Engineering Secure SSH Access for Embedded Linux Devices
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the critical aspects of securing SSH access for Embedded Linux devices in this 44-minute conference talk by Colin McAllister from Garmin. Gain a comprehensive understanding of various SSH authentication mechanisms and their effectiveness in protecting internet-connected embedded systems. Learn about the potential risks associated with weak authentication, including compromised devices and threats to user privacy and safety. Discover tailored solutions for implementing robust authentication methods specifically designed for Embedded Linux devices. Examine the pros and cons of different OpenSSH-supported authentication mechanisms and their applicability to embedded systems. Walk through practical demonstrations and insights to enhance your ability to configure secure SSH access, safeguarding your devices against distributed malicious users across the web.
Syllabus
Engineering Secure SSH Access for Engineers - Colin McAllister, Garmin
Taught by
Linux Foundation
Tags
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography I
Stanford University via Coursera The Quantum Internet and Quantum Computers: How Will They Change the World?
Delft University of Technology via edX IoT Device Configuration and Communication: C Edition
Microsoft via edX The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy