All About SSH

In this course, we will look at SSH usage and how to lock it down.

4 videos  //  52 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

SSH is the sysadmin’s best friend. We will look at some basics of SSH and how to use it to authenticate to remote servers, both with and without passwords. Securing SSH servers is very important, and we will review the various ways to lock down this critical service.

Course syllabus

What is ssh and why is it so important to Linux?Duration: 12:57

A look at SSH server, SSH client, password vs. public/private key authorization and ssh-agent.

SSH is great, but how do we make it more secure?Duration: 17:45

How to lock down SSH and SSH features. Explore allowing certain users, disallowing root, disallowing passwords, disallowing X forwarding and more.

TCP WrappersDuration: 10:31

Using TCP wrappers to further secure SSH.

Hiding your SSH (or other daemons) with knockdDuration: 11:08

How to set up port knocking to hide your daemons.

Meet the author

Jason Welsh

LinkedIn

Jason Welsh started experimenting with Linux back in 1994 when it was still packaged on floppy disks. Over the years, he has run just about every flavor of Linux there is as well as a few years trying out FreeBSD.

He has been administering Solaris and Linux systems professionally since around 2003, supporting everything from Linux running on the server hardware to storage to VPNs and firewalls. He’s always on the lookout for new and exciting things to try out in his home lab, which runs a Proxmox server. He’s tolerant of all Linux distributions, but the current favorite is Arch or Manjaro Linux.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec