical-tls 🏢 Do you configure or troubleshoot TLS/SSL for work If so I'm"
YouTube Link 2021-07-12T16:30Z 328K followers, 56.2K engagements
"OSI Model Layer [--] [--] and [--] -- Session Presentation & Application Layers -- what they actually do Plenty of attention is given to L1-L4 of the OSI model. but very little attention is given to the Session Layer the Presentation Layer and the Application layer (Layers [--] Layer [--] and Layer 7). That's led to a lot of bad information existing about these three errors. So I decided to create a video that explained how these three layers work and how they contribute towards the goal of Networking: sending data between two computers. This video can be considered a follow up to my first two videos on the"
YouTube Link 2023-10-31T13:00Z 328K followers, 98.2K engagements
"HTTP vs HTML: Unveiling Network Protocols using Telnet At the surface this video is about HTTP HTML and Telnet. But beneath that this video is actually a demonstration of how every Network Protocol works. A Connection is made via TCP or UDP a request is sent a response is received. We demonstration this with HTTP / HTML / Telnet but this same sequence occurs with nearly all other protocols as well. In this demonstration we show you exactly what your web browser does: It initiates an HTTP request in order to download an HTML page and then it renders it in a way that is more visually appealing."
YouTube Link 2023-10-02T13:59Z 328K followers, 73.7K engagements
"Network Protocols - ARP FTP SMTP HTTP SSL TLS HTTPS DNS DHCP - Networking Fundamentals - L6 In this video we provide a formal definition for Network "Protocols". We then briefly describe the functionality of the [--] most common networking protocols on the Internet: DNS DHCP HTTP SSL TLS HTTPS FTP and SMTP. We follow that with a discussion on the four items which MUST be configured to achieve any sort of Internet connectivity. This is Lesson [--] of Module [--] of a Networking Fundamentals course. The first module will be released for free on Youtube and will teach anyone the very core of networking:"
YouTube Link 2021-08-30T13:15Z 328K followers, 2.3M engagements
"Native VLAN - the DEFINITIVE illustration What is the Native VLAN This video not only tells you but SHOWS you exactly what the Native VLAN is and how it affects traffic traversing a trunk. Need to review Access Ports and Trunk ports (also called Tagged ports and Untagged ports) Read this: https://www.practicalnetworking.net/stand-alone/vlans/ 0:00 - Start 0:06 - Topology Introduction 0:15 - Review: Access and Trunk Ports (aka Untagged and Tagged Ports) 0:32 - Topology Configuration 0:49 - Topology "show commands" 1:08 - Initial Pings 1:24 - Pings with Wireshark Packet Capture 1:53 - A "ping""
YouTube Link 2018-09-07T20:58Z 328K followers, 231.3K engagements
"How do Routers work What is a Routing Table #ccna #comptia #networking #networkdevices #infosec This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O routing table what is a router how does a router work route table ip routing cisco routers routing table fundamentals what is routing table routing tables cisco router network routing routing table what is a router how does a router work route"
YouTube Link 2023-10-16T13:00Z 328K followers, 41.1K engagements
"What is SSL & TLS What is HTTPS What is an SSL VPN - Practical TLS What is SSL and TLS What are they used for What is HTTPS What is an SSL VPN All these questions and more will be answered in this first video. This lesson is a free lesson from my new course: Practical TLS. This course is a deep dive into SSL and TLS. This SSL Training course is all you need to to fully understand SSL and TLS. 🔐 More details about the course: https://classes.pracnet.net/courses/practical-tls 🏢 Do you configure or troubleshoot TLS/SSL for work If so I'm willing to bet your employer would happily pay for this"
YouTube Link 2021-07-02T21:14Z 328K followers, 201.8K engagements
"TCP - [--] simple ideas to explain the Transmission Control Protocol TCP has been the predominate layer [--] protocol that has served the Internet for the last [--] years. In this video we take a deep dive into TCP and illustrate how all of these concepts work together: Sequence Numbers Acknowledgement Numbers Window Size Delayed Acknowledgements Flow Control TCP Connection Closures and FIN + Reset Segments. I've broken up TCP into [--] simple distinct ideas and if you can understand each of those [--] ideas then you can say you can understand TCP better than most. Hope you enjoy this TCP deep dive"
YouTube Link 2023-02-06T13:59Z 328K followers, 194.5K engagements
"EGP / IGP :: Distance Vector / Link State :: Dynamic Routing Protocols :: OSPF EIGRP BGP RIP IS-IS In this video we discuss Dynamic Routing Protocols (RIP BGP EIGRP OSPF IS-IS) by illustrating the categories they each fall into: Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) and Distance Vector Protocols vs Link State Protocols. This video is the prelude to a practical deep dive series on OSPF. This video might one day become the prelude to another series covering BGP. Before watching this video it's recommended to have familiarity with Routers and how they work by"
YouTube Link 2022-02-28T15:00Z 328K followers, 95.4K engagements
"OSI Model: A Practical Perspective - Networking Fundamentals - Lesson 2a Module [--] of the Networking Fundamentals course will illustrate the core of networking: How data moves through the Internet. The foundation of that is understanding the OSI model. But this isn't about mere memorization instead we are going to look at the underlying goals of each layer of the OSI model and how it contributes to the over all goal of networking: Moving data between hosts. Before watching this video watch the first videos in the series: Lesson 1a - Network Devices: Hosts IP Addresses Networks:"
YouTube Link 2020-12-24T19:14Z 328K followers, 705.6K engagements
"What are VLANs -- the simplest explanation The concept of VLANs explained simply and illustrated effectively showing you the purpose and functionality of VLANs. This is the video version of the content of this article: https://www.practicalnetworking.net/stand-alone/vlans/ Did you like the illustrations and animations in this video Most of them are available for download for free in the article above. Want to learn more about VLANs Check out http://pracnet.net/vlans Want to learn how to Configure VLANs https://www.practicalnetworking.net/stand-alone/configuring-vlans/ Want to see the Native"
YouTube Link 2019-11-10T08:36Z 328K followers, 399.9K engagements
"What are Cipher Suites - Practical TLS Cipher Suites are the heart of Security in TLS and SSL and are simply explained in this lesson. In each TLS session a Client and Server agree on a Cipher Suite to use to secure the ensuing data transfer. A Cipher Suite specifies protocols for the following services: Key Exchange Authentication Encryption and Hashing. To understand more of the cryptography that accomplishes each of the services above check out the previous lessons in this SSL and TLS deep dive series. 🔑 More free lessons from the course:"
YouTube Link 2022-04-11T13:59Z 328K followers, 67K engagements
"Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials In this video we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms like MD5 and SHA convert messages into unique fixed-length strings called digests. Hashing plays a critical role in ensuring data integrity and security making it a foundational concept in cryptography and networking. We break down the basics of hashing with simple examples showing you how a hashing algorithm works and why it's crucial for comparing and verifying data. We also touch on"
YouTube Link 2024-07-15T13:00Z 328K followers, 33.2K engagements
"Binary - The SIMPLEST explanation of Counting and Converting Binary numbers In this video we look at the Binary number system. Our jumping off point is comparing and contrasting it to the Decimal number system which is already familiar to us. This makes understanding Binary much simpler. We then learn how to count in binary and how counting in Binary is actually very similar to counting in decimal. Then we look at the details around why Binary conversions work the way they do. Form there we look at a simple and fast way to convert from Binary to Decimal and to convert from Decimal to Binary."
YouTube Link 2020-06-04T13:59Z 328K followers, 537.3K engagements
"Diffie-Hellman Key Exchange and Forward Secrecy Diffie-Hellman is the most secure way of doing a Key Exchange. Specifically because it provides a very important Cryptographic concept known as Forward Secrecy. In this video we show you Diffie-Hellman twice: once with simplified math and later with the real math. Then we define Forward Secrecy and explain how Diffie-Hellman provides it. // CHAPTERS 00:00 - Intro / Key Exchange review 00:36 - Plan for this video 01:19 - Simplified Diffie-Hellman Key Exchange 03:29 - Diffie-Hellman Assurances 04:13 - Forward Secrecy 06:59 - Modular Exponentiation"
YouTube Link 2024-10-14T13:15Z 328K followers, 12.7K engagements
"PRFs explained: Transforming Secrets into Infinite Keys - Pseudo Random Functions In this video we explore the world of Pseudo Random Functions (PRFs) and reveal the role they play in secure communication. PRFs are essential cryptographic operations that generate arbitrary length bit stream outputs from input values playing a crucial role whenever you connect to a secure website. We start by comparing PRFs to hashing algorithms highlighting their similarities and differences and then offer a comprehensive definition of a PRF. You'll learn how PRFs transform a single secret key into multiple"
YouTube Link 2024-08-19T13:15Z 328K followers, 14K engagements
"How do SSL & TLS protect your Data - Confidentiality Integrity Authentication - Practical TLS How does SSL protect your Data Contrary to popular believe SSL/TLS do not prevent the capture of data they merely protect what is captured. Secure communication requires three elements: Confidentiality Integrity and Authentication. This lesson is a free lesson from my new course: Practical TLS. This course is a deep dive into SSL and TLS. This SSL Training course is all you need to to fully understand SSL and TLS. 🔐 More details about the course: https://classes.pracnet.net/courses/practical-tls 🏢"
YouTube Link 2021-07-06T13:00Z 328K followers, 93.9K engagements
"OSPF Neighbor Adjacency States: DOWN ATTEMPT INIT 2-WAY EXSTART EXCHANGE LOADING FULL In this lesson we take a look at the OSPF Neighbor Adjacency States: DOWN ATTEMPT INIT 2-WAY EXSTART EXCHANGE LOADING and FULL. We're going to step through each of them and explain exactly what triggers each state what happens within each state and the functionality each state provides. Highly recommend watching the video on Hello Packets prior to watching this video: https://www.youtube.com/watchv=wITAeO8i9U4 This is Lesson [--] of the Practical OSPF series:"
YouTube Link 2022-03-22T13:29Z 328K followers, 50.3K engagements
"How Data moves through the Internet - Networking Fundamentals This is the summary lesson to the Networking Fundamentals series. In this lesson we illustrate everything Switches and Routers do when forwarding packets between two hosts. We show you each device's ARP Routing or MAC address tables and show you how each are populated and/or used to forward packets. This is the ultimate video showing you a practical illustration of how packets move through a network. The series wraps itself around a very important interview question: "Tell me everything that happens when you type 'www.google.com'"
YouTube Link 2021-09-13T13:15Z 328K followers, 479.5K engagements
"TLS / SSL Versions - Part [--] - Practical TLS In this lesson we'll explore statistics for the different versions of SSL & TLS. We'll explain the juxtaposition of choosing between Security and Accessibility and why it isn't always feasible to always take the most idealistic stance and only support the most secure protocols. In Part [--] of this lesson we'll explore the differences between all the different versions of SSL and TLS. This lesson is a free lesson from my new course: Practical TLS. This course is a deep dive into SSL and TLS. This SSL Training course is all you need to to fully"
YouTube Link 2021-07-19T16:15Z 328K followers, 57.4K engagements
"Wildcard Masks -- What are they How do you convert them What are they used for In this video we'll be discussing Wildcard masks. We'll answer the questions: What are Wildcard Masks How do you convert between Subnet Masks and Wildcard Masks And What are Wildcard Masks used for A pre-cursor to this video is to understand Subnetting and Binary. Learn Subnetting by watching the Subnetting Mastery video series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bQUE4IB5c4VPRyDoLgOdExE https://subnetipv4.com/ Learn Binary by watching this video: https://www.youtube.com/watchv=RrJXLdv1i74 00:00 Start"
YouTube Link 2020-06-18T17:17Z 328K followers, 58.6K engagements
"Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS Asymmetric Encryption requires two keys: a Public key and a Private key. These keys can be used to perform Encryption and Message Signing. Encryption provides Confidentiality and Message Signatures provides Integrity and Authentication. This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple effective and precise explanations. Complimented with"
YouTube Link 2021-10-18T13:00Z 328K followers, 410.9K engagements
"Understanding Secret Keys: A Simple Explanation In this video we formally define a term used throughout cryptography: Keys & Secret Keys. Nearly every operation in Cryptography makes use of these keys so it makes sense to spend a few minutes discussing them. // CHAPTERS // 0:00 - What are Secret Keys 0:36 - Key Sizes and Bits 1:59 - All keys are susceptible to brute force 2:34 - Why do we use Secret Keys in Cryptography 3:41 - Symmetric Keys and Asymmetric Keys // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography."
YouTube Link 2024-07-22T12:45Z 328K followers, 17.3K engagements
"Static NAT - Network Address Translation Static NAT is a 1:1 translation between one IP address and another IP address. Often this is a Private IP address to a Public IP address but it doesn't have to be. In this video we pick apart the concept of Static NAT explain the purpose of Static NAT and illustrate a packet as it passes through a Static NAT configuration. This is a look at Static NAT from a Vendor Neutral perspective. The concepts in this video will apply to any Static NAT translation on any platform from any vendor. 0:00 - Static NAT Definition and Purpose 1:55 - Static NAT Packet"
YouTube Link 2021-12-13T14:30Z 328K followers, 46.3K engagements
"MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough which leads us into the definition of a MAC. Then we define the most commonly used MAC. the HMAC. // CHAPTERS // 0:00 - Message Authentication Codes 0:38 - Hashing isn't enough for Integrity 2:04 - Hashing vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs can be included with Encryption in AEAD Ciphers 6:16 - Full Crypto Essentials series:"
YouTube Link 2024-08-12T13:00Z 328K followers, 39.6K engagements
"What is a Network Bridge Bridge vs Hub -- #network #networking #networkdevices #ccna #comptia #it This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O network devices explained what is hub how hubs work hubs explained hub switch router hub vs switch networking basics network devices explained what is hub how hubs work hubs explained hub switch router hub vs switch networking basics"
YouTube Link 2023-09-18T13:00Z 328K followers, 38.6K engagements
"Packet Traveling - How Packets Move Through a Network This video will illustrate everything that happens to describe how packets travel through a network. Specifically we will look at every step to get a packet from a host through a switch then a router then another switch and finally to another host. This video is the series finale to an article series on Practical Networking.net that explains everything you need to know to understand how data moves through the Internet. You can read the Packet Traveling series here:"
YouTube Link 2016-03-27T15:45Z 328K followers, 930.8K engagements
"Numbered ACL Configuration Demonstration -- Access Control Lists (ACLs) -- Part [--] of [--] Welcome to Part [--] of an eight part video series discussing Access Control Lists on Cisco IOS Routers. In this video we'll be applying what we learned about the Syntax of Numbered ACLs in Part [--] as we configure various access-list entries together. While configuring I'll also be talking through some important considerations for access lists. 00:00 - Intro & Part [--] Recap 00:27 - ACL Remarks 01:28 - Matching IP traffic between two Hosts 02:37 - Specifying IP Addresses 02:45 - Matching IP traffic between a"
YouTube Link 2020-07-21T14:00Z 309K followers, 36.8K engagements
"Dynamic NAT - Network Address Translation Dynamic NAT is a type of translation that allows many internal hosts to share fewer external IP addresses. Typically in today's world a true Dynamic NAT is very rarely used. However. Dynamic NAT is often confused with a Dynamic PAT -- which is used very commonly. The critical difference between a Dynamic NAT and a Dynamic PAT is with a Dynamic NAT the IP address can only be used by one internal host at a time. where as with a Dynamic PAT the IP address can be shared among many internal hosts at a time. 📌 Full NAT Playlist:"
YouTube Link 2021-12-30T20:35Z 316K followers, 26.5K engagements
"Discontiguous Wildcard Masks In this lesson I'm going to teach you about Discontiguous Wildcard Masks. Before watching this video you'll want to have watched the video covering Wildcard Masks: https://www.youtube.com/watchv=_PuyU1PJDo0 Once you've watched that video you can watch this video. In this video you will learn what Discontiguous Wildcard Masks are and how they work. Then I'll show you how you can reduce your access control list (ACL) lines by using a Discontiguous Wildcard Mask. Finally we'll wrap up with a discussion of when Discontiguous Wildcard Masks are used today. As a bonus"
YouTube Link 2020-06-21T14:30Z 293K followers, 17.4K engagements
"What are Clients and Servers #shorts #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi clients servers hosts computer networking networking network fundamentals clients servers hosts computer networking networking network fundamentals"
YouTube Link 2023-07-31T14:00Z 328K followers, 16.9K engagements
"How does NAT conserve IP Address Space (and why) - Network Address Translation Network Address Translation or NAT was created to extend the life of IPv4. The world has been running out of IP addresses (for 10+ years 🙄). The permanent solution is to switch to IPv6. But in the mean time we can use NAT to extend the IPv4 address space further and further. In this lesson we'll look at exactly how NAT extends the IPv4 address range. This is the first video from a series of Videos where we once and for all explain NAT in an effective and practical way. 0:00 - IP Addresses 1:19 - IP Addresses are"
YouTube Link 2021-12-06T14:30Z 315K followers, 51.3K engagements
"OSPF Areas and OSPF Types of Routers - Practical OSPF - Lesson [--] Understanding OSPF design requires understanding OSPF Areas. And to truly understand OSPF areas you must understand OSPF types of Routers. We'll be explaining both of these concepts in this lesson. OSPF allows for a two-tier hierarchy with Area [--] (the backbone area) at the top and every other area connected through Area [--]. This creates a Hub and Spoke area design. Routers in OSPF are labeled based upon where they sit in the Area design. There are four types of OSPF Routers: Internal Routers Backbone Routers Area Border Routers"
YouTube Link 2022-03-14T13:15Z 309K followers, 57.5K engagements
"IPv6 ACLs - Syntax and Demonstration -- Access Control Lists (ACLs) -- Part [--] of [--] In this video we look at the Syntax to configure IPv6 ACLs which closely follows the syntax for Named ACLs we discussed in Parts [--] and [--]. We then reconfigure the ACLs from prior videos in IPv6 to show you how all the same concepts still apply. Timestamps 00:00 - Start 00:13 - Review of last video 00:27 - IPv6 ACLs can be configured with Named Syntax 00:42 - Syntax for IPv6 ACLs & differences with IPv4 Syntax 02:12 - IPv6 demonstration topology and packets 02:52 - Review of Part 5's IPv4 Configuration 03:14 -"
YouTube Link 2020-08-11T18:00Z 298K followers, 15.4K engagements
"ACL Placement: Closer to the Source or Destination -- Access Control Lists (ACLs) -- Part [--] of [--] Standard ACLs and Extended ACLs are two different tools you can use to identify and filter traffic. When applying them to filter traffic a decision as to be made as to where they should be applied. In this video we talk through the different options and shed light on why the following rules end up being the best practice: * Standard ACLs should be applied closest to the Destination * Extended ACLs should be applied closest to the Source That said these two rules should be considered as"
YouTube Link 2020-08-25T17:00Z 305K followers, 19.5K engagements
"Named ACL Configuration Demonstration -- Access Control Lists (ACLs) -- Part [--] of [--] In this video we re-configure the numbered ACL we created in Part [--] using Named Syntax. Then we go through four features of Named ACLs that aren't possible with Numbered ACLs. You'll learn how similar Named ACL is compared to Numbered ACL. If you understand Parts [--] and [--] which explain Numbered ACL then understanding Named ACL will come very naturally. Timestamps: 00:00 - Intro 00:15 - Review of Video [--] 00:34 - Review of Configuration in Video [--] 00:52 - Converting Numbered ACL to Named ACL 02:10 - New Features"
YouTube Link 2020-08-04T18:30Z 305K followers, 23.7K engagements
"Demystifying TLS - the core of how SSL Certificates provide security on the Internet Last week we explored SSL Certificates - what they are and what they contain. This week we dive a bit deeper and explore how these certificates actually provide security on the Internet. In this sessions we'll answer these questions: - What are Certificate Signing Requests - How are SSL Certificates used to achieve security - How are SSL Certificates validated - What are Certificate Chains - Can certificates go bad - What do we do if certificates go bad As a bonus we'll also manually walk through a"
YouTube Link 2024-03-26T06:47Z 269K followers, [---] engagements
"control z on Cisco Routers"
YouTube Link 2023-05-10T02:43Z 328K followers, [----] engagements
"What is a Network #newtorking #cybersecurity #network This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi network networks networking what is a network networking fundamentals network networks networking what is a network networking fundamentals"
YouTube Link 2023-08-07T13:30Z 328K followers, 11.4K engagements
"Applying ACLs to Interfaces (IPv4 and IPv6) -- Access Control Lists (ACLs) -- Part [--] of [--] So far all we've done in the video series is configure Access Lists -- we haven't actually applied any of them to an Interface. That will be the focus of this video. We'll talk through the commands "ip access-group" and "ipv6 traffic-filter" and provide some configuration examples. We'll then provide the full scope of what was discussed in part 1: that you can apply one ACL per interface per direction per protocol. Timestamps: 0:00 - Start 0:12 - Review of Part [--] 0:51 - Applying ACLs to Interfaces 1:37 -"
YouTube Link 2020-08-18T15:54Z 293K followers, 19.6K engagements
"Policy NAT - Network Address Translation Policy NAT is a type of address translation which makes a decision to translate packets based upon both the source and destination. Typically only the source IP is matched when identifying traffic which should be translated. But sometimes it's beneficial to identify the traffic which must be translated using both the source and destination. In the end a Policy NAT is still simply one of the four types of translations we've already discussed: Static NAT Static PAT Dynamic PAT Dynamic NAT -- except the decision of "what to NAT" is done more granular. 📌"
YouTube Link 2022-01-03T13:47Z 305K followers, 17.5K engagements
"Ask Me Anything - 150k Subscribers - THANK YOU [------] people have chosen to click the subscribe button after watching a video on my channel. I never expected that to happen and I am very grateful for each of you. This video is a celebratory "AMA" (ask me anything) where I answered some questions from subscribers from my community page. 00:00 - Intro - THANK YOU FOR SUBSCRIBING 00:45 - What courses do I want to create next 02:03 - What Certifications do I hold 03:10 - Will AI have an impact on Network Engineers 04:30 - When is the new Networking course being created 05:32 - What is my best"
