Secure Shell Fundamentals - Learn SSH By Configuring It

Use SSH to securely communicate with your Linux and networking infrastructure.

   Watch Promo

What you'll learn

  • Why you want to use SSH
  • How to set up a lab environment with VirtualBox
  • How to download and install VirtualBox
  • How to create a Linux Virtual Machine with VirtualBox
  • How to use SSH between Linux systems
  • How to use SSH to manage Linux systems from a Windows system
  • How to configure and test key based authentication
  • How to secure SSH by disabling password authentication
  • How to protect SSH with Fail2ban
  • How to configure your ufw firewall to allow SSH but block other traffic
  • How to disable unneeded services on your Linux server
  • Copy files between Linux systems with SCP
  • Copy files betweeen Linux and Windows with SCP

Requirements

  • Access to a computer
  • Administrator or power user privileges on the computer

Description

Configure Secure Shell (SSH).

Learn how to communicate between Linux and your other operating systems (Windows and MAC OSX) using SSH.

As with all StationX courses:

  • You have a 30 day, no questions asked, money back guarantee if you're not fully satisfied with the course.
  • You have lifetime full access to the course and all updates and additions.

This course covers the following:

  • Create a free lab with VirtualBox to learn within
  • Prepare your server for SSH use
  • Connect with SSH from Linux or MAC OS X
  • Connect from Windows with PuTTY
  • Configure key based authentication for Linux and MAC OS X
  • Configure key based authentication for Windows
  • Manage your SSH configuration through /etc/ssh/sshd_config
  • Stop bad guys with Fail2ban
  • Enable your firewall (ufw)
  • Disable unneeded services
  • Manage sudo permissions
  • Copy files between Linux systems with SCP
  • Copy files from Windows to Linux with SCP

If you would like a general Linux course instead of a course focused solely on SSH, please consider my Ubuntu Linux Fundamentals StationX course.

Who this course is for:

  • Linux beginners
  • System Administration beginners
  • Beginning Network Administrators
  • Anyone who wants to create a secure SSH environment


Your Instructor


Ted LeRoy
Ted LeRoy

Ted LeRoy is an Enterprise Security Architect, providing a variety of information and physical security guidance to his business.

Ted is also an accomplished online instructor specializing in technology related courses.

He has over 20 years in Information Technology and experience in Windows and Linux administration, web server and email administration, and network and firewall administration with Cisco, Juniper, and pfSense devices.

In the Linux world, he has administered Red Hat, CentOS, and Ubuntu servers, in both "cold iron" and virtual environments being responsible for the consistent performance and availability of hundreds of servers.

He is an experienced IT and Security professional with a broad range of skills. A favorite part of IT and Security work for him is relating complex topics in a way that is instructive, helpful, and appropriate for the audience he is addressing.

Ted is an open source advocate where open source provides an appropriate solution for a given need.

He completed a Master of Science Degree in Information Technology from the Rochester Institute of Technology.

The curriculum for his Master's was heavy in Network and System Administration, and Information and System security.

His Information Technology certifications include CompTIA A+, Microsoft Certified Systems Engineer (MCSE), Cisco Certified Network Associate (CCNA), Certified Information Systems Security Professional (CISSP), and Certified Information Security Manager (CISM).


Join Today & Get Access To This Course & Every Resource You Need Grow Your Cyber Skills & Advance Your Career. Beginner & Expert Training.

Course Curriculum


  Section 6: SSH Key Based Authentication
Available in days
days after you enroll
  Section 8: Copying Files Using SSH with SCP
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Become A Member And Unlock Unlimited Access To This Course Plus Over 1,000+ Top Cyber Security Classes, Virtual Labs, Practice Tests, And Exam Simulations.

Designed To Help You Expand Your Skill Set And Propel Your Career Forward. Whether You're Just Starting Out Or You're An Industry Expert, There's Something Here For Everyone. Let's Grow Together!