Secure Shell (SSH) essentials: a hands-on guide
Secure Shell (SSH) essentials: a hands-on guide, available at $74.99, has an average rating of 4.6, with 57 lectures, 4 quizzes, based on 335 reviews, and has 4142 subscribers.
You will learn about Use client and server configuration files to customize SSH to your very needs Securely transfer files and directories over the network using the secure shell Enhance authentication security by enforcing public/private key authentication Run GUI applications over the network through SSH X11 forwarding Bypass local and remote firewalls using SSH tunnels Create your own SOCKS5 proxy using only SSH This course is ideal for individuals who are Anyone who uses the secure shell (SSH) on the client and/or server side It is particularly useful for Anyone who uses the secure shell (SSH) on the client and/or server side.
Enroll now: Secure Shell (SSH) essentials: a hands-on guide
Summary
Title: Secure Shell (SSH) essentials: a hands-on guide
Price: $74.99
Average Rating: 4.6
Number of Lectures: 57
Number of Quizzes: 4
Number of Published Lectures: 56
Number of Published Quizzes: 4
Number of Curriculum Items: 61
Number of Published Curriculum Objects: 60
Original Price: $22.99
Quality Status: approved
Status: Live
What You Will Learn
- Use client and server configuration files to customize SSH to your very needs
- Securely transfer files and directories over the network using the secure shell
- Enhance authentication security by enforcing public/private key authentication
- Run GUI applications over the network through SSH X11 forwarding
- Bypass local and remote firewalls using SSH tunnels
- Create your own SOCKS5 proxy using only SSH
Who Should Attend
- Anyone who uses the secure shell (SSH) on the client and/or server side
Target Audiences
- Anyone who uses the secure shell (SSH) on the client and/or server side
SSH is rarely mentioned in the technical requirements of any IT job
If you read any Linux administrator/DevOps Engineer/Site Reliability Engineer (SRE) job posting anywhere, you’ll NEVER find SSH as part of the candidate’s technical requirements. Can you guess why? Exactly! Because it’s assumed to be in your skillset ALREADY!
Today, IT professional (regardless of the platform) needs to learn how to use SSH. It’d be like hiring a call center representative who doesn’t know how to talk!
But if the average IT professional knows a thing or two about SSH, an actual Linux administrator must know how to use SSH to its max. That’s a fact. And here’s why:
-
SSH allows you to securely log in to your Linux/UNIX/macOS box without revealing your credentials and data over the network. The chances of your server getting hacked are meager now.
-
SSH offers key-based authentication, so you don’t need to memorize your password. Guess what? It’s even more secure than password-based authentication. Now, you can forget about spending hours developing a robust and unique password for each server!
-
Over SSH, you can upload or download files and directories securely. You no longer need to deploy HTTP or FTP services and waste time configuring and securing them. Instead, you can spend that time learning your following skillset.
-
Need to run Firefox on your remote machine that’s miles away? With X11 forwarding, you can run any graphical program from your remote machine over the same secure SSH connection. Trust me that’ll dazzle your colleagues.
-
With “message of the day” (motd), you can use SSH to display a phrase to anyone who logs in over SSH (including you). How about “use your hand sanitizer now and then”? Or even “This is the production server. Please be careful with your commands”. Make that extra mile and do your team members a valuable favor.
This course will teach you all of the above. But there’s more!
If you already know the basic skills of SSH, this course will take those skills to the next level. You can just read on to learn more.
-
SSH and OpenSSH are not the same! Learn the difference and where each of them is used. Impress your boss or your potential employer with your knowledge.
-
Ubuntu does not come with SSH preinstalled for security reasons. Learn how to install it in a few seconds. Your friend’s got a new Ubuntu laptop and cannot find SSH? Be there to help.
-
Is Windows your platform of choice? No problem! This class will make you work as professionals with Windows SSH clients like PuTTY and MobaXterm. You’ll be amazed by what a tiny tool like PuTTY can do. Do you need to upload or download a file and hate using the command line? WinSCP is there for you.
-
Are you security paranoid? And who isn’t today?! In this class, you will learn how to tighten your grip over your machine and network to achieve even better security:
-
Is your machine connected to multiple networks (the corporate network and the public Internet)? Limit SSH connections to the corporate network only and slam the door in the hackers’ faces.
-
Want to limit SSH connections to system administrators only for that critical production server? SSH allows you to do that. Even if outside users have the correct credentials, they’ll be denied login.
-
Wait! There’s even more!
Once you have the basics and the advanced SSH skills, you can move to the pro level. In this part, you will learn how to use SSH in the most untraditional ways. If you thought SSH was just for secure login to servers and some fast file transfer, this part would change your mind.
-
Use a jump server (bastion server) as the only entry point for many SSH servers. This host is your entry point to the servers behind it. Save time by applying the maximum security practices to only one server. Gain even more security by exposing only one server to the public network. Enjoy the peace of mind you’ll get after this step!
-
Now comes the favorite! You can turn any server to which you have SSH access to a proxy server (SOCKS proxy). Do you want to access a website that requires the connection to be coming from a specific region? or do you want to test connections to a web service while simulating different clients from different countries? If you have an SSH server in that region (in the cloud, for example), you can set up an SSH SOCKS proxy on that server and use it from anywhere in the world! It’s often cheaper than using a VPN.
Gain the required SSH skills, save time, control and secure your servers, master SSH tunnels, and much more in less than 4 hours.
You can go ahead and watch the free preview lectures to get to know my teaching style. Waste no more time and hit the Enroll button now!
Course Curriculum
Chapter 1: Installing OpenSSH server and clients
Lecture 1: Welcome
Lecture 2: The difference between SSH and OpenSSH
Lecture 3: Installing OpenSSH on Ubuntu
Lecture 4: Testing your SSH setup
Lecture 5: Installing Bash on Windows 10
Lecture 6: Installing PuTTY on Windows
Lecture 7: Installing MobaXterm on Windows
Chapter 2: Configuring your OpenSSH server
Lecture 1: Security by obscurity: changing the default port
Lecture 2: Restricting connections to a specifc interface/protocol
Lecture 3: Displaying a banner and message of the day
Lecture 4: Limiting access to specific users and groups
Lecture 5: Controlling direct root login
Chapter 3: Configuring your SSH client
Lecture 1: Basic ssh command usage
Lecture 2: Connecting to a non-default SSH port
Lecture 3: Saving SSH client settings per user
Lecture 4: Some PuTTY tips and tricks
Chapter 4: Using SSH to transfer files over the network
Lecture 1: How secure is FTP? Let's attack it!
Lecture 2: The SCP way
Lecture 3: WinSCP client for Windows
Lecture 4: MobaXterm client for Windows
Lecture 5: SFTP tips and tricks
Lecture 6: Changing scp and sftp default settings
Lecture 7: "Chrooting" sftp users, how web hosting companies do it
Chapter 5: Authentication using Public/Private keys
Lecture 1: What is key-based authentication?
Lecture 2: Generating a key pair and protecting the private key
Lecture 3: Loging-in with your key pair (Linux client)
Lecture 4: Using ssh-copy-id tool to automatically upload the public key (Linux client)
Lecture 5: Using PuTTY and PuttyGen for key-based authentication (Windows client)
Lecture 6: Automating key-based login using Pageant (Windows client)
Lecture 7: Make Pageant automatically load keys and start on Windows boot
Lecture 8: Using SSH agent on text-only terminals
Lecture 9: Disabling password-based authentication totally in favor of the key-based one
Lecture 10: Restricting password-based authentication to specific groups
Lecture 11: Hopping from one server to another using Agent Forwarding
Chapter 6: Enhancing SSH Security with Multi-Factor Authentication (MFA)
Lecture 1: The importance of MFA in high-security environments
Lecture 2: Enabling MFA on Ubuntu and CentOS using Google Authenticator
Chapter 7: Mounting remote volumes using SSHFS
Lecture 1: SSFS volumes: Linux to Linux
Lecture 2: SSH volumes: Linux to Windows (VS Code and PyCharm)
Chapter 8: Display GUI programs over SSH using X11 forwarding
Lecture 1: What is X11 forwarding?
Lecture 2: Launching Ubuntu Firefox on Centos
Lecture 3: Launching Ubuntu Firefox on Windows using PuTTY and Xming
Lecture 4: Using MobaXterm as an X11 client on Windows
Lecture 5: X11 Forwarding tips and tricks
Chapter 9: SSH tunnels
Lecture 1: What are SSH tunnels?
Lecture 2: Local SSH tunnel use case 1: securing HTTP traffic without using HTTPS
Lecture 3: Local SSH tunnel use case 2: bypassing remote firewalls
Lecture 4: Local SSH tunnel use case 3: securing telnet traffic
Lecture 5: Create a local SSH tunnel using PuTTY
Lecture 6: Reverse SSH tunnel use case: create a cheap, simple VPN
Lecture 7: Dynamic SSH port forwarding: bypass regional network restrictions using SOCKS5
Lecture 8: Create a dynamic SSH tunnel (SOCKS5 proxy) using PuTTY
Chapter 10: Advanced SSH tunnelling techniques
Lecture 1: Start SSH tunnels in the background
Lecture 2: Control public network access to your local SSH tunnel
Lecture 3: Control public network access to your reverse SSH tunnel
Lecture 4: Use a third host (gateway) to establish a local SSH tunnel
Lecture 5: Using your own machine as a gateway to connect two firewalled hosts
Instructors
-
Ahmed Elfakharany
Lead DevOps engineer | Cloud-Native tech expert | Writer
Rating Distribution
- 1 stars: 4 votes
- 2 stars: 1 votes
- 3 stars: 26 votes
- 4 stars: 138 votes
- 5 stars: 166 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple