Secure Shell (SSH)
Secure Shell (SSH), available at $59.99, has an average rating of 4.45, with 40 lectures, 2 quizzes, based on 31 reviews, and has 8073 subscribers.
You will learn about Gain in-depth knowledge to become a SSH power user Transferring files & directories using SSH How to use Secure Shell (SSH) Control computers remotely This course is ideal for individuals who are Linux & Windows Administrators or Programmers or QA Engineers or Database Administrators or IT Managers It is particularly useful for Linux & Windows Administrators or Programmers or QA Engineers or Database Administrators or IT Managers.
Enroll now: Secure Shell (SSH)
Summary
Title: Secure Shell (SSH)
Price: $59.99
Average Rating: 4.45
Number of Lectures: 40
Number of Quizzes: 2
Number of Published Lectures: 40
Number of Published Quizzes: 2
Number of Curriculum Items: 42
Number of Published Curriculum Objects: 42
Original Price: $22.99
Quality Status: approved
Status: Live
What You Will Learn
- Gain in-depth knowledge to become a SSH power user
- Transferring files & directories using SSH
- How to use Secure Shell (SSH)
- Control computers remotely
Who Should Attend
- Linux & Windows Administrators
- Programmers
- QA Engineers
- Database Administrators
- IT Managers
Target Audiences
- Linux & Windows Administrators
- Programmers
- QA Engineers
- Database Administrators
- IT Managers
secure shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.
The best-known implementation of SSH is OpenSSH, which is available in many GNU/Linux distributions, as well as other operating systems such as BSD and Apple’s Mac OS X. OpenSSH is often used by programmers to remotely affect and monitor computers.
In this course you will learn about secure shell. SSH is the secure shell command line tool and protocol used to securely log into and execute commands on a remote machine. To make your machine remotely controllable, you need to install SSH server software like OpenSSH server, which you will also learn in this course. You will learn to remotely control a computer using secure shell.
This is a beginners course. If you are a Web developer, Ethical Hacker, Software Developer, Linux user or wish to control computers remotely with SSH, this course is for you. You don’t need any prior knowledge about Secure Shell to do this course and you can use whatever system you want (Windows, Linux, Mac) as your client.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: What is Secure Shell?
Chapter 2: Setup an SSH Server
Lecture 1: Setup an SSH Server
Lecture 2: Cloud VPS (Vultr)
Lecture 3: Cloud VPS (Digital Ocean)
Lecture 4: OpenSSH Installation – Ubuntu
Lecture 5: Virtualbox (Ubuntu)
Lecture 6: Virtualbox (OpenBSD)
Chapter 3: Connect to an SSH Server
Lecture 1: SSH from a Linux Machine
Lecture 2: SSH from a Windows Machine
Lecture 3: SSH from a Windows 10, 11 Machine
Lecture 4: SSH from a Macbook
Lecture 5: Running commands on the remote host (Linux/Mac)
Lecture 6: Linux Tricks
Chapter 4: Secure File Transfer
Lecture 1: Introduction
Lecture 2: Secure File Transfer with SFTP
Lecture 3: Secure Copy SCP
Lecture 4: WinSCP (Windows Only)
Lecture 5: FileZilla (Any)
Chapter 5: Edit Text Files
Lecture 1: Introduction
Lecture 2: Edit Text Files
Lecture 3: Nano
Lecture 4: Vim
Chapter 6: Security
Lecture 1: Hack SSH Server
Lecture 2: Secure Passwords?
Lecture 3: Public/Private keys
Lecture 4: Disable Password Login
Lecture 5: Limit Logins
Lecture 6: Change Port
Lecture 7: Disable Root Login
Lecture 8: Why Update Software
Lecture 9: UFW Firewall
Chapter 7: X11 Forwarding
Lecture 1: X11 Forwarding (Linux to Linux)
Lecture 2: X11 Forwarding (Linux to Windows)
Chapter 8: Additional
Lecture 1: Tmux (multiplexer)
Lecture 2: Screen (multiplexer)
Lecture 3: Fetch system info
Lecture 4: Linux Bash on Windows
Lecture 5: Manage Users
Lecture 6: Run Program in Background
Instructors
-
Peter A
Ethical Hacker
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 2 votes
- 3 stars: 1 votes
- 4 stars: 16 votes
- 5 stars: 12 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024