Secure Shell Fundamentals - Learn SSH By Configuring It
What you'll learn
- Why you want to use SSH
- How to set up a lab environment with VirtualBox
- How to download and install VirtualBox
- How to create a Linux Virtual Machine with VirtualBox
- How to use SSH between Linux systems
- How to use SSH to manage Linux systems from a Windows system
- How to configure and test key based authentication
- How to secure SSH by disabling password authentication
- How to protect SSH with Fail2ban
- How to configure your ufw firewall to allow SSH but block other traffic
- How to disable unneeded services on your Linux server
- Copy files between Linux systems with SCP
- Copy files betweeen Linux and Windows with SCP
- Access to a computer
- Administrator or power user privileges on the computer
Configure Secure Shell (SSH).
Learn how to communicate between Linux and your other operating systems (Windows and MAC OSX) using SSH.
As with all Udemy courses:
You have a 30 day, no questions asked, money back guarantee if you're not fully satisfied with the course.
You have lifetime full access to the course and all updates and additions.
This course covers the following:
Create a free lab with VirtualBox to learn within
Prepare your server for SSH use
Connect with SSH from Linux or MAC OS X
Connect from Windows with PuTTY
Configure key based authentication for Linux and MAC OS X
Configure key based authentication for Windows
Manage your SSH configuration through /etc/ssh/sshd_config
Stop bad guys with Fail2ban
Enable your firewall (ufw)
Disable unneeded services
Manage sudo permissions
Copy files between Linux systems with SCP
Copy files from Windows to Linux with SCP
If you would like a general Linux course instead of a course focused solely on SSH, please consider my Ubuntu Linux Fundamentals Udemy course.
Who this course is for:
- Linux beginners
- System Administration beginners
- Beginning Network Administrators
- Anyone who wants to create a secure SSH environment
Ted LeRoy is an Enterprise Security Architect, providing a variety of information and physical security guidance to his business.
Ted is also best selling online instructor specializing in technology related courses.
He has over 20 years in Information Technology and experience in Windows and Linux administration, web server and email administration, and network and firewall administration with Cisco, Juniper, and pfSense devices.
In the Linux world, he has administered Red Hat, CentOS, and Ubuntu servers, in both "cold iron" and virtual environments being responsible for the consistent performance and availability of hundreds of servers.
He is an experienced IT and Security professional with a broad range of skills. A favorite part of IT and Security work for him is relating complex topics in a way that is instructive, helpful, and appropriate for the audience he is addressing.
Ted is an open source advocate where open source provides an appropriate solution for a given need.
He completed a Master of Science Degree in Information Technology from the Rochester Institute of Technology.
The curriculum for his Master's was heavy in Network and System Administration, and Information and System security.
His Information Technology certifications include CompTIA A+, Microsoft Certified Systems Engineer (MCSE), Cisco Certified Network Associate (CCNA), Certified Information Systems Security Professional (CISSP), and Certified Information Security Manager (CISM).