These videos played a small part in helping me study and pass my CompTIA A+ and Network+ exam. Even though I've now been qualified in these fields, I like to still come back to refresh my memory with your videos. Thank you!
Really great to see Brilliant sponsoring PowerCert. Imo it's a little bit of a marker of a channel's success to be sponsored by certain companies, and I consider Brilliant to be one of them. Go PowerCert!
You are my saviour, currently I am implementing the IPSec rule from the controller to windows node. This video gave a lot of information. Thanks a lot buddy
It feels cool when you have literally watched all of the videos of this channel and after couple of weeks,another brand new brilliant video pops up on the front page.wow,thank you my friend
Working in roadway transportation, these videos' visuals and transcripts are so well done they help me to better communicate and understand networking. Know these videos are helping so many people. Thank you!
Great video However I have noticed a reduction in the videos that you produced. I am grateful for the videos that you make I just wish they were more of them for me to learn more.
Brilliantly explained in a simplified way. I’ve watched this being explained by other instructors and how you explained it actually makes sense. Thank you!
Hey Man I just wanted to take a moment to thank you so much for these helpful animations. I’m a visual person and animation is the only way I learn. And your videos make it so easy for me to understand concepts I work with on a daily basis but for some reason havnt been able to really understand till I watched your videos. Thank you so much man. God bless you.
Only a month before you uploaded a video but seems like an year before. Such is the quality and content of your video that is worth the wait. One kind request could you please start doing videos on security aspect more as others who do mostly concentrate on the entertainment purpose rather than the education aspect. Thank you very much ❤🙏👍👌👏
Can you make a video on Mac address randomisation This term I came across a device like USB type a/c to lan adapter, the moment I connect it to different CPU I can different Mac address. (HP type c to lan I faced this) I used one more from tp-link where I did not face issue of Mac address variation. Please see if you can make a video on this
Fantastic educational ❤❤❤ Please make an episode about the difference between GPT and MBR...I am having difficulty when creating software for the computer
Good overview, clearly explained like nowhere else. But moderator might have also explained two major paradigms: S2S vs C2S. What is C2S VPN? A client-to-site VPN is a type of VPN that connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate or cloud network. It allows the device to access the network resources and services securely, as if it were physically connected to the network.Mar 4, 2023 What is S2S VPN? What is Site-to-Site VPN | Fortinet Site-to-Site VPN Defined (Gateway router to Gateway router, typically separated by public internet and great geogrraphical distance): A site-to-site virtual private network (VPN) refers to a connection set up between multiple networks. This could be a corporate network where multiple offices work in conjunction with each other or a branch office network with a central office and multiple branch locations. S2S IPSec VPNs operate in Layer 3 of the Seven Layer OSI Model. Where do C2S VPNs operate? What different kinds of C2S VPNs exist?
There's a class of encryption algorithms which are used for creating a secure connection over an insecure channel. The most basic of which is the Diffie-Hellman Key Exchange. There's a computerphile video that goes over the basics without going into the mathematics. Or there's a Wikipedia article on the subject. ua-cam.com/video/NmM9HA2MQGI/v-deo.html en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
There's a public and private key. Public key is only useful if you know the private key, so people intercepting the public key is no big deal. If you want to send a message to your friend, you get your friend's public key and use that to encrypt the message. That message is only decryptable using your friend's private key, so your friend is the only one who's able to make sense of the encrypted message.
Dear Sirs, I am senior lecturer at a Hungarian University. I have to produce e-learning materials in Hungaryian language. Can I ask, which animation software do you use? (I do not would like to make a competitor UA-cam channel!) Thanks, Dr. Adam Horvath
SSL and TLS are both implemented at the application layer. So web browsers and web servers for TLS, and SSH clients and servers for SSH. IPSec is used to secure the connection between two networks, not between two machines. The difference being that the connection is not encrypted en-route through the initial network, or once decrypted at the other end. Ideally you would want to use another form of security atop IPSec.
Can You Please Make a video Explaining How Routers Split Bandwidth Between Devices, I Heard If Say U Got 500GB P/Sec speed it is Shared Between All The Devices You Have Inside the House So the more devices You have online the less Bandwidth they'll have, i dont get it please make an explanatory vid 🎉
Visit brilliant.org/PowerCert/ for a free 30 day trial. The first 200 people will get 20% off their annual premium subscription.
These videos played a small part in helping me study and pass my CompTIA A+ and Network+ exam. Even though I've now been qualified in these fields, I like to still come back to refresh my memory with your videos. Thank you!
Really great to see Brilliant sponsoring PowerCert. Imo it's a little bit of a marker of a channel's success to be sponsored by certain companies, and I consider Brilliant to be one of them. Go PowerCert!
You are my saviour, currently I am implementing the IPSec rule from the controller to windows node. This video gave a lot of information. Thanks a lot buddy
You're welcome!
It feels cool when you have literally watched all of the videos of this channel and after couple of weeks,another brand new brilliant video pops up on the front page.wow,thank you my friend
This channel is a treasure for learning tech
Thank you professor powercert! You helped me pass the Security+.
Working in roadway transportation, these videos' visuals and transcripts are so well done they help me to better communicate and understand networking. Know these videos are helping so many people. Thank you!
next time ospf and bgp maybe? i still learning about it
That would be awesome, to understand the OSPF LSA's and the BGP Attributes.
Putting my vote in for BGP.
yes
How about saying ‘thank you’?
I hope such! Ospf would be amazing for upcoming exams
Great video
However I have noticed a reduction in the videos that you produced.
I am grateful for the videos that you make I just wish they were more of them for me to learn more.
I love these. You are amazing at explaining computers you got me through many tests. :)
I have been following your channel for a long time...I hope you will create more and more lessons and not make us wait too long.🎉❤❤
This guy is a master at clearly demosntrating how something works.
It makes me happy you got a sponser! Your videos deserve it.
Thank you!
Taking my Net+ tommorow, perfect time for you to post this, thank you!
Goodluck!!
@@KC-kp9nq passed🙏 shoutout mr.powercert
@@supergunk congrats bro!!
Your videos are the clearest that I have encountered so far. Thanks!
Щиро дякую за інформацію і її подачу! Процвітання каналу!
Brilliantly explained in a simplified way. I’ve watched this being explained by other instructors and how you explained it actually makes sense. Thank you!
This is a fascinating and complex topic. Thanks for this snippet to help provide additional visuals (visuals always help, I think).
This channel is a treasure for learning tech’ thank you 🙏
This channels is a treasure
looked at all the other videos. this guy still explains the best!
Amazing video, great explanation, easy to understand, please continue launching new videos , thank for your time ! We appreciate it !
Hey Man I just wanted to take a moment to thank you so much for these helpful animations. I’m a visual person and animation is the only way I learn. And your videos make it so easy for me to understand concepts I work with on a daily basis but for some reason havnt been able to really understand till I watched your videos. Thank you so much man. God bless you.
I was waiting for this video as you can´t imagine!!!
Sir please make video on
OSI model your animation is best and understanding
Thank you so much for the video. All of your videos are so informative and very helpful!
Followed, liked and turned the bell on. God bless you adn your family Mr, you are a good man.
Only a month before you uploaded a video but seems like an year before.
Such is the quality and content of your video that is worth the wait.
One kind request could you please start doing videos on security aspect more as others who do mostly concentrate on the entertainment purpose rather than the education aspect. Thank you very much ❤🙏👍👌👏
You are amazing with your explanation and grafics
Thanks from Kurdistan
Can you make a video on Mac address randomisation
This term I came across a device like USB type a/c to lan adapter, the moment I connect it to different CPU I can different Mac address. (HP type c to lan I faced this)
I used one more from tp-link where I did not face issue of Mac address variation.
Please see if you can make a video on this
Fantastic educational ❤❤❤
Please make an episode about the difference between GPT and MBR...I am having difficulty when creating software for the computer
Very good job, excellent presentation and very easy to comprehend.
Thank you, thank you, thank you!!! Keep it coming, please!
Amazing Channel!!!! would love to see more contents about cybersecurity, AI and blockchain :)
Noted!
It's amazing how the security tech keep evolving (not sure if I can say thanks to bad people sometimes).
Thanks!
Good overview, clearly explained like nowhere else. But moderator might have also explained two major paradigms: S2S vs C2S. What is C2S VPN?
A client-to-site VPN is a type of VPN that connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate or cloud network. It allows the device to access the network resources and services securely, as if it were physically connected to the network.Mar 4, 2023 What is S2S VPN? What is Site-to-Site VPN | Fortinet
Site-to-Site VPN Defined (Gateway router to Gateway router, typically separated by public internet and great geogrraphical distance):
A site-to-site virtual private network (VPN) refers to a connection set up between multiple networks. This could be a corporate network where multiple offices work in conjunction with each other or a branch office network with a central office and multiple branch locations.
S2S IPSec VPNs operate in Layer 3 of the Seven Layer OSI Model. Where do C2S VPNs operate? What different kinds of C2S VPNs exist?
these are incredible! basic concepts and im getting it now! thank you so much!
Thank you for your efforts and creativity, it would be much appreciated if the CompTIA A+ 101+102 gets updated. Thanks again!
You’re amazing man, keep up the great work
Please explain Authentication Header (AH) protocol guess missing here
I really like how you explain it!
