How to Secure SSH - Linux Security with HackerSploit
Offered By: Linode via YouTube
Course Description
Overview
Learn how to secure SSH on a Linux server in this comprehensive tutorial. Follow along as HackerSploit guides you through a practical scenario of securing a WordPress instance from SSH-based attacks. Create a server, disable remote root login, implement SSH key-based authentication, and disable password authentication. Gain hands-on experience in essential Linux security practices to protect your servers from potential threats.
Syllabus
- Intro
- Project Scenario
- Creating the Server
- Disable Remote Root Login
- Securing Using SSH Keys
- Disable Password Authentication
Taught by
Linode
Related Courses
Linux Foundation Cert Prep: Network Security (Ubuntu)LinkedIn Learning Linux Essentials for Hackers
HackerSploit via YouTube Administration of Red Hat Enterprise Linux 8 (2023)
Udemy Red Hat Certified Specialist in Security (Exam EX415) Prep Course
A Cloud Guru Secure Shell (SSH) Complete Training Course - Master SSH
Udemy