Skip navigation

SSH

SSH: Ethical Hacking: Scanning Networks
SSH: Ethical Hacking: Scanning Networks

HTTP Tunneling uses plain text, and will risk exposure of any activity sent to the target server. Lisa Bock discusses SSH tunnels, used to reduce the risk of firewall blocking and protect you against eavesdropping. Review local port forwarding and dynamic port forwarding along with Putty, a program used to set up a local SSH tunnel.

Resume Transcript Auto-Scroll
Skill Level Intermediate
1h 43m
Duration
45,317
Views
Show More Show Less
Skills covered in this course
Security IT Linux

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now