Securing the Secure Shell - The Automated Way
Offered By: YouTube
Course Description
Overview
Explore the intricacies of securing SSH in this comprehensive 51-minute conference talk from SecureWV/Hack3rcon 2016. Delve into the history of SSH, examine RFC 4251, and gain insights into OpenSSH. Learn about SSH key generation, cryptography, and essential tools like SSH Copy ID and SSH Agent. Discover best practices for configuration, including host keys, key exchange, and client setup. Understand OpenSSH configuration and explore automation with Ansible, featuring a practical CodeDash playbook demonstration.
Syllabus
Introduction
History of SSH
RFC 4251
OpenSSH
SSH
SSH Key Generation
Crazy Cryptography
SSH Copy ID
SSH Agent
Configuration
Host Keys
Key Exchange
Client Configuration
OpenSSH Configuration
Ansible
Code
Dash playbook
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera