Evaluate SSH Remote Management Security

Skillable
Learn On Demand Pro Series

In this lab, you will learn how to use Secure Shell Protocol (SSH) to establish secure communications between systems. First, you will set up SSH on Kali Linux and establish a connection by using password authentication. Finally, you will configure SSH to use public key authentication, and establish a connection by using a user’s private SSH key.

Time
30 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this lab, you will learn how to use Secure Shell Protocol (SSH) to establish secure communications between systems. First, you will set up SSH on Kali Linux and establish a connection by using password authentication. Finally, you will configure SSH to use public key authentication, and establish a connection by using a user’s private SSH key.