From the course: Learning CentOS Linux
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Connecting to the system remotely with Secure Shell (SSH)
From the course: Learning CentOS Linux
Connecting to the system remotely with Secure Shell (SSH)
- [Instructor] Let's switch over to connecting to the server remotely, using Secure Shell or SSH. SSH sets up an encrypted, secure terminal or command line session between your computer and a remote computer, that's set up as an SSH server. Most of the time, to connect to servers in order to administer them, you'll connect through SSH. There are other management systems and software packages that can provide more automated control. But SSH is one of those fundamental things that any CentOS user or administrator needs to know about. So, we'll take a look at the basics here. If you want to learn more about SSH, take a look at our other Linux Administration Courses that cover in more depth. SSH can use either a username and password or a username and cryptographic key to log in, to authenticate you and allow you access to the system. Connecting with a username and password is a lot easier. But using a key is much more secure. We'll look at both, and we'll start with the basic username…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
The Linux file system and the Filesystem Hierarchy Standard4m 13s
-
(Locked)
Configuring the network for a CentOS server2m 51s
-
(Locked)
Configuring the network manually6m 45s
-
(Locked)
Configuring the network with NetworkManager4m 45s
-
(Locked)
Setting the hostname2m 32s
-
(Locked)
Connecting to the system remotely with Secure Shell (SSH)4m 6s
-
(Locked)
Adding an administrative user with SSH access3m 41s
-
(Locked)
Adding a key to a user for SSH access4m 24s
-
(Locked)
Transferring files to and from the server5m 1s
-
(Locked)
File permissions2m 12s
-
(Locked)
Working with users and groups3m 52s
-
(Locked)
Installing and updating software8m 5s
-
(Locked)
Installing packages by group1m 34s
-
(Locked)
Installing packages from other sources4m
-
-
-
-
-
-