secure shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.
The best-known implementation of SSH is OpenSSH, which is available in many GNU/Linux distributions, as well as other operating systems such as BSD and Apple’s Mac OS X. OpenSSH is often used by programmers to remotely affect and monitor computers.
In this course you will learn about secure shell. SSH is the secure shell command line tool and protocol used to securely log into and execute commands on a remote machine. To make your machine remotely controllable, you need to install SSH server software like OpenSSH server, which you will also learn in this course. You will learn to remotely control a computer using secure shell.
This is a beginners course. If you are a Web developer, Ethical Hacker, Software Developer, Linux user or wish to control computers remotely with SSH, this course is for you. You don’t need any prior knowledge about Secure Shell to do this course and you can use whatever system you want (Windows, Linux, Mac) as your client.
What you’ll learn
- Gain in-depth knowledge to become a SSH power user
- Transferring files & directories using SSH
- How to use Secure Shell (SSH)
- Control computers remotely
- Computer (Linux/Windows/Mac)
Who this course is for:
- Linux & Windows Administrators
- QA Engineers
- Database Administrators
- IT Managers