CCB 011 SSH Basics for Cloud Security
The sensible first step in keeping your Cloud Sytems safe.
The Secure SHell (SSH) provides a secure method to remotely log into remote computers over an unsecured network. The protocol further avoids the need to use (and remember) password. It is not only used by humans to access computers, but can facilitate secure computer to computer interactions. Extensively used in modern IT operations, it is a fundamental tool that anyone interested in cloud systems should be familiar with. This course provides background on what SSH is and how it works and then provides hands on labs that will give you practical experience generating and using SSH keys.
Course Orientation
Why SSH?
Why SSH? Summary
What are SSH Keys? Summary
What are SSH Keys?
Sharing SSH Keys
Sharing SSH Keys Summary
Operating System Considerations
Creating SSH Keys
Creating SSH Keys
Configuring Your Environment
Configure Your Environment
How to use SSH Keys on GitHub
Are You Ready to Continue Your Cloud Learning Journey?
Test Lesson
Excelent course
Excelent course
Read Less