Channel Avatar

Practical Networking @UCKmU-GKiukM8LYjkJFb8oBQ@youtube.com

272K subscribers - no pronouns :c

If you’ve been in the Network Engineering career field for a


04:44
Elliptic Curve Cryptography in less than 5 minutes
13:00
Diffie-Hellman Key Exchange and Forward Secrecy
04:18
RSA Key Exchange and Forward Secrecy - Cryptography Essentials
04:10
You can't do security without THIS
02:12
DSA Signatures
03:41
RSA Signatures
05:15
Signatures - What and why are they?
05:28
RSA & Asymmetric Encryption - Cryptography Essentials
05:07
A better definition of Asymmetric Cryptography
08:50
PRFs explained: Transforming Secrets into Infinite Keys - Pseudo Random Functions
06:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes
04:04
Symmetric Encryption - AES ChaCha20 3DES RC4 DES - Cryptography Essentials
01:30
Symmetric Cryptography is a category
05:10
Understanding Secret Keys: A Simple Explanation
06:03
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials
01:35
Cryptography Essentials - Series Intro
13:42
OSI Model Layer 5, 6, and 7 -- Session, Presentation, & Application Layers -- what they actually do
07:19
HTTP vs HTML: Unveiling Network Protocols using Telnet
17:39
TLS 1.3 Handshake - many CHANGES from prior versions!
17:02
TLS 1.3 Cipher Suites - Here is what CHANGES!
08:02
TLS 1.3 - What Changes? What stays the same?
08:38
Ask Me Anything - 150k Subscribers - THANK YOU
11:52
UDP doesn't suck! It's the BEST L4 protocol for THESE types of applications...
44:05
TCP - 12 simple ideas to explain the Transmission Control Protocol
20:24
TCP vs UDP - Explaining Facts and Debunking Myths - TCP Masterclass
29:53
Can I rebuild an OSPF topology using ONLY the LSDB?
31:52
Keychains / Key Rotation / hmac-sha keys - OSPF Authentication - Practical OSPF
27:59
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
20:10
OSPF Area Types - Stub, NSSA, Totally Stub, Totally NSSA - Practical OSPF
21:37
OSPF Network Types - FINALLY, an explanation that makes sense - Practical OSPF
14:20
OSPF LSA - the BEST explanation of the Types of OSPF LSAs
16:48
Designated Router // Backup Designated Router // DR BDR Election // Practical OSPF // Lesson 6
10:29
HSTS - HTTP Strict Transport Security - Protect against SSL Stripping attack - Practical TLS
04:33
What are Cipher Suites? - Practical TLS
30:52
OSPF Configuration & Show Commands - Practical OSPF
14:18
OSPF Neighbor Adjacency States: DOWN ATTEMPT INIT 2-WAY EXSTART EXCHANGE LOADING FULL
18:33
OSPF Hello Packets :: Area Types (Stub/NSSA) :: BDR/DR :: Practical OSPF
08:24
OSPF Areas and OSPF Types of Routers - Practical OSPF - Lesson 2
12:35
OSPF Framework & OSPF Packets: LSDB, LSA, Hello, DBD, LSR, LSU, LSAck
01:51
Practical OSPF - Series Introduction
12:11
EGP / IGP :: Distance Vector / Link State :: Dynamic Routing Protocols :: OSPF EIGRP BGP RIP IS-IS
11:37
Looking inside an SSL Certificate with OpenSSL
06:15
OpenSSL - Encrypting and Decrypting Private Key Files
05:27
Twice NAT - Network Address Translation
06:29
Policy NAT - Network Address Translation
11:51
Dynamic NAT - Network Address Translation
15:25
Dynamic PAT - Network Address Translation
09:05
Static PAT - Network Address Translation
07:24
Static NAT - Network Address Translation
07:07
NAT vs PAT, Static vs Dynamic -- demystified! -- Network Address Translation
07:41
How does NAT conserve IP Address Space? (and why!) - Network Address Translation
06:15
TLS / SSL - The complete sequence - Practical TLS
05:47
Digital Signature Algorithm (DSA) - Cryptography - Practical TLS
06:56
Diffie-Hellman Key Exchange - the MAGIC that makes it possible - Cryptography - Practical TLS
15:48
RSA Algorithm - How does it work? - I'll PROVE it with an Example! -- Cryptography - Practical TLS
05:49
Public Key Infrastructure - What is a PKI? - Cryptography - Practical TLS
07:58
How SSL & TLS use Cryptographic tools to secure your data - Practical TLS
12:33
Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS
13:58
Encryption - Symmetric Encryption vs Asymmetric Encryption - Cryptography - Practical TLS
07:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography