These videos played a small part in helping me study and pass my CompTIA A+ and Network+ exam. Even though I've now been qualified in these fields, I like to still come back to refresh my memory with your videos. Thank you!
Really great to see Brilliant sponsoring PowerCert. Imo it's a little bit of a marker of a channel's success to be sponsored by certain companies, and I consider Brilliant to be one of them. Go PowerCert!
Working in roadway transportation, these videos' visuals and transcripts are so well done they help me to better communicate and understand networking. Know these videos are helping so many people. Thank you!
It feels cool when you have literally watched all of the videos of this channel and after couple of weeks,another brand new brilliant video pops up on the front page.wow,thank you my friend
You are my saviour, currently I am implementing the IPSec rule from the controller to windows node. This video gave a lot of information. Thanks a lot buddy
Great video However I have noticed a reduction in the videos that you produced. I am grateful for the videos that you make I just wish they were more of them for me to learn more.
Brilliantly explained in a simplified way. I’ve watched this being explained by other instructors and how you explained it actually makes sense. Thank you!
Good overview, clearly explained like nowhere else. But moderator might have also explained two major paradigms: S2S vs C2S. What is C2S VPN? A client-to-site VPN is a type of VPN that connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate or cloud network. It allows the device to access the network resources and services securely, as if it were physically connected to the network.Mar 4, 2023 What is S2S VPN? What is Site-to-Site VPN | Fortinet Site-to-Site VPN Defined (Gateway router to Gateway router, typically separated by public internet and great geogrraphical distance): A site-to-site virtual private network (VPN) refers to a connection set up between multiple networks. This could be a corporate network where multiple offices work in conjunction with each other or a branch office network with a central office and multiple branch locations. S2S IPSec VPNs operate in Layer 3 of the Seven Layer OSI Model. Where do C2S VPNs operate? What different kinds of C2S VPNs exist?
Hey Man I just wanted to take a moment to thank you so much for these helpful animations. I’m a visual person and animation is the only way I learn. And your videos make it so easy for me to understand concepts I work with on a daily basis but for some reason havnt been able to really understand till I watched your videos. Thank you so much man. God bless you.
There's a class of encryption algorithms which are used for creating a secure connection over an insecure channel. The most basic of which is the Diffie-Hellman Key Exchange. There's a computerphile video that goes over the basics without going into the mathematics. Or there's a Wikipedia article on the subject. ua-cam.com/video/NmM9HA2MQGI/v-deo.html en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
There's a public and private key. Public key is only useful if you know the private key, so people intercepting the public key is no big deal. If you want to send a message to your friend, you get your friend's public key and use that to encrypt the message. That message is only decryptable using your friend's private key, so your friend is the only one who's able to make sense of the encrypted message.
Dear Sirs, I am senior lecturer at a Hungarian University. I have to produce e-learning materials in Hungaryian language. Can I ask, which animation software do you use? (I do not would like to make a competitor UA-cam channel!) Thanks, Dr. Adam Horvath
Can you make a video on Mac address randomisation This term I came across a device like USB type a/c to lan adapter, the moment I connect it to different CPU I can different Mac address. (HP type c to lan I faced this) I used one more from tp-link where I did not face issue of Mac address variation. Please see if you can make a video on this
Fantastic educational ❤❤❤ Please make an episode about the difference between GPT and MBR...I am having difficulty when creating software for the computer
SSL and TLS are both implemented at the application layer. So web browsers and web servers for TLS, and SSH clients and servers for SSH. IPSec is used to secure the connection between two networks, not between two machines. The difference being that the connection is not encrypted en-route through the initial network, or once decrypted at the other end. Ideally you would want to use another form of security atop IPSec.
Only a month before you uploaded a video but seems like an year before. Such is the quality and content of your video that is worth the wait. One kind request could you please start doing videos on security aspect more as others who do mostly concentrate on the entertainment purpose rather than the education aspect. Thank you very much ❤🙏👍👌👏
Can You Please Make a video Explaining How Routers Split Bandwidth Between Devices, I Heard If Say U Got 500GB P/Sec speed it is Shared Between All The Devices You Have Inside the House So the more devices You have online the less Bandwidth they'll have, i dont get it please make an explanatory vid 🎉
Visit brilliant.org/PowerCert/ for a free 30 day trial. The first 200 people will get 20% off their annual premium subscription.
These videos played a small part in helping me study and pass my CompTIA A+ and Network+ exam. Even though I've now been qualified in these fields, I like to still come back to refresh my memory with your videos. Thank you!
Really great to see Brilliant sponsoring PowerCert. Imo it's a little bit of a marker of a channel's success to be sponsored by certain companies, and I consider Brilliant to be one of them. Go PowerCert!
next time ospf and bgp maybe? i still learning about it
That would be awesome, to understand the OSPF LSA's and the BGP Attributes.
Putting my vote in for BGP.
yes
How about saying ‘thank you’?
I hope such! Ospf would be amazing for upcoming exams
Thank you professor powercert! You helped me pass the Security+.
This channel is a treasure for learning tech
Working in roadway transportation, these videos' visuals and transcripts are so well done they help me to better communicate and understand networking. Know these videos are helping so many people. Thank you!
It feels cool when you have literally watched all of the videos of this channel and after couple of weeks,another brand new brilliant video pops up on the front page.wow,thank you my friend
You are my saviour, currently I am implementing the IPSec rule from the controller to windows node. This video gave a lot of information. Thanks a lot buddy
You're welcome!
Great video
However I have noticed a reduction in the videos that you produced.
I am grateful for the videos that you make I just wish they were more of them for me to learn more.
I love these. You are amazing at explaining computers you got me through many tests. :)
This guy is a master at clearly demosntrating how something works.
It makes me happy you got a sponser! Your videos deserve it.
Thank you!
This is a fascinating and complex topic. Thanks for this snippet to help provide additional visuals (visuals always help, I think).
Taking my Net+ tommorow, perfect time for you to post this, thank you!
Goodluck!!
@@KC-kp9nq passed🙏 shoutout mr.powercert
@@supergunk congrats bro!!
Brilliantly explained in a simplified way. I’ve watched this being explained by other instructors and how you explained it actually makes sense. Thank you!
Your videos are the clearest that I have encountered so far. Thanks!
Sir please make video on
OSI model your animation is best and understanding
Щиро дякую за інформацію і її подачу! Процвітання каналу!
This channel is a treasure for learning tech’ thank you 🙏
This channels is a treasure
I have been following your channel for a long time...I hope you will create more and more lessons and not make us wait too long.🎉❤❤
looked at all the other videos. this guy still explains the best!
Anyone in 2024! The 06:02 Video lectures is better than 16 years education in university.
Good overview, clearly explained like nowhere else. But moderator might have also explained two major paradigms: S2S vs C2S. What is C2S VPN?
A client-to-site VPN is a type of VPN that connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate or cloud network. It allows the device to access the network resources and services securely, as if it were physically connected to the network.Mar 4, 2023 What is S2S VPN? What is Site-to-Site VPN | Fortinet
Site-to-Site VPN Defined (Gateway router to Gateway router, typically separated by public internet and great geogrraphical distance):
A site-to-site virtual private network (VPN) refers to a connection set up between multiple networks. This could be a corporate network where multiple offices work in conjunction with each other or a branch office network with a central office and multiple branch locations.
S2S IPSec VPNs operate in Layer 3 of the Seven Layer OSI Model. Where do C2S VPNs operate? What different kinds of C2S VPNs exist?
Great vid. You have any future plans to explain OSI model/layer's?
Eventually
Please explain Authentication Header (AH) protocol guess missing here
Hey Man I just wanted to take a moment to thank you so much for these helpful animations. I’m a visual person and animation is the only way I learn. And your videos make it so easy for me to understand concepts I work with on a daily basis but for some reason havnt been able to really understand till I watched your videos. Thank you so much man. God bless you.
This is great. But what I don't understand is how the keys are exchanged and the authentication occurs without someone stealing those? 1:35 Thanks
There's a class of encryption algorithms which are used for creating a secure connection over an insecure channel. The most basic of which is the Diffie-Hellman Key Exchange.
There's a computerphile video that goes over the basics without going into the mathematics. Or there's a Wikipedia article on the subject.
ua-cam.com/video/NmM9HA2MQGI/v-deo.html
en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
There's a public and private key. Public key is only useful if you know the private key, so people intercepting the public key is no big deal. If you want to send a message to your friend, you get your friend's public key and use that to encrypt the message. That message is only decryptable using your friend's private key, so your friend is the only one who's able to make sense of the encrypted message.
@@kenmenpianoyou can do a MITM attack by providing your keys to each end host and they'll think they are talking to the desired host
Dear Sirs, I am senior lecturer at a Hungarian University. I have to produce e-learning materials in Hungaryian language. Can I ask, which animation software do you use? (I do not would like to make a competitor UA-cam channel!) Thanks, Dr. Adam Horvath
Can you make a video on Mac address randomisation
This term I came across a device like USB type a/c to lan adapter, the moment I connect it to different CPU I can different Mac address. (HP type c to lan I faced this)
I used one more from tp-link where I did not face issue of Mac address variation.
Please see if you can make a video on this
Amazing Channel!!!! would love to see more contents about cybersecurity, AI and blockchain :)
Noted!
It's amazing how the security tech keep evolving (not sure if I can say thanks to bad people sometimes).
Thanks!
Very good job, excellent presentation and very easy to comprehend.
