New Training: Secure Protocols
In this 11-video skill, CBT Nuggets trainer Keith Barker discusses and demonstrates concepts regarding secure network design. Watch this new Cyber Security training.
Watch the full course: Implementing Secure Network, Cloud, and Mobile Solutions Training
This training includes:
11 videos
1.3 hours of training
You’ll learn these topics in this skill:
Intro to Secure Protocols
IPsec and VPNs
Secure Shell (SSH)
Domain Name System (DNS)
HTTPS
Weak Protocols
IP Addressing and Routing
Email Protocols
LDAP
SNMP, NTP, & SRTP
Quiz and Review
What is Secure Shell (SSH)?
As a system administrator, you will often need a secure way of accessing a computer system over an unsecured network. Secure Shell is a network protocol that provides this. It offers not only strong password authentication and public key authentication but also encrypts data over the Internet.
You commonly use SSH when managing a remote computer. With it, you can log into this computer and perform the same kind of commands that you can perform on your own computer. You can also move files between this computer and another.
Furthermore, you can use SSH to manage routers, server hardware, virtualization platforms and operating systems.
SSH has replaced the many insecure means of performing terminal emulation, such as Telnet, rlogin and rsh. It has also replaced a variety of file transfer utilities, such as ftp and rcp.
SSH is available on all major operating systems in use today, including Windows.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.