Amazing breakdown! Thank you
Thank you so much for sharing the video
But I also request you please make more videos I hope next video coming soon 🔜 ⏩😊🎉❤
Thank you
yes, this month
@@PowerCertAnimatedVideos thank you for reply
This is great. But what I don't understand is how the keys are exchanged and the authentication occurs without someone stealing those? 1:35 Thanks
There's a class of encryption algorithms which are used for creating a secure connection over an insecure channel. The most basic of which is the Diffie-Hellman Key Exchange.
There's a computerphile video that goes over the basics without going into the mathematics. Or there's a Wikipedia article on the subject.
ua-cam.com/video/NmM9HA2MQGI/v-deo.html
en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
There's a public and private key. Public key is only useful if you know the private key, so people intercepting the public key is no big deal. If you want to send a message to your friend, you get your friend's public key and use that to encrypt the message. That message is only decryptable using your friend's private key, so your friend is the only one who's able to make sense of the encrypted message.
@@kenmenpianoyou can do a MITM attack by providing your keys to each end host and they'll think they are talking to the desired host
Anyone in 2024! The 06:02 Video lectures is better than 16 years education in university.
Always a fantastic educational video. Does HTTPS provide encryption as well?
Yes, but IPsec does encrypts at a deeper level.
please add subtitle to understand well ,all of the Old vedios have this feature that help non native learners to understand.
Well explained!Very informative!
Glad it was helpful!
Dear Sirs, I am senior lecturer at a Hungarian University. I have to produce e-learning materials in Hungaryian language. Can I ask, which animation software do you use? (I do not would like to make a competitor UA-cam channel!) Thanks, Dr. Adam Horvath
Great vid. You have any future plans to explain OSI model/layer's?
Eventually
Please make a complete video on OSI layer functioning
Please can you do a video of STP, BPDU and OSPF especially STP( spanning-tree protocol )
I need more power cert in my life
U should do a video what Tunneling is in networking
We need full ccna course latest ❤❤❤❤
Please do more content like this
Please make a video on How to select Graphics card for a PC or Laptop ?
Wouldn’t the ISP significantly throttle the bandwidth on IPsec protocol if not outright blocking those ports ?
Would be nice to see an actual implementation of this solution.
Merci pour vos explications !
well explained 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼
Can you please tell me on which software you use for creating the videos......??🙌🙌🙌🙌🙏
PowerPoint.
@@KevanTess ty bro...❤️🙌
Thanks for the lesson!!
Expecting dynamic routing protocols like RIP, EIGRP, OSPF and one dedicated video for BGP
Wow. I learnt something that I coulnd't clearly learn. Thanks.
I wonder, how you do this animation?
❤ Thank you!! Preparing N+
Do you have PowerPoint versions of your videos? They would be perfect for studying!!!
your videos so helpful !!! thanks !!!
wonderfully explained! Thank U
I'm stuck in snmp. Please can you make a video on it 🙏
Porfavor para de subir videos mi profe calvo no me deja en paz
0:45 So then SSL and TLS don't exist?
They do, but IPsec uses deeper security.
@@PowerCertAnimatedVideos
But the way you put it across in your video raises that doubt.
Maybe you could’ve clarified better?
And I believe it’s TLS. Not TSL
SSL and TLS are both implemented at the application layer. So web browsers and web servers for TLS, and SSH clients and servers for SSH.
IPSec is used to secure the connection between two networks, not between two machines. The difference being that the connection is not encrypted en-route through the initial network, or once decrypted at the other end. Ideally you would want to use another form of security atop IPSec.
what is the difference between IPsec and VPN TLS
What do you use to create the animations?
powerpoint
CAN YOU PLEASE EXPLAIN SD-WAN
You don't send credit card information in plain text, sites would typically be using TLS encryption. This could've been better worded
Thank you for the video
Thank you!
VPNs should also prevent screen recording, screen shots, and blocking the microphone. I've yet to see any VPNs doing this.
?? Those are very different things that have nothing to do with the concept of using VPNs.
@@JJFlores197 They can use those to spy on you
That literally defeats the purpose of a VPN.
thank you
Can You Please Make a video Explaining How Routers Split Bandwidth Between Devices, I Heard If Say U Got 500GB P/Sec speed it is Shared Between All The Devices You Have Inside the House So the more devices You have online the less Bandwidth they'll have, i dont get it please make an explanatory vid 🎉
that's the long-waited video
Thanks
upload a video on pfsense firewall
Great WOrk Team
0:04 I hope that’s 124 Fahrenheit and not 124 Celsius otherwise you have a big problem.
I'm watching this from a self hosted IPsec server lets goo
Even if things where send in clear text from site 2 site, how would you sniff it? infiltrate an ISP sure I guess but?
Maybe you can explain MikroTik, it's interested
Hello man.
Pretty much everything these days is TLS encrypted.
😂
OMG
This sounds also like the methods hackers use when using Ransomeware attacks. Is it the same methods they use, TechVideos?
4:29
Thank you