Please make a complete video on OSI layer functioning
U should do a video what Tunneling is in networking
I was waiting for this video as you can´t imagine!!!
Amazing video, great explanation, easy to understand, please continue launching new videos , thank for your time ! We appreciate it !
I really like how you explain it!
Thank you, thank you, thank you!!! Keep it coming, please!
Please make a video on How to select Graphics card for a PC or Laptop ?
Always a fantastic educational video. Does HTTPS provide encryption as well?
Yes, but IPsec does encrypts at a deeper level.
Thank you so much for the video. All of your videos are so informative and very helpful!
You are amazing with your explanation and grafics
Thanks from Kurdistan
Followed, liked and turned the bell on. God bless you adn your family Mr, you are a good man.
Please can you do a video of STP, BPDU and OSPF especially STP( spanning-tree protocol )
Fantastic educational ❤❤❤
Please make an episode about the difference between GPT and MBR...I am having difficulty when creating software for the computer
Would be nice to see an actual implementation of this solution.
please add subtitle to understand well ,all of the Old vedios have this feature that help non native learners to understand.
I need more power cert in my life
Please do more content like this
Wouldn’t the ISP significantly throttle the bandwidth on IPsec protocol if not outright blocking those ports ?
Amazing breakdown! Thank you
Expecting dynamic routing protocols like RIP, EIGRP, OSPF and one dedicated video for BGP
Porfavor para de subir videos mi profe calvo no me deja en paz
Thank you for your efforts and creativity, it would be much appreciated if the CompTIA A+ 101+102 gets updated. Thanks again!
We need full ccna course latest ❤❤❤❤
0:45 So then SSL and TLS don't exist?
They do, but IPsec uses deeper security.
@@PowerCertAnimatedVideos
But the way you put it across in your video raises that doubt.
Maybe you could’ve clarified better?
And I believe it’s TLS. Not TSL
SSL and TLS are both implemented at the application layer. So web browsers and web servers for TLS, and SSH clients and servers for SSH.
IPSec is used to secure the connection between two networks, not between two machines. The difference being that the connection is not encrypted en-route through the initial network, or once decrypted at the other end. Ideally you would want to use another form of security atop IPSec.
Well explained!Very informative!
Glad it was helpful!
You’re amazing man, keep up the great work
these are incredible! basic concepts and im getting it now! thank you so much!
Can you please tell me on which software you use for creating the videos......??🙌🙌🙌🙌🙏
PowerPoint.
@@KevanTess ty bro...❤️🙌
Thank you so much for sharing the video
But I also request you please make more videos I hope next video coming soon 🔜 ⏩😊🎉❤
Thank you
yes, this month
@@PowerCertAnimatedVideos thank you for reply
Only a month before you uploaded a video but seems like an year before.
Such is the quality and content of your video that is worth the wait.
One kind request could you please start doing videos on security aspect more as others who do mostly concentrate on the entertainment purpose rather than the education aspect. Thank you very much ❤🙏👍👌👏
Do you have PowerPoint versions of your videos? They would be perfect for studying!!!
CAN YOU PLEASE EXPLAIN SD-WAN
VPNs should also prevent screen recording, screen shots, and blocking the microphone. I've yet to see any VPNs doing this.
?? Those are very different things that have nothing to do with the concept of using VPNs.
@@JJFlores197 They can use those to spy on you
That literally defeats the purpose of a VPN.
I'm stuck in snmp. Please can you make a video on it 🙏
Thanks for the lesson!!
upload a video on pfsense firewall
I wonder, how you do this animation?
What do you use to create the animations?
powerpoint
Wow. I learnt something that I coulnd't clearly learn. Thanks.
that's the long-waited video
Merci pour vos explications !
what is the difference between IPsec and VPN TLS
your videos so helpful !!! thanks !!!
well explained 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼 👏🏼
You don't send credit card information in plain text, sites would typically be using TLS encryption. This could've been better worded
Can You Please Make a video Explaining How Routers Split Bandwidth Between Devices, I Heard If Say U Got 500GB P/Sec speed it is Shared Between All The Devices You Have Inside the House So the more devices You have online the less Bandwidth they'll have, i dont get it please make an explanatory vid 🎉
wonderfully explained! Thank U
❤ Thank you!! Preparing N+
I'm watching this from a self hosted IPsec server lets goo
Thank you for the video
0:04 I hope that’s 124 Fahrenheit and not 124 Celsius otherwise you have a big problem.
Thanks
Thank you!
thank you
Great WOrk Team
Even if things where send in clear text from site 2 site, how would you sniff it? infiltrate an ISP sure I guess but?
Maybe you can explain MikroTik, it's interested
Hello man.
Pretty much everything these days is TLS encrypted.
😂
OMG
This sounds also like the methods hackers use when using Ransomeware attacks. Is it the same methods they use, TechVideos?
4:29
Thank you