YoVDO

How to Secure SSH - Linux Security with HackerSploit

Offered By: Linode via YouTube

Tags

Linux Courses Linux Security Courses WordPress Security Courses SSH Security Courses

Course Description

Overview

Learn how to secure SSH on a Linux server in this comprehensive tutorial. Follow along as HackerSploit guides you through a practical scenario of securing a WordPress instance from SSH-based attacks. Create a server, disable remote root login, implement SSH key-based authentication, and disable password authentication. Gain hands-on experience in essential Linux security practices to protect your servers from potential threats.

Syllabus

- Intro
- Project Scenario
- Creating the Server
- Disable Remote Root Login
- Securing Using SSH Keys
- Disable Password Authentication


Taught by

Linode

Related Courses

Introduction to Linux
Linux Foundation via edX
操作系统原理(Operating Systems)
Peking University via Coursera
Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera
Information Security-3
Indian Institute of Technology Madras via Swayam
Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera