Working with SSH.

The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections a...

Full description

Bibliographic Details
Main Author: Pezet, Don (instructor)
Format: eBook
Language:English
Published: [Birmingham, United Kingdom] Packt Publishing Ltd. 2024
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02063nmm a2200301 u 4500
001 EB002200566
003 EBX01000000000000001337769
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240402 ||| eng
020 |a 9781835886007 
050 4 |a QA76.774.U64 
100 1 |a Pezet, Don  |e instructor 
245 0 0 |a Working with SSH. 
246 3 1 |a Working with Secure Shell 
250 |a [First edition] 
260 |a [Birmingham, United Kingdom]  |b Packt Publishing Ltd.  |c 2024 
300 |a 1 video file (34 min.)  |b sound, color 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
653 |a UNIX Shells / http://id.loc.gov/authorities/names/n93002992 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/videos/~/9781835886007/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.4/32 
082 0 |a 500 
520 |a The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections across networks. The course continues as we delve into the use of certificates with SSH, a pivotal skill for enhancing authentication processes and strengthening your network's security posture. By focusing on practical, real-world applications, this section demystifies the complexities of cryptographic keys and certificates. The course wraps up with advanced strategies for hardening SSH, providing you with the expertise to configure, manage, and troubleshoot SSH-enabled devices with an emphasis on security best practices. Through this comprehensive exploration, you'll emerge equipped to navigate the challenges of securing remote access and data communication in today's interconnected digital world