From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
Learning objectives - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Learning objectives
- If you need to remotely administer a system from the command line, SSH is your tool. It can be used to work with systems on premises or on the cloud, but is it secure? Using SSH keys, if done properly, can help to secure the SSH client connection. The open SSH server on the other hand, which we'll be working with in this lesson is relatively secure, but it can be hardened more. In this lesson, we'll review SSH and how it works. We'll use keys to connect via SSH. Then we'll back up and analyze the SSH D_config file. After that, we'll increase security within that SSHD_config file, and we'll demonstrate how to terminate SSH connections and finally discuss SSH key management. The bulk of this lesson will be spent on configuring the SSHD_config file for maximized security. If you would like a little more review on SSH usage, see my Linux Networking Basics and Beyond video course. Let's begin this SSH security lesson with a review of SSH.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)
-
-
-
-
-