SSH (Secure Shell)

Video Activity

SSH (Secure Shell) This lesson covers Secure Shell (SSH). Secure shell allows us to have a secure connection from user machine to a remote machine. Secure shell uses public key encryption as well as data communication, command line login and other remote management.

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

31 hours 29 minutes
Video Description

SSH (Secure Shell) This lesson covers Secure Shell (SSH). Secure shell allows us to have a secure connection from user machine to a remote machine. Secure shell uses public key encryption as well as data communication, command line login and other remote management.

Video Transcription
now our last protocol that we're gonna talk about for our remote access protocols on the last article we're gonna talk about for our network access protocols are going to be our is one of the SS H. Now, as his age stands for secure shell and it's going to allow us to have a secure connection from a machine to another machine
from one computer to another computer.
the good, the beneficial thing and the one of the most important features about S H is that it utilizes public key encryption, public
public and private key encryption pears.
what is public and private Key encryption pairs? Well,
it's a little bit more complicated than about to make it out to be, and we will talk about it in depth in our next module. But just for now, know that public and private key encryption, public and private key encryption and public and private key certificates allow us allow us to prove who we are
without having to send our user name and password
over clear text.
Sshh allows us to use thes public key encryptions and with our public key, were essentially holding up an I. D and we're saying I am who I say I am and you are who you say you are. And I'm going to encrypt this data
with your public encryption key and on Lee, you can decrypt it
because of the way that our algorithm works. And you're going to encrypt this data with my public encryption key. And on Lee, I can decrypt it the way that public and private key encryption encryption keys work.
So we'll talk about more more about that in a little bit in, in in depth. But just know that this public key encryption prevents us from having to transmit all of that in clear text.
For example, one of the predecessors toe sshh, would be something called Tell Net. Now tell Met does a lot of what S s h does, but it doesn't do it securely.
What it does is when you're connecting with, tell Met, you're connecting in the clear, which means you're sending all of your authentication. You're sending user name and password. You're sending encryption information in the clear before you are before you go ahead and initiate a session.
So when anyone listening in could just grab those details and then use them themselves later.
So it's really not doing anything for you all telling that all of our town that communications would be in the clear. We're sending user name and password is in the clear. Nothing and nothing is encrypted.
So s S H is going to give us that same functionality. But by utilizing public
and private key encryption where all of that data is going to be encrypted, all of that data is going to be It's going to let us send that data without having to worry about it being seen by other people on our network. So sssh allows us to send data communication
such as file transfers. We can use command line Loggins, and we can use
remote management on servers and remote management on devices. Weaken. Sshh, weaken.
If someone says sshh into something, they're talking about establishing a secure shell command line connection into something So you could sshh connect into a switch and remotely manage the settings on that switch. You could S S H into a safe limits or UNIX server,
and you could remotely manage that linekar UNIX box
you could establish you could connect sshh and you could transfer files over sshh and have that data communication. So it's a very robust extensible protocol that is, that can be used with other protocols we've talked about in
previous video Siri's about our different protocols,
such as are such a czar different file transfer protocol, our secure fire file transfer protocols, which utilize sshh to transfer for those files.
So s S H is sort of are
stand alone
using public key encryption, security, security tunnel and then other protocol. We can use other protocols that can ride along in that tunnel. We could just like when we talked about how are our layer to transport protocol. Our call Our Lady to Tunneling Protocol
can utilize i P sec to encrypt its data.
We have other protocols which can use sshh to encrypt its data using the public and private key encryption pairs. The thing with S H, though, is that we do have to have that trust. We do have to have a trust relationship with those other devices, and we have to make sure that we know that we are connecting to the device that we say that we are
because we're about to initiate using that public key encryption.
We need to make sure that we don't have someone sitting in the middle or we don't have. We don't have someone who is falsely pretending to be the device that we think we're connecting to.
keep in mind. And remember, sshh protocol. Remember public key encryption because we will come back to that public and private key encryption pairs. But for now, just know that RS s H is going to provide us with a secure connection from client to client where we can transfer data transfer files
transfer command line are
performed. Command line management functions on another device using utilizing that sshh encrypted tunnel that we have created between us and another device not like a VP and tunnel. This this we wouldn't. We aren't creating an s S H tunnel as a VPN, but we're using it as a We're using it as a protocol to encrypt our data
and to encrypt our connection between us
and the server down the hall.
So thank you for joining us here today on cyber today we talked about some of our different methods of network access security. We talked about everything from our VP ins to our access control lists. Two are different remote access protocols, and we talked about how we take these remote connections. We take these local connections,
and we make sure, like with access control lists,
that we don't have people talking on ports that we don't want talking on ports. We talked about how we create VP and tunnels, and we create remote network tunnels to make sure that we have encrypted secure connections over long distances. We talked about remote access protocols, which make sure that we have encrypted, secure connections.
We're on
remote computers anywhere from around the world to the computer down the hall. So all of our all of these different protocols that we've talked about, all of these different concepts that we've talked about all roll into our network access security. They roll into ways that and protocols that we can use
in order to make sure that the access that we have to our network
and the access that other clients have into our network is not on Lee encrypted and not only secure, but we can make sure that they are who they say they are when they connected to our network. So we hope that this was a very informative segment and that you will take some of this knowledge and you'll apply it and you'll see if you can
utilize some of it in your own network.
And we left a couple of topics that we're going to talk about in our next module. So we hope to see you then, and we hope to see you here later on this library.
Up Next
CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By