Become a member
Online Access to 1000+ Courses!

MasterClass! - Using Secure Shell (SSH) Course

2hrs (20 Lessons) 2009-03-13

This Course can only be played using a subscription. You can play only first 3 chapters for free. Click Here to avail a subscription
If you administer a network, you know that remote administration is a necessary, critical job that must also be done in a secure manner. Secure Shell (SSH) is the method of choice to securely administer a remote computer system. Older methods, such as Telnet, FTP, and ‘R’ services simply don’t provide the level of security to ensure confidentiality and integrity of sensitive data as it travels across non-secure networks. If you’ve never used Secure Shell, veteran VTC author Bobby Rogers will show you how to install, configure, and use secure shell on both Windows and Linux platforms, from the very basics to advanced techniques. To begin learning, simply click on the movie links.

Welcome to the Virtual Training Company course MasterClass! - Using Secure Shell. I'm Bobby Rogers and I'm going to be your host and guide throughout this course on using Secure Shell. Secure Shell is a great way to enable remote access and remote administration to networked computers in a secure manner. There are a lot of things we're going to talk about during this course but first we're going to go into an introduction on Secure Shell and kind of tell you exactly what it is and what it does and why it's good for you to use. We'll talk about installing it on various platforms including Linux and Windows and we'll talk about configuring it as well. Then we're going to talk about basic Secure Shell use. We'll cover the different basic function of Secure Shell, or SSH as it's more commonly known, to include remote access, basic remote access and basic file copy. Then we'll look at using SSH with other services and we'll talk about tunneling other services through SSH so you can use even unsecure services in a secure manner across unsecure networks. We'll then look at the finer points of actually securing SSH. Although SSH is a very secure protocol in itself, it can be configured incorrectly so that it has vulnerabilities that others could exploit. We'll look at how to secure it so that it can be used to the best possible security level you can get. And then we'll look at some final thoughts. We'll look at some best practices. We'll also look at some resources you can use to help you use Secure Shell better. Now, we've set up a small network to demonstrate how Secure Shell is used and I want to give you a brief overview of how the network is going to be set up. First of all we're using three VMWare virtual machines on a network we set up and it's the 172.16.30 network and we're going to have three boxes on that network as I said. Two Open SUSE 11 boxes, Linux boxes running Secure Shell and also a Windows XP box and we'll use that for various things including sniffing the wire for unsecure traffic and some FTP demos and some other things. So basically we've got two Linux boxes and a Windows box and those are great boxes to test Secure Shell out on and just to set up a small, basic lab on. And the reason we tell you how this network is set up is you can do some of these demonstrations on your own, set up your own small laboratory and actually do these things hands on so you can see better how Secure Shell works. Here's a small network diagram of how we have the lab set up. Very simple. We've got our two computers, our Open SUSE 11 computers, which are Computer A and Computer B and you see their IP addresses there in front of you. Computer A, which is an Open SUSE 11 box is one 172.16.30.20 and it's connected over an Ethernet network and we've got Computer B, which is also an Open SUSE 11 Linux box. It's 172.16.30.30. Now, our Windows XP box that we'll be using for various things during various times is Computer C and it's 172.16.30.10. Now, you can set up your network this way if you like. This is a very simple network to set up or you can set it up any way you would like so you can learn how Open SUSE Linux does Secure Shell and how Windows interacts with Secure Shell and so forth. You can set it up any way you like. So let's go ahead and start and we'll get into Secure Shell and how it works.  

  • Course: MasterClass! - Using Secure Shell (SSH)
  • Author: Bobby Rogers
  • SKU: 33976
  • ISBN: 
  • Work Files: No
  • Captions: For Online University members only
  • Subject: MasterClass!
  • The first 3 chapters of courses are available to play for FREE (first chapter only for QuickStart! and MasterClass! courses). Just click on the movie link to play a lesson.
Course outline
Introduction

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Introduction to Secure Shell

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Basic Secure Shell Use

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Using SSH with Other Services

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Securing SSH

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Final Thoughts
Conclusion (03:07)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Credits

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference