From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Learning objectives

Learning objectives

- If you need to remotely administer a system from the command line, SSH is your tool. It can be used to work with systems on premises or on the cloud, but is it secure? Using SSH keys, if done properly, can help to secure the SSH client connection. The open SSH server on the other hand, which we'll be working with in this lesson is relatively secure, but it can be hardened more. In this lesson, we'll review SSH and how it works. We'll use keys to connect via SSH. Then we'll back up and analyze the SSH D_config file. After that, we'll increase security within that SSHD_config file, and we'll demonstrate how to terminate SSH connections and finally discuss SSH key management. The bulk of this lesson will be spent on configuring the SSHD_config file for maximized security. If you would like a little more review on SSH usage, see my Linux Networking Basics and Beyond video course. Let's begin this SSH security lesson with a review of SSH.

Contents