[SOUND] All right,
welcome to Working With SSH,
a new series on ITProTV.
In this series of segments, we're gonna
be taking a look at the SSH protocol,
how we can use it and some of the
different ways we can tweak and configure
it to ensure that we're connecting to our
servers in the most secure of manners.
SSH is a really robust protocol.
A lot of people use it for
a number of things, from the basic
encrypted shell type connection,
to doing secure file transfers,
to even tunneling, like a VPN tunnel.
You can use it as a SSH for that,
too,it's really, really powerful.
There's a few basic configuration steps
that need to be done to enable it and
some additional steps to make sure
that it's nice and secure and
that you get the biggest
benefit out of it.
A lot of people are intimidated by SSH cuz
they don't wanna deal with encryption and
all the advanced settings.
But at the end of the day,
it's really not very difficult.
So we've created this series of
episodes to help walk you through some
of the common things you need to do to get
SSH deployed properly on your network and
get the most out of that protocol that you
can, to take advantage of what you've got.
So stay tuned,
we've got more SSH coming up.