YouTube Link 2023-05-23T13:15Z 328K followers, [----] engagements
"Numbered ACL Syntax -- Access Control Lists (ACLs) -- Part [--] of [--] Welcome to Part [--] of an eight part series discussing Access Control Lists on Cisco IOS Routers. In this video we will be picking apart the syntax to configure Numbered ACLs on Cisco Routers. I'll show you the command and then we'll talk through each field. 0:00 - Start / Review of Part [--] 0:42 - Two sets of Syntax (Named vs Numbered) 1:05 - Syntax for Numbered ACL (Standard and Extended) 1:26 - Command: access-list 1:37 - ID Number 3:28 - Action 4:42 - Protocol 5:37 - Source and/or Destination 5:57 - Specifying IP Address 6:39 -"
YouTube Link 2020-07-20T14:00Z 309K followers, 43.6K engagements
"Practical OSPF - Series Introduction This is the introduction to a series explaining OSPF in simple terms from a practical perspective. The goal of this series is to make you a proficient engineer. We're aiming to teach you OSPF beyond mere CCNA level and up through CCNP level (except for about 5% see the video to understand what I mean). To get the most out of this series you should watch these pre-requisites: 👉 Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi 👉 Routers and how they work: Everything Routers do:"
YouTube Link 2022-03-07T13:59Z 306K followers, 90.5K engagements
"Dynamic PAT - Network Address Translation Dynamic PAT allows many internal hosts to share one (or more) external IP address. It does this by assigning unique source ports to each outbound connection such that the response traffic can be untranslated successfully to the initiating host. Dynamic PAT is the type of address translation which allows for the maximum conservation of IP Addresses. Dynamic PAT is often confused with Dynamic NAT. In this video we show you the packet flow through a Dynamic PAT showing you the packet before and after translation -- in BOTH directions (inbound and"
YouTube Link 2021-12-21T13:45Z 320K followers, 32.9K engagements
"Named ACL Syntax -- Access Control Lists (ACLs) -- Part [--] of [--] Welcome to Part [--] of an eight part video series discussing Access Control Lists on Cisco IOS Routers. In this video we'll be looking at the configuration syntax of Named ACL and comparing and contrasting it to the syntax of Numbered ACLs which we looked at in the prior two videos. 0:00 - Intro / Part [--] recap 0:25 - Syntax for Named ACLs 0:39 - Similarities between Named ACLs and Numbered ACLs 1:44 - Differences between Named ACLs and Numbered ACLs 1:59 - Named ACLs: Standard vs Extended 2:32 - Sequence Number 3:20 - Why used Named"
YouTube Link 2020-07-28T18:00Z 317K followers, 22.6K engagements
"Everything Routers do - Part [--] - How Routers forward Packets - Networking Fundamentals - Lesson [--] Routing is the process of moving data between networks. A Router is merely a device whose primary purpose is Routing. In this video we'll show you every step that occurs for hosts to communicate through Routers. You'll see how each Router uses their Routing Table and ARP table in order to forward packets. This video is a continuation of Part [--] which should be watched before watching this video: https://www.youtube.com/watchv=AzXys5kxpAM === Networking Fundamentals - Module [--] === Lesson [--] -"
YouTube Link 2021-06-22T15:00Z 325K followers, 177.5K engagements
"Fixed-Length Subnet Mask (FLSM) - Subnetting Mastery - FLSM and VLSM Appendix Part [--] of [--] This video is Part [--] of [--] of an extension to the Subnetting Mastery video series. This appendix covers FLSM and VLSM (Fixed Length Subnet Mask and Variable Length Subnet Mask). In this video you will learn how to answer these types of questions: - If you start with a /18 what size sub-network would you need to create [---] sub-networks - If you start with a /20 how many sub-networks could you create that each contain [--] IP Addresses A pre-requisite to this video is to understand Subnetting. The best way to"
YouTube Link 2019-07-29T15:58Z 326K followers, 120.6K engagements
"Everything Hosts do to speak on the Internet - Part [--] - Networking Fundamentals - Lesson [--] Module [--] of the Networking Fundamentals course will illustrate the core of networking: How data moves through the Internet. In this lesson we'll explore Internet communication from the host's perspective. We'll illustrate EVERYTHING a host does when speaking with other hosts on the Internet. We'll do this with two illustrations: First we'll look at everything that occurs for two hosts which are directly connected to each other do to communicate. Second we'll look at everything that occurs for two hosts"
YouTube Link 2021-01-14T21:55Z 326K followers, 235.2K engagements
"Public Key Infrastructure - What is a PKI - Cryptography - Practical TLS Throughout this course we've been discussing three key players: Client Server and Certificate Authority. These three identities create what's known as a PKI or a Public Key Infrastructure. Each element of a PKI serves a specific purpose: - Servers - Need to prove their Identity - Clients - Need to validate an Identity - Certificate Authority - Governs the whole process by issuing identities (in the form of Certificates) to Servers. Most of us are familiar with the public web PKI these are the Client/Server/CAs that"
YouTube Link 2021-11-02T13:45Z 322K followers, 119.6K engagements
"OSPF Configuration & Show Commands - Practical OSPF In this video we walk through an OSPF configuration together and I discuss the commands I am using and their effect. All the while showing you the various show commands you would use to validate OSPF's operation on Cisco routers. Below are the commands we'll be using in this live lab demonstration: Show Commands: show ip protocols show ip ospf interface brief show ip ospf neighbors show ip ospf database show ip ospf rib detail show ip route ospf Configuration Commands: router ospf process ID router-id router-id Adding Interfaces to OSPF:"
YouTube Link 2022-03-28T13:00Z 324K followers, 81.6K engagements
"Diffie-Hellman Key Exchange - the MAGIC that makes it possible - Cryptography - Practical TLS The Diffie-Hellman protocol is the underpinning of so many other security protocols on the Internet. It's the most popular answer to the question: How do we establish a shared key over an unsecure wire Diffie-Hellman uses a sequence of math calculations to answer that question. And in this video I'm going to prove it to you. This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive"
YouTube Link 2021-11-15T14:30Z 322K followers, 92.1K engagements
"Subnetting in the /1 - /16 range - Subnetting Mastery - Part [--] of [--] This is Video [--] of the Subnetting Mastery video series. In this video we extend the cheat sheet to include Subnetting in the First and Second octet (/1-/8 and /9-/16). Then we tie everything back together to what you learned in video [--]. BONUS: This Series was extended with more videos to discuss FLSM and VLSM Problems. Links are below What if there were a single video series that could make you a Subnetting Master What if that video series were available for free for everyone Look no further. This is it. This video series"
YouTube Link 2018-08-02T23:13Z 318K followers, 135.2K engagements
"Route Precedence -- How does a Router choose a path when multiple paths exist There are three attributes that are considered when a Router is determining its preferred path when multiple paths exist. This video describes and illustrates all three by showing them to you in a lab. At the end of this video you'll understand all three attributes plus you'll know what happens when all three attributes are identical. There are two Bonus Questions that will test how well you understood the concepts: [--]. How will the Routing Table change after this Static Route [--]. What path will R1 choose to get to"
YouTube Link 2020-03-31T21:17Z 319K followers, 48.2K engagements
"Static PAT - Network Address Translation Static PAT (Port Address Translation) is a 1:1 translation between one IP address & Port and another IP address & Port. A Static PAT would be used anytime you mean for a specific port to be translated through a NAT device. In this video we show you the packet flow through a Static PAT showing you the packet before and after translation -- in BOTH directions (inbound and outbound). This is a look at Static PAT from a Vendor Neutral perspective. The concepts in this video will apply to any Static NAT translation on any platform from any vendor. 0:00 -"
YouTube Link 2021-12-16T14:15Z 306K followers, 26.9K engagements
"Practice Examples - Subnetting Mastery - Part [--] of [--] This is Video [--] of the Subnetting Mastery video series. In this video there are four more practice problems to provide further demonstrations of the method and cheat sheet. The first two problems are fairly straight forward. The second two demonstrate a couple specific peculiarities you might encounter in the real world. If you feel comfortable with the content of Video [--] then at least watch the last two problems of this video. They will show you some situations that might cause confusion if you come across them in the future. What if there"
YouTube Link 2018-05-25T00:28Z 325K followers, 250.6K engagements
"how do you find the number of subnets from a mask"
YouTube Link 2023-05-16T18:30Z 328K followers, [----] engagements
"OSPF Framework & OSPF Packets: LSDB LSA Hello DBD LSR LSU LSAck OSPF makes use of three tables: Neighbor Table Topology Table and a Routing Table. The Topology table in OSPF is referred to as the Link State Database (LSDB). Each entry within the topology table is referred to as a Link State Advertisement (LSA). In this video we'll unpack each of these terms. Then we'll take a look at the types of OSPF Packets: Hello Packets DBDs LSRs LSUs and LSAcks (Database Descriptors Link State Requests Link State Updates and Link State Acknowledgements). These five packets are involved in every OSPF"
YouTube Link 2022-03-08T13:59Z 324K followers, 92.8K engagements
"Variable-Length Subnet Mask (VLSM) - Subnetting Mastery - FLSM and VLSM Appendix Part [--] of [--] This video is Part [--] of [--] of an extension to the Subnetting Mastery video series. This appendix covers FLSM and VLSM (Fixed Length Subnet Mask and Variable Length Subnet Mask). In this video we start with a typical VLSM problem: You are presented with a Network Topology and given a required number of IP addresses for various different Networks. You then have to break up a particular network into smaller networks to accommodate each of those IP address requirements. In the video we solve it visually"
YouTube Link 2019-08-29T18:58Z 320K followers, 74.5K engagements
