Securing Data with Encryption
The Securing Data with Encryption module provides you with the instructions and devices to develop your hands on skills in the following topics: Basic OpenSSH 2 client configuration and usage, Role of OpenSSH 2 server host keys, SSH port tunnels, Basic GnuPG management.
Already have an account? Sign In »

Introduction
The Securing Data with Encryption module provides you with the instructions and devices to develop your hands on skills in the following topics:
- Basic OpenSSH 2 client configuration and usage
- Role of OpenSSH 2 server host keys
- SSH port tunnels
- Basic GnuPG management
Lab time: It will take approximately 1 hour to complete this lab.
Exercise 1 - Securing Data with Encryption
Encryption is one of the most effective and most popular techniques to ensure data security. Plain data is processed with a secret key to produce encrypted data, also known as cipher data. To read encrypted data, you must decrypt the data using the relevant secret key. In this exercise, you will understand how to secure data with encryption.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.