Skip navigation

On September 14th, 2017, we published revised versions of our Privacy Policy, Terms of Service and Website Use Policy and published a Cookie Policy. Your continued use of Lynda.com means you agree to these revised documents, so please take a few minutes to read and understand them.

SSH

SSH: Ethical Hacking: Scanning Networks
SSH: Ethical Hacking: Scanning Networks

HTTP Tunneling uses plain text, and will risk exposure of any activity sent to the target server. Lisa Bock discusses SSH tunnels, used to reduce the risk of firewall blocking and protect you against eavesdropping. Review local port forwarding and dynamic port forwarding along with Putty, a program used to set up a local SSH tunnel.

Resume Transcript Auto-Scroll
Skill Level Intermediate
1h 43m
Duration
89,895
Views
Show More Show Less
Skills covered in this course
Security IT Linux

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now