"Static NAT -- Configuration and Verification -- NAT on Cisco IOS Routers (FREE Course Preview) This video demonstrates the syntax to configure a Static NAT on a Cisco Router. We then send packets through the device to show you the packets before and after translation to show you exactly what is modified with a Static NAT. We'll also look at the command show ip nat translations to verify the NAT operation through a Cisco router. This is a free lesson from my course on Network Address Translation on Udemy. The course runs $30 normally or less through the various Udemy Sales:"
YouTube Link 2020-04-27T19:24Z 322K followers, 23.3K engagements
"TLS / SSL Versions - Part [--] - Practical TLS In this lesson we'll explore the differences between the many versions of SSL and TLS that have existed over the years. This lesson is a free lesson from my new course: Practical TLS. This course is a deep dive into SSL and TLS. This SSL Training course is all you need to to fully understand SSL and TLS. 🔐 More details about the course: https://classes.pracnet.net/courses/practical-tls 🏢 Do you configure or troubleshoot TLS/SSL for work If so I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to"
YouTube Link 2021-07-19T16:30Z 326K followers, 53.8K engagements
"🎬 Let's do Packet Tracer labs together - VLANs Switching Troubleshooting - PTL1 In this live stream I'm going to walk through a Lab from Keith Barker's CCNA Packet Tracer labs. I'll discuss my way through the configuration and explain relevant protocols and commands. Keith Barker's Packet Tracer labs are available here (Scroll down to "FREE DOWNLOADS"): https://www.thekeithbarker.com/ In this live stream we're going to walk through the lab titled "Cisco PT Layer [--] Switching and VLANs". The most up to date version is available from Keith's website. But here is a direct download link:"
YouTube Link 2021-07-09T05:41Z 287K followers, 51.2K engagements
"Drawing the Cheat Sheet - Subnetting Mastery - Part [--] of [--] This is Video [--] of the Subnetting Mastery video series. In this video we will show you how to draw the ultimate Subnetting Cheat Sheet -- it's only [--] lines long and will help you solve subnetting problems in [--] seconds or less. The rest of the videos in this series will show you how to use this Cheat Sheet to answer any subnetting problem. What if there were a single video series that could make you a Subnetting Master What if that video series were available for free for everyone Look no further. This is it. This video series will"
YouTube Link 2018-05-25T00:28Z 324K followers, 288.1K engagements
"Local Broadcast and Directed Broadcasts - Demo and Packet Captures In this video we'll pick apart Broadcasts -- specifically the difference between a Local Broadcast and a Directed Broadcast (which is sometimes referred to as a Targeted Broadcast). We'll run through a few demonstrations of either type of broadcast. Then fire up Wireshark and take a look at the packets as they appear on the wire. This will illustrate clearly the difference between Layer [--] Broadcasts and Layer [--] Broadcasts. This is the "long version" of this video. In the shorter version we simply talk through the concepts and"
YouTube Link 2020-09-02T15:24Z 317K followers, 12.6K engagements
"Subnetting in the /17 - /24 range - Subnetting Mastery - Part [--] of [--] This is Video [--] of the Subnetting Mastery video series. In this video we show you how to use the same cheat sheet to solve subnetting problems in the Third octet (/17-/24) with the same speed and accuracy as the fourth octet. What if there were a single video series that could make you a Subnetting Master What if that video series were available for free for everyone Look no further. This is it. This video series will make you a Subnetting Pro. 0:00 - Start 0:13 - Extending Cheat Sheet to include 3rd Octet 0:45 - 3rd Octet"
YouTube Link 2018-07-30T15:09Z 322K followers, 180K engagements
"Why send an ACK with no data #tcp"
YouTube Link 2023-05-16T18:21Z 328K followers, [----] engagements
"OSPF Hello Packets :: Area Types (Stub/NSSA) :: BDR/DR :: Practical OSPF In this lesson we take a look at Hello Packets and explore all the items they contain. Understanding the content of a Hello packet will show us the requirements for OSPF Routers to become Neighbors with each other. The Hello packet also includes Area Type and BDR/DR/Priority which allows us to explain the ideas of Stub areas and Not So Stubby Areas (NSSA). As well as the concepts of the Designated Router (DR) Backup Designated Router (BDR) and the Priority Number. Here are all the contents of a Hello packet that are"
YouTube Link 2022-03-17T13:45Z 323K followers, 53.4K engagements
"HSTS - HTTP Strict Transport Security - Protect against SSL Stripping attack - Practical TLS HSTS (HTTP Strict Transport Security) prevents a site from being accessed over HTTP if it is meant to be accessed via HTTPS. It does this using three directives: Max-Age IncludeSubDomains Preload. In this video we discuss the SSL Stripping attack and discuss how HSTS prevents it. 🔑 More free lessons from the course: https://www.youtube.com/playlistlist=PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY 🔐 More details about the course: https://classes.pracnet.net/courses/practical-tls 🏢 Do you configure or"
YouTube Link 2022-05-02T16:06Z 328K followers, 55.8K engagements
"OSI Model: A Practical Perspective - Part [--] - Networking Fundamentals - Lesson [--] Module [--] of the Networking Fundamentals course will illustrate the core of networking: How data moves through the Internet. The foundation of that is understanding the OSI model. But this isn't about mere memorization instead we are going to look at the underlying goals of each layer of the OSI model and how it contributes to the over all goal of networking: Moving data between hosts. This lesson is a free lesson from my new course on Networking Fundamentals. The first module of this course is meant to teach you"
YouTube Link 2020-12-30T19:15Z 328K followers, 483.7K engagements
"What Are Access Lists -- Access Control Lists (ACLs) -- Part [--] of [--] Welcome to Part [--] of a new Video Series discussing Access Control Lists on Cisco Routers. This video answers the fundamental question: What are Access Lists In the video we explain the following items: 0:00 Start 0:21 What are Access Lists 0:41 What are various applications of Access Lists 1:34 Topology and Packets Introduction 2:49 What are Standard ACLs and Extended ACLs 4:35 Applying ACLs per Interface 5:34 Applying ACLs per Direction 6:51 Applying ACLs per Protocol 7:24 Summary Part [--] - What are Access Lists"
YouTube Link 2020-07-13T13:15Z 328K followers, 139.9K engagements
"RSA Key Exchange and Forward Secrecy - Cryptography Essentials RSA is the ultimate Asymmetric Cryptography algorithm because it can do every Asymmetric Crypto operation: Encryption Signatures and Key Exchanges. In this video we focus on how RSA facilitates a Key Exchange. Then we talk about a very important cryptographic concept: Forward Secrecy. We explain what it is and then demonstrate how RSA does not provide it. // CHAPTERS 0:00 - Intro / Key Exchange review 0:34 - RSA Key Exchange 2:14 - RSA Private Key must be kept secure forever 3:05 - Forward Secrecy // FULL SERIES - Cryptography"
YouTube Link 2024-10-07T13:00Z 328K followers, [----] engagements
"Can I rebuild an OSPF topology using ONLY the LSDB OSPF Routers share LSA to synchronize their LSDB then they use their LSDB to rebuild a topology map of every router and network. but is the LSDB really enough to rebuild the entire topology In this video we put that to the test. Jeremy of Jeremy's IT Lab has created an OSPF topology that I have never seen. And I'm going to try to draw out the entire topology just like a Router would using ONLY the contents of the Link State Database and the details of each LSA. This video is an addendum to my Practical OSPF series which is a modern"
YouTube Link 2022-11-16T18:29Z 328K followers, 14.9K engagements
"What is a Hub #networking #networkdevices #ccna #comptia #informationsecurity #networkingtips This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O"
YouTube Link 2023-09-11T13:00Z 328K followers, 10.8K engagements
"RSA & Asymmetric Encryption - Cryptography Essentials The RSA algorithm is the only asymmetric algorithm that can do Asymmetric Encryption. It's often used as the definition of Asymmetric Crypto but technically Asymmetric Crypto includes so much more than just Asymmetric Encryption. // CHAPTERS 0:00 - Asymmetric Cryptography vs Asymmetric Encryption 0:56 - Public Key Encrypts Private Key Decrypts 2:00 - Confidentiality - the purpose of asymmetric encryption 2:15 - RSA - the only asymmetric encryption algorithm 2:50 - Asymmetric Encryption is computationally expensive 3:12 - RSA Input and"
YouTube Link 2024-09-02T13:15Z 328K followers, 11K engagements
"What are Subnets #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi subnets subnetting networking networks in networks what is a subnet what are subnets subnets subnetting networking networks in networks what is a subnet what are subnets"
YouTube Link 2023-08-10T13:45Z 328K followers, 43K engagements
"What is a Repeater #network #networking #networkdevices #ccna #comptia This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O repeater repeaters ethernet repeater repeater vs switch repeater vs hub hub switch networking network devices networking fundamentals max length repeater repeaters ethernet repeater repeater vs switch repeater vs hub hub switch networking network devices networking"
YouTube Link 2023-09-06T13:00Z 328K followers, [----] engagements
"Everything Switches do - Part [--] - Networking Fundamentals - Lesson [--] Switching is the process of facilitating communication within a network. Switches are simply device's whose primary purpose is Switching. This definition is intentionally worded as such because there are many devices that claim to do "switching" -- and all of those devices will follow the same rules and processes that Switches do to facilitate communication within a network. In Part [--] we discussed Switches as L2 devices MAC address tables and the three fundamental switch actions: Learning Flooding Forwarding. In Part [--] (this"
YouTube Link 2021-02-09T20:21Z 328K followers, 186.3K engagements
"What is a Switch #networking #networkdevices #ccna #comptia #informationsecurity #networkingtips This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O cisco ccna computer networking network devices explained switches explained networking basics switch switching switch vs hub switch vs repeater switch vs bridge switch vs router switch router router vs switch network switch net+ network+"
YouTube Link 2023-09-25T13:00Z 328K followers, 11.9K engagements
"OSPF Network Types - FINALLY an explanation that makes sense - Practical OSPF Every OSPF link is associated with an OSPF Network Type. There are [--] Network Types that exist: Point to Point Broadcast Non-Broadcast Multi-Access (NBMA) Point to Multipoint and Point to Multipoint Non Broadcast (P2MP-NB). Each Network Type acts slightly different in an effort to optimize OSPF's behavior. In this video we look at the differences between all five OSPF network types. This is lesson [--] of the Practical OSPF series. The full series is available here:"
