Engineering Secure SSH Access for Embedded Linux Devices
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the critical aspects of securing SSH access for Embedded Linux devices in this 44-minute conference talk by Colin McAllister from Garmin. Gain a comprehensive understanding of various SSH authentication mechanisms and their effectiveness in protecting internet-connected embedded systems. Learn about the potential risks associated with weak authentication, including compromised devices and threats to user privacy and safety. Discover tailored solutions for implementing robust authentication methods specifically designed for Embedded Linux devices. Examine the pros and cons of different OpenSSH-supported authentication mechanisms and their applicability to embedded systems. Walk through practical demonstrations and insights to enhance your ability to configure secure SSH access, safeguarding your devices against distributed malicious users across the web.
Syllabus
Engineering Secure SSH Access for Engineers - Colin McAllister, Garmin
Taught by
Linux Foundation
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network