Secure Shell (SSH)
Offered By: Udemy
Course Description
Overview
What you'll learn:
- Gain in-depth knowledge to become a SSH power user
- Transferring files & directories using SSH
- How to use Secure Shell (SSH)
- Control computers remotely
secure shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.
The best-known implementation of SSH is OpenSSH, which is available in many GNU/Linux distributions, as well as other operating systems such as BSD and Apple's Mac OS X. OpenSSH is often used by programmers to remotely affect and monitor computers.
In this course you will learn about secure shell. SSH is the secure shell command line tool and protocol used to securely log into and execute commands on a remote machine. To make your machine remotely controllable, you need to install SSHserver software like OpenSSH server, which you will also learn in this course. You will learn to remotely control a computer using secure shell.
This is a beginners course. If you are a Web developer, Ethical Hacker, Software Developer, Linux user or wish to control computers remotely with SSH, this course is for you. You don't need any prior knowledge about Secure Shell to do this course and you can use whatever system you want(Windows, Linux, Mac) as your client.
Taught by
Peter A
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru Advanced Python Scripting for Cybersecurity
Infosec via Coursera Introduction to IT Security
Akamai via Coursera Cyber Comp 1A
Cabrillo College via California Community Colleges System Ethical Hacking
Cabrillo College via California Community Colleges System