back

Working with SSH

SSH Tools and Tips 33 M

This show shows you how to use SSH, Secure Shell, to securely manage your networks from eavesdropping and man-in-the-middle attacks.

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Working with SSH
    • Working with SSH
    • Enabling SSH
    • Using Certificates with SSH
    • Hardening SSH

Working with SSH

1 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

[SOUND] All right, welcome to Working With SSH, a new series on ITProTV. In this series of segments, we're gonna be taking a look at the SSH protocol, how we can use it and some of the different ways we can tweak and configure it to ensure that we're connecting to our servers in the most secure of manners. SSH is a really robust protocol. A lot of people use it for a number of things, from the basic encrypted shell type connection, to doing secure file transfers, to even tunneling, like a VPN tunnel. You can use it as a SSH for that, too,it's really, really powerful. There's a few basic configuration steps that need to be done to enable it and some additional steps to make sure that it's nice and secure and that you get the biggest benefit out of it. A lot of people are intimidated by SSH cuz they don't wanna deal with encryption and all the advanced settings. But at the end of the day, it's really not very difficult. So we've created this series of episodes to help walk you through some of the common things you need to do to get SSH deployed properly on your network and get the most out of that protocol that you can, to take advantage of what you've got. So stay tuned, we've got more SSH coming up. [SOUND]