YouTube Link 2022-08-01T13:00Z 328K followers, 51.1K engagements
"UDP doesn't suck It's the BEST L4 protocol for THESE types of applications. UDP is often defined by comparing it to TCP. Which leaves UDP with definitions like "no flow control" and "no reliability". These types of comparison tend to give UDP a bad reputation. UDP in fact is much cooler than people realize and in this video we're going to illustrate the three types of applications that are better suited for UDP than they are for TCP. TCP vs UDP - Explaining Facts and Debunking Myths - TCP Masterclass - Lesson [--] https://www.youtube.com/watchv=jE_FcgpQ7Co TCP - [--] Simple ideas to explain the"
YouTube Link 2023-03-19T14:35Z 328K followers, 45.5K engagements
"Designated Router // Backup Designated Router // DR BDR Election // Practical OSPF // Lesson [--] The Designated Router (DR) and Backup Designated Router (BDR) exist to reduce redundant LSA flooding on an OSPF multi access link. Routers on a multi access link use the 224.0.0.5 and 224.0.0.6 Multicast IP Addresses to efficiently share LSAs with each other. In this video we explore the process by which a DR and BDR are elected. We discuss the WAIT interval in OSPF we discuss Preemption and Priority numbers. We wrap up the video by showing you the sequence of events that occurs when a routing"
YouTube Link 2022-05-09T12:59Z 328K followers, 43.6K engagements
"What are IP Addresses #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi ip address ip addresses what are ip ip ipv4 address networking networking [---] network fundamentals networking fundamentals learn networking ip address ip addresses what are ip ip ipv4 address networking networking [---] network fundamentals networking fundamentals learn networking"
YouTube Link 2023-08-03T13:00Z 328K followers, 20.2K engagements
"Symmetric Cryptography is a category In this video we introduce the category of Symmetric Cryptography and quickly define the [--] types of operations that it includes: Symmetric Encryption Message Authentication Codes (MACs) Pseudo Random Functions (PRFs). Each of these will be explored in more details in the upcoming videos in the series. // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply and technically accurate. The full series is available here: 📋"
YouTube Link 2024-07-29T13:00Z 328K followers, 10.7K engagements
"Supernetting IP Aggregation and IP Summarization -- Subnetting Mastery Supernetting IP Aggregation and IP Summarization are three terms that all mean the same thing: Taking Subnets or IP addresses and finding a single network they all belong to. In this video we will teach you exactly what Supernetting entails then show you how to solve summarization problems quickly and efficiently by hand using only scratchpaper. It is recommended to have watched the rest of the videos in the Subnetting Mastery video series: https://subnetipv4.com/"
YouTube Link 2021-05-25T15:00Z 328K followers, 61.4K engagements
"A better definition of Asymmetric Cryptography If you think Asymmetric Crypto is merely "encrypting with a public key and decrypting with a private key" then you're definition is missing a large part of Asymmetric Cryptography In this video I share a better framework for understanding Asymmetric Cryptography and the operations it is responsible for (Encryption Signatures and Key Exchanges). // CHAPTERS 0:00 - Understanding Asymmetric Cryptography 0:45 - Asymmetric Keys are not merely a single value 1:28 - Public Keys vs Private Keys -- which are used first 1:59 - Asymmetric Crypto Operations:"
YouTube Link 2024-08-26T13:15Z 328K followers, 40.2K engagements
"What are Hosts #shorts #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi networking network hosts clients servers internet networking network hosts clients servers internet"
YouTube Link 2023-07-28T21:26Z 328K followers, 23.3K engagements
"You can't do security without THIS Every secure communication protocol will at some point require some sort of Key Exchange. In this video we discuss the concept of a Key Exchange and illustrate the problem that a Key Exchange is trying to solve. We then explain simply how that problem is solved. Finally we introduce the two algorithms that can be used to do the actual math of a Key Exchange: RSA and DH. Which will each be covered in the next couple of lessons. // CHAPTERS 0:00 - Intro 0:20 - The Key Exchange Problem 1:17 - The solution 1:34 - What is a Shared Secret 2:52 - Shared Secret vs"
YouTube Link 2024-09-30T13:15Z 328K followers, [----] engagements
"RSA Signatures The RSA algorithm is one of two algorithms that can create digital signatures. In this video we discuss how RSA Signatures take advantage of RSAs ability to encrypt and decrypt. We then illustrate the process for generating signatures with RSA and the process for verifying signatures with RSA. // CHAPTERS 0:00 - Intro 0:11 - RSA Review 0:38 - Encrypt with the Private Decrypt with the Public 1:00 - RSA Signature Generation Process 2:10 - RSA Signature Verification Process 2:57 - Summary // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering"
YouTube Link 2024-09-16T13:15Z 328K followers, 11.8K engagements
"OSPF LSA - the BEST explanation of the Types of OSPF LSAs OSPF Routers share routing information using Link State Advertisements or LSAs. There are [--] main types of OSPF LSAs and all of them are used to populate a Router's the Link State Database (LSDB). In this video we illustrate and explain the [--] main types of OSPF LSAs: Type [--] LSAs - Router LSA Type [--] LSAs - Network LSA Type [--] LSAs - Summary LSA Type [--] LSAs - ASBR Summary LSA Type [--] LSAs - External LSAs This is lesson [--] of the Practical OSPF series. The full series is available here:"
YouTube Link 2022-07-25T13:00Z 328K followers, 67.5K engagements
"What is a Router #networking #networkdevices #ccna #comptia #informationsecurity #networkingtips This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O router routers what is a router router vs switch network devices explained network devices networking fundamentals ccna training how router works what is router switch and hub router routers what is a router router vs switch network devices"
YouTube Link 2023-10-09T13:00Z 328K followers, 13.3K engagements
"Local Broadcast and Directed Broadcasts - Description and Demonstration In this video we'll pick apart Broadcasts -- specifically the difference between a Local Broadcast and a Directed Broadcast (which is sometimes referred to as a Targeted Broadcast). This is the "short version" of this video. In the longer video we'll run through the same demonstration but I'll also show you the packet captures of what is so you can see exactly what is happening on the wire. 0:00 - Start 0:11 - Topology 0:21 - Official Definition of a Broadcast message 0:49 - Layer [--] Broadcast vs Layer [--] Broadcast 1:24 -"
YouTube Link 2020-09-02T17:38Z 328K followers, 24.6K engagements
"How SSL & TLS use Cryptographic tools to secure your data - Practical TLS Hashing Signing Encryption Key Exchange -- these are tools of cryptography that are used by SSL and TLS to secure data. In this lesson we unpack how each of these tools are used to provide security to your online communication. This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple effective and precise explanations. Complimented with practical illustrations"
YouTube Link 2021-10-25T14:00Z 328K followers, 90.8K engagements
"DSA Signatures DSA or the Digital Signature Algorithm is an asymmetric crypto operation that lets you Generate and Verify signatures. In this video we discuss DSA compare it to RSA Signatures and illustrate the signature generation and verification process. // CHAPTERS 0:00 - Intro 0:12 - DSA is a Signature Only algorithm 0:34 - DSA Signature Generation 0:44 - DSA Signature Verification 1:03 - Additional Info // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply and technically accurate. The full"
YouTube Link 2024-09-23T13:15Z 328K followers, [----] engagements
"Updates from Practical Networking Four updates about what's going on and what's coming up for Practical Networking. Links mentioned in video: Update [--] Survey link: https://www.youtube.com/post/UgkxJ-byQolBsU0Bkruxsi4zKvjnZD8S_9U1 Update [--] AMA: https://www.youtube.com/post/Ugkxi9ANr7Ka7EBQzEo77vHqjil6wme6sLmf Twitter/X: https://twitter.com/ed_pracnet LinkedIn: https://linkedin.com/in/eharmoush Update [--] Module [--] (free on YT): https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi Module [--] details & more info: https://classes.pracnet.net/courses/networking Update [--] Practical TLS"
YouTube Link 2024-11-26T14:41Z 328K followers, [----] engagements
"Everything Hosts do to speak on the Internet - Part [--] - Networking Fundamentals - Lesson [--] Module [--] of the Networking Fundamentals course will illustrate the core of networking: How data moves through the Internet. In this lesson we'll explore Internet commuication from the host's perspective. We'll illustrate EVERYTHING a host does when speaking with other hosts on the Internet. We'll do this with two illustrations: First we'll look at everything that occurs for two hosts which are directly connected to each other do to communicate. Second we'll look at everything that occurs for two hosts"
YouTube Link 2021-01-07T20:46Z 328K followers, 349.7K engagements
"Digital Signature Algorithm (DSA) - Cryptography - Practical TLS The Digital Signature Algorithm (DSA) is an Asymmetric Encryption algorithm. but it's different from the other Asymmetric Encryption algorithms we've discussed (RSA & DH). DSA has only two functions: Signature Generation and Signature Verification. It cannot do Encryption it cannot do Decryption it cannot do a Key Exchange. It's use is purely creating and verifying Signatures which provides Integrity and Authentication to what is signed. This lesson is a free sample lesson from the the greatest TLS and SSL training course ever"
YouTube Link 2021-11-22T14:15Z 327K followers, 97.9K engagements
"TCP vs UDP - Explaining Facts and Debunking Myths - TCP Masterclass TCP and UDP are the predominate Layer [--] protocols that have been used since the dawn of the Internet. In this video we discuss TCP and UDP without getting bogged down with jargon or incomplete definitions. We compare TCP and UDP across [--] dimensions: - Connection Oriented vs Not Connection Oriented - Reliable vs Unreliable (although I don't like the term "unreliable" here) - Flow Control vs No Flow Control - More Overhead vs Less Overhead Then we discuss and dispel four Myths about TCP and UDP: - UDP is Faster - TCP is More"
YouTube Link 2023-01-30T13:59Z 328K followers, 142.3K engagements
