HOME > IT & Software > Secure Shell (SSH)

Secure Shell (SSH)

SynopsisSecure Shell (SSH , available at $59.99, has an average ratin...
Secure Shell (SSH)  No.1

Secure Shell (SSH), available at $59.99, has an average rating of 4.45, with 40 lectures, 2 quizzes, based on 31 reviews, and has 8073 subscribers.

You will learn about Gain in-depth knowledge to become a SSH power user Transferring files & directories using SSH How to use Secure Shell (SSH) Control computers remotely This course is ideal for individuals who are Linux & Windows Administrators or Programmers or QA Engineers or Database Administrators or IT Managers It is particularly useful for Linux & Windows Administrators or Programmers or QA Engineers or Database Administrators or IT Managers.

Enroll now: Secure Shell (SSH)

Summary

Title: Secure Shell (SSH)

Price: $59.99

Average Rating: 4.45

Number of Lectures: 40

Number of Quizzes: 2

Number of Published Lectures: 40

Number of Published Quizzes: 2

Number of Curriculum Items: 42

Number of Published Curriculum Objects: 42

Original Price: $22.99

Quality Status: approved

Status: Live

What You Will Learn

  • Gain in-depth knowledge to become a SSH power user
  • Transferring files & directories using SSH
  • How to use Secure Shell (SSH)
  • Control computers remotely
  • Who Should Attend

  • Linux & Windows Administrators
  • Programmers
  • QA Engineers
  • Database Administrators
  • IT Managers
  • Target Audiences

  • Linux & Windows Administrators
  • Programmers
  • QA Engineers
  • Database Administrators
  • IT Managers
  • secure shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

    The best-known implementation of SSH is OpenSSH, which is available in many GNU/Linux distributions, as well as other operating systems such as BSD and Apple’s Mac OS X. OpenSSH is often used by programmers to remotely affect and monitor computers.

    In this course you will learn about secure shell. SSH is the secure shell command line tool and protocol used to securely log into and execute commands on a remote machine.  To make your machine remotely controllable, you need to install SSH server software like OpenSSH server, which you will also learn in this course. You will learn to remotely control a computer using secure shell.

    This is a beginners course. If you are a Web developer, Ethical Hacker, Software Developer, Linux user or wish to control computers remotely with SSH, this course is for you. You don’t need any prior knowledge about Secure Shell to do this course and you can use whatever system you want (Windows, Linux, Mac) as your client.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: What is Secure Shell?

    Chapter 2: Setup an SSH Server

    Lecture 1: Setup an SSH Server

    Lecture 2: Cloud VPS (Vultr)

    Lecture 3: Cloud VPS (Digital Ocean)

    Lecture 4: OpenSSH Installation – Ubuntu

    Lecture 5: Virtualbox (Ubuntu)

    Lecture 6: Virtualbox (OpenBSD)

    Chapter 3: Connect to an SSH Server

    Lecture 1: SSH from a Linux Machine

    Lecture 2: SSH from a Windows Machine

    Lecture 3: SSH from a Windows 10, 11 Machine

    Lecture 4: SSH from a Macbook

    Lecture 5: Running commands on the remote host (Linux/Mac)

    Lecture 6: Linux Tricks

    Chapter 4: Secure File Transfer

    Lecture 1: Introduction

    Lecture 2: Secure File Transfer with SFTP

    Lecture 3: Secure Copy SCP

    Lecture 4: WinSCP (Windows Only)

    Lecture 5: FileZilla (Any)

    Chapter 5: Edit Text Files

    Lecture 1: Introduction

    Lecture 2: Edit Text Files

    Lecture 3: Nano

    Lecture 4: Vim

    Chapter 6: Security

    Lecture 1: Hack SSH Server

    Lecture 2: Secure Passwords?

    Lecture 3: Public/Private keys

    Lecture 4: Disable Password Login

    Lecture 5: Limit Logins

    Lecture 6: Change Port

    Lecture 7: Disable Root Login

    Lecture 8: Why Update Software

    Lecture 9: UFW Firewall

    Chapter 7: X11 Forwarding

    Lecture 1: X11 Forwarding (Linux to Linux)

    Lecture 2: X11 Forwarding (Linux to Windows)

    Chapter 8: Additional

    Lecture 1: Tmux (multiplexer)

    Lecture 2: Screen (multiplexer)

    Lecture 3: Fetch system info

    Lecture 4: Linux Bash on Windows

    Lecture 5: Manage Users

    Lecture 6: Run Program in Background

    Instructors

  • Secure Shell (SSH)  No.2
    Peter A
    Ethical Hacker
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 2 votes
  • 3 stars: 1 votes
  • 4 stars: 16 votes
  • 5 stars: 12 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!