Securing Linux - Secure Remote Access

CYBRScore
Cyberscore

Secure Remote Access allows authorized users the ability to securely access networks, devices and applications from a remote location. In this lab, you will gain hands-on experience on how to harden the configuration and authentication of two main methods of secure remote connections - Secure Shell (SSH) and Virtual Private Network (VPN).

Time
2 hours
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Secure Remote Access allows authorized users the ability to securely access networks, devices and applications from a remote location. In this lab, you will gain hands-on experience on how to harden the configuration and authentication of two main methods of secure remote connections - Secure Shell (SSH) and Virtual Private Network (VPN).