"Keychains / Key Rotation / hmac-sha keys - OSPF Authentication - Practical OSPF How can two routers change the authentication keys they are using without risking a neighbor adjacency going down That is handled by Key Rotation. How can we configure more secure hashing algorithms for OSPF authentication like hmac-sha That is handled by Key Chains. Both Keychains and Key Rotation are covered in this lesson. This is lesson [--] of the Practical OSPF series. The full series is available here: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSkwy0-im5ERL-_CeBxEdx3 00:00 - Intro 01:33 - Key Rotation"
YouTube Link 2022-10-10T13:15Z 328K followers, [----] engagements
"Looking inside an SSL Certificate with OpenSSL Throughout this series we've used the "-text" command to extract everything inside a Certificate CSR or Private Key file. But in some cases it's more beneficial to extract only the specific piece of information you need from a Certificate. That is what we will be focusing on in this video. We will use the openssl req and openssl x509 utilities to extract individual pieces of information from a Certificate and CSR. This lesson is a preview lesson from my OpenSSL Training Course: https://classes.pracnet.net/courses/openssl-training The lessons in"
YouTube Link 2022-02-14T14:15Z 328K followers, 16.5K engagements
"Signatures - What and why are they In this video we take a look at Digital Signatures. We explain what they are show you examples of what types of things are signed and discuss how they provide Integrity and Authentication to what is signed. We then compare them to HMACs and MACs which also provide Integrity & Authentication but have a slightly different use case. // CHAPTERS 0:00 - Intro 0:12 - Simple Definition 0:38 - Signatures are created with Private Key & verified with Public Key 1:31 - Anything can be signed 2:04 - Integrity and Authentication 2:39 - Signatures vs MACs / HMACs 4:23 -"
YouTube Link 2024-09-09T13:15Z 328K followers, [----] engagements
"Elliptic Curve Cryptography in less than [--] minutes ECC or Elliptic Curve Cryptography is the most secure and modern way of doing Cryptography. But what is it really What are the most important parts of understanding ECC In this video we give you the framework for seeing that ECC is really not all that different from the Cryptography you might already be familiar with. // CHAPTERS 0:00 - Intro 0:25 - Review of Asymmetric Cryptography 1:03 - What is an Elliptic Curve 1:45 - Points on a Curve as values in Math formulas 2:09 - RSA DSA and DH 3:02 - ECRSA ECDSA and ECDH 3:27 - ECC is more secure"
YouTube Link 2024-10-21T13:15Z 328K followers, 30.9K engagements
"Cryptography Essentials - Series Intro The first video in a series of videos covering the essentials of modern cryptography This series will give you the foundation necessary to understand protocols like SSL TLS IPsec SSH and many other elements of online and offline digital security. But it won't be like other Cryptography lessons. I'm going to focus only on the core essential knowledge that everyone needs. All the while remaining technically accurate. // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained"
YouTube Link 2024-07-08T18:09Z 328K followers, 21.2K engagements
"Router Hierarchies and Route Summarization - Networking Fundamentals - Lesson [--] - Part [--] In this video we provide a brief introduction to Network Design concepts. We discuss how Routers are typically deployed in a Hierarchy and the benefits this achieves. One of those benefits is the ability to Summarize Routes for the sake of reducing the number of entries in the Routing Table. We show you some examples of Route Summarization all the way through to the ultimate route summary known as the Default Route (0.0.0.0 /0). This is Part [--] of our lesson on Routers. It is recommended to have watched"
YouTube Link 2021-08-23T14:00Z 328K followers, 141.6K engagements
"Ask Me Anything - 280k Subs - reading RFCs retaining information book recommendations infosec . AMA for crossing 280k Subscribers. Thank you all who have subscribed. These questions came from LinkedIn Youtube Comments and Twitter/X. Thank you for asking and for all the comments (now and in the past) anyone has left on my channel. It means the world to me and has been a continual source of encouragement and positivity. Thank you all"
YouTube Link 2025-02-24T13:30Z 328K followers, [----] engagements
"Ask Me Anything - 280k Subs - reading RFCs retaining information book recommendations infosec . AMA for crossing 280k Subscribers. Thank you all who have subscribed. These questions came from LinkedIn Youtube Comments and Twitter/X. Thank you for asking and for all the comments (now and in the past) anyone has left on my channel. It means the world to me and has been a continual source of encouragement and positivity. Thank you all"
YouTube Link 2025-02-24T13:30Z 328K followers, [----] engagements
"Updates from Practical Networking Four updates about what's going on and what's coming up for Practical Networking. Links mentioned in video: Update [--] Survey link: https://www.youtube.com/post/UgkxJ-byQolBsU0Bkruxsi4zKvjnZD8S_9U1 Update [--] AMA: https://www.youtube.com/post/Ugkxi9ANr7Ka7EBQzEo77vHqjil6wme6sLmf Twitter/X: https://twitter.com/ed_pracnet LinkedIn: https://linkedin.com/in/eharmoush Update [--] Module [--] (free on YT): https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi Module [--] details & more info: https://classes.pracnet.net/courses/networking Update [--] Practical TLS"
YouTube Link 2024-11-26T14:41Z 328K followers, [----] engagements
"Elliptic Curve Cryptography in less than [--] minutes ECC or Elliptic Curve Cryptography is the most secure and modern way of doing Cryptography. But what is it really What are the most important parts of understanding ECC In this video we give you the framework for seeing that ECC is really not all that different from the Cryptography you might already be familiar with. // CHAPTERS 0:00 - Intro 0:25 - Review of Asymmetric Cryptography 1:03 - What is an Elliptic Curve 1:45 - Points on a Curve as values in Math formulas 2:09 - RSA DSA and DH 3:02 - ECRSA ECDSA and ECDH 3:27 - ECC is more secure"
YouTube Link 2024-10-21T13:15Z 328K followers, 30.9K engagements
"Diffie-Hellman Key Exchange and Forward Secrecy Diffie-Hellman is the most secure way of doing a Key Exchange. Specifically because it provides a very important Cryptographic concept known as Forward Secrecy. In this video we show you Diffie-Hellman twice: once with simplified math and later with the real math. Then we define Forward Secrecy and explain how Diffie-Hellman provides it. // CHAPTERS 00:00 - Intro / Key Exchange review 00:36 - Plan for this video 01:19 - Simplified Diffie-Hellman Key Exchange 03:29 - Diffie-Hellman Assurances 04:13 - Forward Secrecy 06:59 - Modular Exponentiation"
YouTube Link 2024-10-14T13:15Z 328K followers, 12.7K engagements
"RSA Key Exchange and Forward Secrecy - Cryptography Essentials RSA is the ultimate Asymmetric Cryptography algorithm because it can do every Asymmetric Crypto operation: Encryption Signatures and Key Exchanges. In this video we focus on how RSA facilitates a Key Exchange. Then we talk about a very important cryptographic concept: Forward Secrecy. We explain what it is and then demonstrate how RSA does not provide it. // CHAPTERS 0:00 - Intro / Key Exchange review 0:34 - RSA Key Exchange 2:14 - RSA Private Key must be kept secure forever 3:05 - Forward Secrecy // FULL SERIES - Cryptography"
YouTube Link 2024-10-07T13:00Z 328K followers, [----] engagements
"You can't do security without THIS Every secure communication protocol will at some point require some sort of Key Exchange. In this video we discuss the concept of a Key Exchange and illustrate the problem that a Key Exchange is trying to solve. We then explain simply how that problem is solved. Finally we introduce the two algorithms that can be used to do the actual math of a Key Exchange: RSA and DH. Which will each be covered in the next couple of lessons. // CHAPTERS 0:00 - Intro 0:20 - The Key Exchange Problem 1:17 - The solution 1:34 - What is a Shared Secret 2:52 - Shared Secret vs"
YouTube Link 2024-09-30T13:15Z 328K followers, [----] engagements
"DSA Signatures DSA or the Digital Signature Algorithm is an asymmetric crypto operation that lets you Generate and Verify signatures. In this video we discuss DSA compare it to RSA Signatures and illustrate the signature generation and verification process. // CHAPTERS 0:00 - Intro 0:12 - DSA is a Signature Only algorithm 0:34 - DSA Signature Generation 0:44 - DSA Signature Verification 1:03 - Additional Info // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply and technically accurate. The full"
YouTube Link 2024-09-23T13:15Z 328K followers, [----] engagements
"RSA Signatures The RSA algorithm is one of two algorithms that can create digital signatures. In this video we discuss how RSA Signatures take advantage of RSAs ability to encrypt and decrypt. We then illustrate the process for generating signatures with RSA and the process for verifying signatures with RSA. // CHAPTERS 0:00 - Intro 0:11 - RSA Review 0:38 - Encrypt with the Private Decrypt with the Public 1:00 - RSA Signature Generation Process 2:10 - RSA Signature Verification Process 2:57 - Summary // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering"
YouTube Link 2024-09-16T13:15Z 328K followers, 11.8K engagements
"Signatures - What and why are they In this video we take a look at Digital Signatures. We explain what they are show you examples of what types of things are signed and discuss how they provide Integrity and Authentication to what is signed. We then compare them to HMACs and MACs which also provide Integrity & Authentication but have a slightly different use case. // CHAPTERS 0:00 - Intro 0:12 - Simple Definition 0:38 - Signatures are created with Private Key & verified with Public Key 1:31 - Anything can be signed 2:04 - Integrity and Authentication 2:39 - Signatures vs MACs / HMACs 4:23 -"
YouTube Link 2024-09-09T13:15Z 328K followers, [----] engagements
"RSA & Asymmetric Encryption - Cryptography Essentials The RSA algorithm is the only asymmetric algorithm that can do Asymmetric Encryption. It's often used as the definition of Asymmetric Crypto but technically Asymmetric Crypto includes so much more than just Asymmetric Encryption. // CHAPTERS 0:00 - Asymmetric Cryptography vs Asymmetric Encryption 0:56 - Public Key Encrypts Private Key Decrypts 2:00 - Confidentiality - the purpose of asymmetric encryption 2:15 - RSA - the only asymmetric encryption algorithm 2:50 - Asymmetric Encryption is computationally expensive 3:12 - RSA Input and"
YouTube Link 2024-09-02T13:15Z 328K followers, 11K engagements
