As ALWAYS...your videos help me BIGTIME! Whenever I am in need of a CLEAR explanation on a technology that some other 'Off the Charts GEEK in the Weeds' tries to teach, I check and see if Sunny has a class to clear it up for me! Thanks Again Man!!
@sunnyclassroom245 жыл бұрын
Thank you, John, for saying nice things about my videos. You are welcome. I wish I would complete my whole series in this area (about 200 videos) soon.
@michaeljimenez239 Жыл бұрын
Just want to say, i used some of your videos to pass my network plus and currently doing th same with security plus. I always find your explanations easier to understand than most other instructors. Thank you!
@MohenjinAdventure4 жыл бұрын
I could not understand about CRL/OCSP/OSCP Stapling, but now I finally did. Thank you! You have been a great help!
@lesleycouch9542 Жыл бұрын
I knew I could count on you to explain this concept clearly and concisely. I get it now! Thank you Sunny!
@nattiyar6144 жыл бұрын
This is by far the best explanation ever! Thank you so much!!
@scottbiggs88944 жыл бұрын
Step 4, that all this happens "during the SSL/TLS handshake" was the puzzle piece I was missing. Thank you. And the music at end made me laugh. :)
@sunnyclassroom244 жыл бұрын
Thank you for watching!
@mimi71324 жыл бұрын
Exactly
@miriyalajeevankumar54494 жыл бұрын
The best content on this topic is your channel !!
@chengluo59564 жыл бұрын
Simple and clear, that's all I need. Thank you Sunny!
@TheSukramb5 жыл бұрын
Truly awesome. Helps a lot because of your visualizations in addition to your explanation.
@sunnyclassroom245 жыл бұрын
Thank you for your time!
@jaydawg913 жыл бұрын
As always your videos are clear and provide accurate information. Thank you, Sunny.
@techlearner48069 ай бұрын
Simple and easy language/demo used in video. All thanks to you.
@nkanakaraj2 жыл бұрын
Awesome! This is the exact info I was looking for to troubleshoot an issue related to OSCP. Sunny! you very well explained CRL, OSCP, and OSCP-Stapling operations in a quick video. Thank you very much!
@TheAhamedabdul4 жыл бұрын
Thanks a lot Sunny! this is very clear and useful.
@poncho88878 ай бұрын
Thank you for your clear explanations for our understanding.
@Drawmeafatcat3 жыл бұрын
crazy how complicated other people make this when you just explained it in 6 mins.
@34521ful6 жыл бұрын
Hi Sunny, great video once again! I think one thing I'd add for future viewers is that another thing browsers like Firefox and Chrome do are just push a software update if a certificate must be revoked as soon as possible
@sunnyclassroom246 жыл бұрын
thanks a lot for your information. I appreciate it very much.
@jilanishaik87914 жыл бұрын
It's very nice explanation. Thanks Sunny
@beepboop82505 жыл бұрын
Excellent videos, very concise and easy to understand. Thank you
@sunnyclassroom245 жыл бұрын
you are welcome!
@ayatarek66123 жыл бұрын
Thank you so much this was very clear and helpful.
@AmeenAltajer3 жыл бұрын
Clear explanation, thanks man!
@marcosalameh86773 жыл бұрын
As usual soooooooo amazing!!!!!!!!!!!!!!!!!!!!!
@asoteico95284 жыл бұрын
Greatly done Sunny...!!! 🥇🎖🏅
@sonurocks3414 жыл бұрын
Great Videos. Very crisp explanation.
@sunnyclassroom244 жыл бұрын
Glad you liked it!
@okbazoueghi67143 жыл бұрын
Great explanation!
@tim6925 Жыл бұрын
thank you, thats a very clear explanation.
@johnnkoh26014 жыл бұрын
you are really good at explaining things. Thank you very much
@jasonhoi854 жыл бұрын
thanks this is much clean then reading the text explaination
@sunnyclassroom244 жыл бұрын
Thank you for watching!
@grahammattingley97846 жыл бұрын
Very helpful information - keep up the good videos and the good work
@sunnyclassroom246 жыл бұрын
thanks a lot!
@aziz4219736 жыл бұрын
Very useful information, thank you so much.
@sunnyclassroom246 жыл бұрын
You are welcome, Aziz.
@jeremygunter98778 ай бұрын
Well done, thank you!
@ravichanderkt326 Жыл бұрын
You're Gifted By God.
@HughJass-3133 жыл бұрын
Bravo!! ❤❤
@AyushmanAdhikary3 жыл бұрын
Great video. Thanks for the explanation.
@ahmeddarwish38593 жыл бұрын
very good teacher.Thanks
@livestronger19813 жыл бұрын
Great explanation
@andreaszetea-ster9005 жыл бұрын
great work. Thank you
@sunnyclassroom245 жыл бұрын
Thanks
@devendramhatre50074 жыл бұрын
Nicely Explained.... thank you sir
@sunnyclassroom244 жыл бұрын
You are most welcome!
@zowajoy76164 жыл бұрын
You are awesome 🙏
@sunnyclassroom244 жыл бұрын
Thanks!
@OmarJIBAR2 жыл бұрын
Beautiful 👌
@fa3072 жыл бұрын
great video, would be great if you could update this and make a video about certificate transparency (CT Logs)! :)
@mimi71324 жыл бұрын
great explanation, thanks
@dieglhix4 жыл бұрын
All clear, thanks Mr. Subscribing now.
@sunnyclassroom244 жыл бұрын
Thanks for the sub!
@rajeshgeorge60934 жыл бұрын
thanks very much
@sunnyclassroom244 жыл бұрын
You are so welcome!
@kavi38414 жыл бұрын
Thank you sir
@sunnyclassroom244 жыл бұрын
All the best
@mofogie4 жыл бұрын
well what if a domain spoofer simply forges a certificate?
@ameenasif2 жыл бұрын
So if an organization has issued certificates in thousands , and device1 comes with request , does webserver has stapled request for all thousand devices at that time , if its cached only on calls ? so when a signed response is received all it needs to do is verify certificate validity end date etc, no need to go to check revoked status as its trusted with cryptography i.e the signed response . is this right
@sriksrik81843 жыл бұрын
Hi Sunny, if the client from a ABC company domain accessing a website, how can it check the website certificates status from the ABC domains CA CRL list,,, does that mean that ABC domain CA will have constant updates, if so how,,,
@iyam15132 жыл бұрын
Thanks for your video, "OCSP stapling" is quite smart solution, but for how long does web server cache OCSP Response from CA? And for how long does the client (browser) consider that the response is still valid (I mean as for standards)? I think this is the point of "lag" between revocation and outdated signed OCSP Response from web server. So it is important to note.
@deekusnotes3318 Жыл бұрын
Does it mean OCSP URLs no need to be added to firewall between client and server?
@jibnathgautamhy12804 жыл бұрын
Thank you verymuch
@arber106 жыл бұрын
Sunny, one more question: Which book(s) would you recommend for a deep dive in this topic? (I mean cryptography not just revocation.)
@sunnyclassroom246 жыл бұрын
It depends how deep do you want to go? If you are just for CompTIA security + , you can use Comptia security+ guide to network security fundamentals 6th edition or 5th edition (cheaper).
@arber106 жыл бұрын
Thank you. I will check this.
@corolla12094 жыл бұрын
Hi Sunny, will you talk about SCVP in the future videos?
@greenboy74846 жыл бұрын
hi sunny...can you explain how policy maping works in CA and sub-CA in another video?
@sunnyclassroom246 жыл бұрын
I put it on my to do list. Many thanks!
@ishajain70206 жыл бұрын
When certificates are stolen from CA, why those certificates need to be revoked. I mean we are already certificates, but harm stolen certificates will make.
@sunnyclassroom246 жыл бұрын
Browsers make sure that all certificates are valid. It is like someone stole your credit card, and you want to report to your credit card company to revoke it. Otherwise, the thief will use your credit card. The same thing.
@RajivKumar-ee7xv3 жыл бұрын
@@sunnyclassroom24Here I have a question, Private key of stolen certificate is always with the owner for whom CA issued certificate. So other details are always public. What was stolen from CA for that particular certificate?
@chadsexinton2 жыл бұрын
Yea but browser and other clients no longer check the crl or ocsp servers so revocation is useless .
@richardturk71624 жыл бұрын
Great explanation but I still have no idea what you are talking about.