Network & Security


Master Linux administration using the secure shell

Unleash the power of the secure shell in Linux administration and network security

4.75 (28 reviews)

Master Linux administration using the secure shell


3.5 hours


Jul 2018

Last Update
Regular Price

What you will learn

Use client and server configuration files to cutomize SSH to your very needs

Securely trasnfer files and directories over the network using the secure shell

Enhance authentication security by enforcing public/private key authentication

Run GUI applications over the network through SSH X11 forwarding

Bypass local and remote firewalls using SSH tunnels

Create your own SOCKS5 proxy using only SSH


Whether you are a UNIX/Linux administrator, a casual user, a macOS owner, or even a Microsoft Windows user, you've probably used SSH (secure shell) in some way or another. This course is going to uncover some of the less-known features of SSH. Yes, it will teach SSH for the total beginner, but it will also show SSH veterans some tips and tricks that perhaps they don't know they ever existed.

I tried to make this class as modular as possible. This means that you could skip lectures whose topics you already know, and watch only what want to gain knowledge about. You can view the lectures in any order you want because they are largely non-dependent on each other.

Have a quick look at the lecture titles, watch the free preview and enroll now to become an SSH wizard!


Installing OpenSSH server and clients

The difference between SSH and OpenSSH

Installing OpenSSH on Ubuntu

Testing your SSH setup

Installing Bash on Windows 10

Installing PuTTY on Windows

Installing MobaXterm on Windows

Configuring your OpenSSH server

Security by obscurity: changing the default port

Restricting connections to a specifc interface/protocol

Displaying a banner and message of the day

Limiting access to specific users and groups

Controlling direct root login

Configuring your SSH client

Basic ssh command usage

Connecting to a non-default SSH port

Saving SSH client settings per user

Some PuTTY tips and tricks

Using SSH to transfer files over the network

How secure is FTP? Let's attack it!

The SCP way

WinSCP client for Windows

MobaXterm client for Windows

SFTP tips and tricks

Changing scp and sftp default settings

"Chrooting" sftp users, how web hosting companies do it

Authentication using Public/Private keys

What is key-based authentication?

Generating a key pair and protecting the private key

Loging-in with your key pair (Linux client)

Using ssh-copy-id tool to automatically upload the public key (Linux client)

Using PuTTY and PuttyGen for key-based authentication (Windows client)

Automating key-based login using Pageant (Windows client)

Make Pageant automatically load keys and start on Windows boot

Using SSH agent on text-only terminals

Disabling password-based authentication totally in favor of the key-based one

Restricting password-based authentication to specific groups

Hopping from one server to another using Agent Forwarding

Display GUI programs over SSH using X11 forwarding

What is X11 forwarding?

Launching Ubuntu Firefox on Centos

Launching Ubuntu Firefox on Windows using PuTTY and Xming

Using MobaXterm as an X11 client on Windows

X11 Forwarding tips and tricks

SSH tunnels

What are SSH tunnels?

Local SSH tunnel use case 1: securing HTTP traffic without using HTTPS

Local SSH tunnel use case 2: bypassing remote firewalls

Local SSH tunnel use case 3: securing telnet traffic

Create a local SSH tunnel using PuTTY

Reverse SSH tunnel use case: create a cheap, simple VPN

Dynamic SSH port forwarding: bypass regional network restrictions using SOCKS5

Create a dynamic SSH tunnel (SOCKS5 proxy) using PuTTY

Advanced SSH tunnelling techniques

Start SSH tunnels in the background

Control public network access to your local SSH tunnel

Control public network access to your reverse SSH tunnel

Use a third host (gateway) to establish a local SSH tunnel

Using your own machine as a gateway to connect two firewalled hosts


Bostjan25 August 2019

This is a great ssh course. Topics are explained clearly and they are supported with practical examples. You'll need some command line knowledge, though. While ssh commands are explained in detail, other Linux CLI commands are not and things are happening pretty fast - make sure you can follow along.


Udemy ID


Course created date


Course Indexed date
Course Submitted by