"A better definition of Asymmetric Cryptography If you think Asymmetric Crypto is merely "encrypting with a public key and decrypting with a private key" then you're definition is missing a large part of Asymmetric Cryptography In this video I share a better framework for understanding Asymmetric Cryptography and the operations it is responsible for (Encryption Signatures and Key Exchanges). // CHAPTERS 0:00 - Understanding Asymmetric Cryptography 0:45 - Asymmetric Keys are not merely a single value 1:28 - Public Keys vs Private Keys -- which are used first 1:59 - Asymmetric Crypto Operations:"
YouTube Link 2024-08-26T13:15Z 328K followers, 40.2K engagements
"PRFs explained: Transforming Secrets into Infinite Keys - Pseudo Random Functions In this video we explore the world of Pseudo Random Functions (PRFs) and reveal the role they play in secure communication. PRFs are essential cryptographic operations that generate arbitrary length bit stream outputs from input values playing a crucial role whenever you connect to a secure website. We start by comparing PRFs to hashing algorithms highlighting their similarities and differences and then offer a comprehensive definition of a PRF. You'll learn how PRFs transform a single secret key into multiple"
YouTube Link 2024-08-19T13:15Z 328K followers, 14K engagements
"MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough which leads us into the definition of a MAC. Then we define the most commonly used MAC. the HMAC. // CHAPTERS // 0:00 - Message Authentication Codes 0:38 - Hashing isn't enough for Integrity 2:04 - Hashing vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs can be included with Encryption in AEAD Ciphers 6:16 - Full Crypto Essentials series:"
YouTube Link 2024-08-12T13:00Z 328K followers, 39.6K engagements
"Symmetric Encryption - AES ChaCha20 3DES RC4 DES - Cryptography Essentials Symmetric Encryption is the example used most often when people discuss Cryptography. It allows two parties to speak securely to each other by encrypting and decrypting content as it is sent across the wire. // CHAPTERS // 0:00 - Symmetric Encryption 0:52 - Simple Explanation 1:43 - Purpose: Why do we use Symmetric Encryption 2:21 - Efficiency of Symmetric Encryption 2:39 - Algorithms 3:28 - Outro // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern"
YouTube Link 2024-08-05T13:00Z 328K followers, 14.6K engagements
"Symmetric Cryptography is a category In this video we introduce the category of Symmetric Cryptography and quickly define the [--] types of operations that it includes: Symmetric Encryption Message Authentication Codes (MACs) Pseudo Random Functions (PRFs). Each of these will be explored in more details in the upcoming videos in the series. // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply and technically accurate. The full series is available here: 📋"
YouTube Link 2024-07-29T13:00Z 328K followers, 10.7K engagements
"Understanding Secret Keys: A Simple Explanation In this video we formally define a term used throughout cryptography: Keys & Secret Keys. Nearly every operation in Cryptography makes use of these keys so it makes sense to spend a few minutes discussing them. // CHAPTERS // 0:00 - What are Secret Keys 0:36 - Key Sizes and Bits 1:59 - All keys are susceptible to brute force 2:34 - Why do we use Secret Keys in Cryptography 3:41 - Symmetric Keys and Asymmetric Keys // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography."
YouTube Link 2024-07-22T12:45Z 328K followers, 17.3K engagements
"Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials In this video we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms like MD5 and SHA convert messages into unique fixed-length strings called digests. Hashing plays a critical role in ensuring data integrity and security making it a foundational concept in cryptography and networking. We break down the basics of hashing with simple examples showing you how a hashing algorithm works and why it's crucial for comparing and verifying data. We also touch on"
YouTube Link 2024-07-15T13:00Z 328K followers, 33.2K engagements
"Cryptography Essentials - Series Intro The first video in a series of videos covering the essentials of modern cryptography This series will give you the foundation necessary to understand protocols like SSL TLS IPsec SSH and many other elements of online and offline digital security. But it won't be like other Cryptography lessons. I'm going to focus only on the core essential knowledge that everyone needs. All the while remaining technically accurate. // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained"
YouTube Link 2024-07-08T18:09Z 328K followers, 21.2K engagements
"OSI Model Layer [--] [--] and [--] -- Session Presentation & Application Layers -- what they actually do Plenty of attention is given to L1-L4 of the OSI model. but very little attention is given to the Session Layer the Presentation Layer and the Application layer (Layers [--] Layer [--] and Layer 7). That's led to a lot of bad information existing about these three errors. So I decided to create a video that explained how these three layers work and how they contribute towards the goal of Networking: sending data between two computers. This video can be considered a follow up to my first two videos on the"
YouTube Link 2023-10-31T13:00Z 328K followers, 98.2K engagements
"How do Routers work What is a Routing Table #ccna #comptia #networking #networkdevices #infosec This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O routing table what is a router how does a router work route table ip routing cisco routers routing table fundamentals what is routing table routing tables cisco router network routing routing table what is a router how does a router work route"
YouTube Link 2023-10-16T13:00Z 328K followers, 41.1K engagements
"What is a Router #networking #networkdevices #ccna #comptia #informationsecurity #networkingtips This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O router routers what is a router router vs switch network devices explained network devices networking fundamentals ccna training how router works what is router switch and hub router routers what is a router router vs switch network devices"
YouTube Link 2023-10-09T13:00Z 328K followers, 13.3K engagements
"HTTP vs HTML: Unveiling Network Protocols using Telnet At the surface this video is about HTTP HTML and Telnet. But beneath that this video is actually a demonstration of how every Network Protocol works. A Connection is made via TCP or UDP a request is sent a response is received. We demonstration this with HTTP / HTML / Telnet but this same sequence occurs with nearly all other protocols as well. In this demonstration we show you exactly what your web browser does: It initiates an HTTP request in order to download an HTML page and then it renders it in a way that is more visually appealing."
YouTube Link 2023-10-02T13:59Z 328K followers, 73.7K engagements
"What is a Switch #networking #networkdevices #ccna #comptia #informationsecurity #networkingtips This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O cisco ccna computer networking network devices explained switches explained networking basics switch switching switch vs hub switch vs repeater switch vs bridge switch vs router switch router router vs switch network switch net+ network+"
YouTube Link 2023-09-25T13:00Z 328K followers, 11.9K engagements
"What is a Network Bridge Bridge vs Hub -- #network #networking #networkdevices #ccna #comptia #it This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O network devices explained what is hub how hubs work hubs explained hub switch router hub vs switch networking basics network devices explained what is hub how hubs work hubs explained hub switch router hub vs switch networking basics"
YouTube Link 2023-09-18T13:00Z 328K followers, 38.6K engagements
"What is a Hub #networking #networkdevices #ccna #comptia #informationsecurity #networkingtips This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O"
YouTube Link 2023-09-11T13:00Z 328K followers, 10.8K engagements
"What is a Repeater #network #networking #networkdevices #ccna #comptia This clip was taken and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi All #shorts from this series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSm15IPO9rG2IcyidqVIb5O repeater repeaters ethernet repeater repeater vs switch repeater vs hub hub switch networking network devices networking fundamentals max length repeater repeaters ethernet repeater repeater vs switch repeater vs hub hub switch networking network devices networking"
YouTube Link 2023-09-06T13:00Z 328K followers, [----] engagements
"What are Subnets #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi subnets subnetting networking networks in networks what is a subnet what are subnets subnets subnetting networking networks in networks what is a subnet what are subnets"
YouTube Link 2023-08-10T13:45Z 328K followers, 43K engagements
"What is a Network #newtorking #cybersecurity #network This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi network networks networking what is a network networking fundamentals network networks networking what is a network networking fundamentals"
YouTube Link 2023-08-07T13:30Z 328K followers, 11.4K engagements
"What are IP Addresses #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi ip address ip addresses what are ip ip ipv4 address networking networking [---] network fundamentals networking fundamentals learn networking ip address ip addresses what are ip ip ipv4 address networking networking [---] network fundamentals networking fundamentals learn networking"
YouTube Link 2023-08-03T13:00Z 328K followers, 20.2K engagements
"What are Clients and Servers #shorts #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi clients servers hosts computer networking networking network fundamentals clients servers hosts computer networking networking network fundamentals"
YouTube Link 2023-07-31T14:00Z 328K followers, 16.9K engagements
"What are Hosts #shorts #networking #cybersecurity This #shorts was clipped and modified from a video in my Networking Fundamentals series: https://www.youtube.com/playlistlist=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi networking network hosts clients servers internet networking network hosts clients servers internet"
YouTube Link 2023-07-28T21:26Z 328K followers, 23.3K engagements
"TLS [---] Handshake - many CHANGES from prior versions The TLS [---] Handshake changes significantly from the TLS [---] (and prior) handshake. In this video we discuss [--] major changes to the TLS handshake with the latest version: - TLS [---] Handshake is shorter only one round trip (1RTT) - TLS [---] Handshake is mostly encrypted (everything except the Client Hello and the Server Hello) - TLS [---] Handshake encrypts the Client Certificate (as well as the Server Certificate) - TLS [---] Handshake generates many more session keys 👉 This is a sample lesson from my SSL & TLS deep dive course: Practical TLS."
