New Training: Secure Protocols
In this 11-video skill, CBT Nuggets trainer Keith Barker discusses and demonstrates concepts regarding secure network design. Watch this new Cyber Security training.
Watch the full course: Implementing Secure Network, Cloud, and Mobile Solutions Training
This training includes:
- 11 videos
- 1.3 hours of training
You’ll learn these topics in this skill:
- Intro to Secure Protocols
- IPsec and VPNs
- Secure Shell (SSH)
- Domain Name System (DNS)
- Weak Protocols
- IP Addressing and Routing
- Email Protocols
- SNMP, NTP, & SRTP
- Quiz and Review
What is Secure Shell (SSH)?
As a system administrator, you will often need a secure way of accessing a computer system over an unsecured network. Secure Shell is a network protocol that provides this. It offers not only strong password authentication and public key authentication but also encrypts data over the Internet.
You commonly use SSH when managing a remote computer. With it, you can log into this computer and perform the same kind of commands that you can perform on your own computer. You can also move files between this computer and another.
Furthermore, you can use SSH to manage routers, server hardware, virtualization platforms and operating systems.
SSH has replaced the many insecure means of performing terminal emulation, such as Telnet, rlogin and rsh. It has also replaced a variety of file transfer utilities, such as ftp and rcp.
SSH is available on all major operating systems in use today, including Windows.