whew , first domain done . the past 18 videos essentially (and more efficiently) covered everything i learned in 2-3 years of my cybersecurity community college course lol
yeah i did a "boot camp" and this is teaching me more than the boot camp did. Don't get me wrong, still a good course but prof messer goes into depth more
UA-cam, owned by Google (Alphabet), is its own Certificate Authority. They sign their own certificates, which is interesting. They are basically saying you can trust this website because we say so and there is no need to ask anyone else.
I get that you can't forge an OCSP status but what stops an operator from just preventing their applciation from updating its OCSP status once ever again once they receive the signed valid OCSP status? Do they expire?
A self-signed certificate authority (CA) is an entity that signs its own certificates without involving a trusted third party. This means it can generate and validate its own certificates but is typically not trusted by default in browsers or systems because it lacks external validation. A private CA, on the other hand, is a CA that is operated within an organization for internal use. It can issue certificates for internal applications, services, or devices. While a private CA may also issue self-signed certificates, it can have its root certificate distributed and trusted across an organization, allowing internal systems to trust certificates issued by it.
whew , first domain done . the past 18 videos essentially (and more efficiently) covered everything i learned in 2-3 years of my cybersecurity community college course lol
yeah i did a "boot camp" and this is teaching me more than the boot camp did. Don't get me wrong, still a good course but prof messer goes into depth more
I feel proud of myself because I completed the first domain of SY0-701. I'll rewatch the first domain to strengthen my understanding of the basics.
No rush, take your time. Go through the content as slow as you need and write down solid notes after you've grasped what is being taught.
UA-cam, owned by Google (Alphabet), is its own Certificate Authority. They sign their own certificates, which is interesting. They are basically saying you can trust this website because we say so and there is no need to ask anyone else.
Don't see anything wrong with it, it leverages reputation as a form of trust.
Monopoly.
Learning alot on each video. I have to take my time and replay some of these cause how condense the terms are and what they do.
Thank you Professor Messer
Thanks Professor
Thank you Prof Messer. You're such a great teacher.
Thank you so much for these videos, Professor Messer!
Thank you very much Professor Messer
awesome
I get that you can't forge an OCSP status but what stops an operator from just preventing their applciation from updating its OCSP status once ever again once they receive the signed valid OCSP status? Do they expire?
I see, they have a "next update" field. Sorry to bother you :)
great amazing video
Is there a difference between private CA and self-signed CA? As both are used internally / within the organization.
A self-signed certificate authority (CA) is an entity that signs its own certificates without involving a trusted third party. This means it can generate and validate its own certificates but is typically not trusted by default in browsers or systems because it lacks external validation.
A private CA, on the other hand, is a CA that is operated within an organization for internal use. It can issue certificates for internal applications, services, or devices. While a private CA may also issue self-signed certificates, it can have its root certificate distributed and trusted across an organization, allowing internal systems to trust certificates issued by it.
Thank you Professor Messer