2 hours 51 minutes
Hello. My name is Jasmine Jackson and our courses intro to vagrant and in this less and we will discuss how to use secure shell into our vagrant machine, as well as a stalling software onto our favorite machine. Let's begin.
So are learning objectives are
learning the brief history and common functions of secure show how secure shell fits into vagrant and how to install software onto our vagrant machine.
brief history and functions of secure shell
So secure show or secure sockets show is a network protocol that gives a secure way to access a computer over an unsecured network. So you may be wondering, OK, jasmine, that sounds great. It's a lot of words.
What are you really trying to say? So an example of this is connecting over the Internet
as you may or may not know when the Internet was being created, security was not a focal point or in the forefront. So where we want to connect to another computer
over the Internet, we will use most times. We will use secure shell to do that because it provides a secure way between our host computer to the remote computer to be connected over the Internet.
So some capabilities of secure shell are
connecting local machine connecting a local machine toe to a remote host. So that was the example I just gave of
connecting over the Internet that fits into that category.
Secure remote access to a resource, remote execution of commands, delivery of software patches and updates, and finally, other administrative or management tasks.
now we have learned about secure show, and you may be wondering, OK, how does that fit with a stalling software?
we will use the command vagrant ssh to create a secure shell to our vagrant machine. And from there, we command really install software on our machine. So the good thing about using a secure shell is that everything that we will do will be on the command line.
So if you're a command line, Gruber or command line ninja, then using vagrants
Ssh o are using a secure share will be your best bet, because then you would not have to interact with the virtual virtualization software again. Virtual box are VM ware. And again, from our examples, we have be using the Embu to trustee 64
pretty configure machine. So again, this is like any other
Mobutu Lennix box so we can install software on our vagrant machine as we would any other limits machine.
So we have a quick, quick is
question. What is the command used to create a secure show into our vagrant machine?
Is it a up be in it? See down or d ssh! I will give you a couple of seconds and then I will come back with my answer. Let's start now.
And the answer is Papa Papa
So remember to create a secure show into our vagrant machine it is. The command is vagrant. Ssh! So the answer is D
so in summary in this video, we discussed the brief history and common functions of secure show How secure shelf it's It's a vagrant again, if you like using the command line,
using the secure show will be good because then you won't have to interact with the gooey or the graphical user interface.
Also, we also discussed how to install software onto our vagrant machine. So in the next couple of videos, I will have demos on how to you secure shelled to gain access into our vagrant machine
as well as installing software onto our vagrant machine.
I will be installing the Apache. Http server so I can't wait to see you in the next two videos and have a good day. Bye.
Introduction to IT & Cybersecurity
In this course, We will cover several cybersecurity career roles - Network Administrator, Incident Responder, ...
2 CEU/CPE Hours Available
Certificate of Completion Offered