YouTube Link 2023-06-15T20:44Z 328K followers, 30.7K engagements
"TLS [---] Cipher Suites - Here is what CHANGES A Cipher suite is a selection of one specific protocol for four security services: Key Exchange Authentication Symmetric Encryption and Hashing. In TLS [---] and prior a single Cipher Suite selected a protocol for all four of these. in TLS [---] a Cipher Suite changes to only specify a protocol for two of these: Symmetric Encryption and Hashing. Here is what a Cipher Suite looks like in TLS 1.3: TLS_AES_128_GCM_SHA256 Here is what they looked like in TLS [---] and prior: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Beyond that there are many other changes to"
YouTube Link 2023-06-06T13:15Z 328K followers, 22.2K engagements
"TLS [---] - What Changes What stays the same TLS [---] was released in [----] with RFC [----] -- a full [--] years after the version prior (TLS [---] RFC 5246). TLS [---] introduced many changes to TLS and how secure communication works. TLS [---] was in fact a major overhaul of how SSL works. Despite all the changes not everything in TLS [---] is different -- a lot stays the same. In this video we outline what remains the same and list [--] different significant changes in TLS [---]. This lesson serves as an introduction to the upcoming lessons in the series where each difference will be discussed in more detail."
YouTube Link 2023-05-31T15:26Z 328K followers, 30.6K engagements
"Ask Me Anything - 150k Subscribers - THANK YOU [------] people have chosen to click the subscribe button after watching a video on my channel. I never expected that to happen and I am very grateful for each of you. This video is a celebratory "AMA" (ask me anything) where I answered some questions from subscribers from my community page. 00:00 - Intro - THANK YOU FOR SUBSCRIBING 00:45 - What courses do I want to create next 02:03 - What Certifications do I hold 03:10 - Will AI have an impact on Network Engineers 04:30 - When is the new Networking course being created 05:32 - What is my best"
YouTube Link 2023-05-23T13:15Z 328K followers, [----] engagements
"how do you find the number of subnets from a mask"
YouTube Link 2023-05-16T18:30Z 328K followers, [----] engagements
"Can a portion of a packet be dropped"
YouTube Link 2023-05-16T18:23Z 328K followers, [----] engagements
"Why send an ACK with no data #tcp"
YouTube Link 2023-05-16T18:21Z 328K followers, [----] engagements
"control z on Cisco Routers"
YouTube Link 2023-05-10T02:43Z 328K followers, [----] engagements
"UDP doesn't suck It's the BEST L4 protocol for THESE types of applications. UDP is often defined by comparing it to TCP. Which leaves UDP with definitions like "no flow control" and "no reliability". These types of comparison tend to give UDP a bad reputation. UDP in fact is much cooler than people realize and in this video we're going to illustrate the three types of applications that are better suited for UDP than they are for TCP. TCP vs UDP - Explaining Facts and Debunking Myths - TCP Masterclass - Lesson [--] https://www.youtube.com/watchv=jE_FcgpQ7Co TCP - [--] Simple ideas to explain the"
YouTube Link 2023-03-19T14:35Z 328K followers, 45.5K engagements
"TCP - [--] simple ideas to explain the Transmission Control Protocol TCP has been the predominate layer [--] protocol that has served the Internet for the last [--] years. In this video we take a deep dive into TCP and illustrate how all of these concepts work together: Sequence Numbers Acknowledgement Numbers Window Size Delayed Acknowledgements Flow Control TCP Connection Closures and FIN + Reset Segments. I've broken up TCP into [--] simple distinct ideas and if you can understand each of those [--] ideas then you can say you can understand TCP better than most. Hope you enjoy this TCP deep dive"
YouTube Link 2023-02-06T13:59Z 328K followers, 194.5K engagements
"TCP vs UDP - Explaining Facts and Debunking Myths - TCP Masterclass TCP and UDP are the predominate Layer [--] protocols that have been used since the dawn of the Internet. In this video we discuss TCP and UDP without getting bogged down with jargon or incomplete definitions. We compare TCP and UDP across [--] dimensions: - Connection Oriented vs Not Connection Oriented - Reliable vs Unreliable (although I don't like the term "unreliable" here) - Flow Control vs No Flow Control - More Overhead vs Less Overhead Then we discuss and dispel four Myths about TCP and UDP: - UDP is Faster - TCP is More"
YouTube Link 2023-01-30T13:59Z 328K followers, 142.3K engagements
"Can I rebuild an OSPF topology using ONLY the LSDB OSPF Routers share LSA to synchronize their LSDB then they use their LSDB to rebuild a topology map of every router and network. but is the LSDB really enough to rebuild the entire topology In this video we put that to the test. Jeremy of Jeremy's IT Lab has created an OSPF topology that I have never seen. And I'm going to try to draw out the entire topology just like a Router would using ONLY the contents of the Link State Database and the details of each LSA. This video is an addendum to my Practical OSPF series which is a modern"
YouTube Link 2022-11-16T18:29Z 328K followers, 14.9K engagements
"Keychains / Key Rotation / hmac-sha keys - OSPF Authentication - Practical OSPF How can two routers change the authentication keys they are using without risking a neighbor adjacency going down That is handled by Key Rotation. How can we configure more secure hashing algorithms for OSPF authentication like hmac-sha That is handled by Key Chains. Both Keychains and Key Rotation are covered in this lesson. This is lesson [--] of the Practical OSPF series. The full series is available here: https://www.youtube.com/playlistlist=PLIFyRwBY_4bSkwy0-im5ERL-_CeBxEdx3 00:00 - Intro 01:33 - Key Rotation"
YouTube Link 2022-10-10T13:15Z 328K followers, [----] engagements
"TLS Handshake - EVERYTHING that happens when you visit an HTTPS website TLS (formerly SSL) is the protocol that makes it safe to do anything on the Internet. It's the protocol that enables that little padlock which gives you the green light to put in your password or bank account number. In order to get the padlock however something has to occur between you and the website you are visiting. that something is known as the TLS handshake. The TLS handshake validates the two endpoints in the conversation and exchanges the cryptographic material used to create Session keys which will then protect"
YouTube Link 2022-09-06T12:59Z 328K followers, 201.7K engagements
"OSPF Area Types - Stub NSSA Totally Stub Totally NSSA - Practical OSPF By default every OSPF area starts as a "Normal" area. Inside a Normal area every type of LSA / Route is allowed. But OSPF also has the ability to designate areas as Stub or Not-So-Stubby-Areas (NSSA) which allows an OSPF engineer to optimize the types of Routes and LSAs which exist inside an Area. In this video we explore the five OSPF area types (Stub Totally Stubby NSSA Totally NSSA). We also introduce the concept of a Type [--] LSA and how they are used within Not So Stubby Areas and translated by ABRs which border an"
YouTube Link 2022-08-09T13:00Z 328K followers, 47.8K engagements
"OSPF Network Types - FINALLY an explanation that makes sense - Practical OSPF Every OSPF link is associated with an OSPF Network Type. There are [--] Network Types that exist: Point to Point Broadcast Non-Broadcast Multi-Access (NBMA) Point to Multipoint and Point to Multipoint Non Broadcast (P2MP-NB). Each Network Type acts slightly different in an effort to optimize OSPF's behavior. In this video we look at the differences between all five OSPF network types. This is lesson [--] of the Practical OSPF series. The full series is available here:"
YouTube Link 2022-08-01T13:00Z 328K followers, 51.1K engagements
"OSPF LSA - the BEST explanation of the Types of OSPF LSAs OSPF Routers share routing information using Link State Advertisements or LSAs. There are [--] main types of OSPF LSAs and all of them are used to populate a Router's the Link State Database (LSDB). In this video we illustrate and explain the [--] main types of OSPF LSAs: Type [--] LSAs - Router LSA Type [--] LSAs - Network LSA Type [--] LSAs - Summary LSA Type [--] LSAs - ASBR Summary LSA Type [--] LSAs - External LSAs This is lesson [--] of the Practical OSPF series. The full series is available here:"
YouTube Link 2022-07-25T13:00Z 328K followers, 67.5K engagements
"Designated Router // Backup Designated Router // DR BDR Election // Practical OSPF // Lesson [--] The Designated Router (DR) and Backup Designated Router (BDR) exist to reduce redundant LSA flooding on an OSPF multi access link. Routers on a multi access link use the 224.0.0.5 and 224.0.0.6 Multicast IP Addresses to efficiently share LSAs with each other. In this video we explore the process by which a DR and BDR are elected. We discuss the WAIT interval in OSPF we discuss Preemption and Priority numbers. We wrap up the video by showing you the sequence of events that occurs when a routing"
YouTube Link 2022-05-09T12:59Z 328K followers, 43.6K engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing