Use SSH for Remote Access
In this lab, you will learn how to use Secure Shell Protocol (SSH) to establish secure communications between systems. First, you will configure SSH on Kali Linux and establish an SSH connection by using password authentication. Last, you will configure SSH to use public key authentication and establish a connection with a user’s private SSH key.
Time
30 minutes
Difficulty
Beginner
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this lab, you will learn how to use Secure Shell Protocol (SSH) to establish secure communications between systems. First, you will configure SSH on Kali Linux and establish an SSH connection by using password authentication. Last, you will configure SSH to use public key authentication and establish a connection with a user’s private SSH key.
Learning Partner