Create SSH Keys in Linux | Cybersecurity Basics π
Learn how to generate SSH keys in Linux with Shawn Powers. Perfect for beginners in cybersecurity. Start learning today!

CBT Nuggets
3.1K views β’ Jul 10, 2014

About this video
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, Shawn Powers covers everything you need to know about creating SSH key pairs in Linux. This allows you to log into a remote server without entering a password, giving you a tremendous amount of flexibility but at the cost of increased security risk.
Easy access is a double-edged sword. On the one hand, it facilitates how quickly you can accomplish many aspects of your daily workload, but on the other hand, it also streamlines a path for unauthorized users to enter the same areas.
The answer to this dilemma is found in correctly applying SSH key pairs. Shawn walks you through how to create these key pairs and outlines a few best practices on storing them to ensure that your private key isnβt compromised. Heβll also discuss how passwords interact with key pairs and what you should be aware of if either of these needs to change.
π Download the Ultimate Sysadmin Cert Guide: https://blog.cbt.gg/b7uv
β¬οΈ 4-Week Study Plan: MD-100 & MD-101: https://blog.cbt.gg/qiq5
Start learning with CBT Nuggets:
β’ Linux Foundation Certified SysAdmin (LFCS) | https://courses.cbt.gg/422
β’ Linux Essentials | https://courses.cbt.gg/45b
β’ Linux Server Administration | https://courses.cbt.gg/ekv
β’ Everything Linux | https://courses.cbt.gg/un3
In this video, Shawn Powers covers everything you need to know about creating SSH key pairs in Linux. This allows you to log into a remote server without entering a password, giving you a tremendous amount of flexibility but at the cost of increased security risk.
Easy access is a double-edged sword. On the one hand, it facilitates how quickly you can accomplish many aspects of your daily workload, but on the other hand, it also streamlines a path for unauthorized users to enter the same areas.
The answer to this dilemma is found in correctly applying SSH key pairs. Shawn walks you through how to create these key pairs and outlines a few best practices on storing them to ensure that your private key isnβt compromised. Heβll also discuss how passwords interact with key pairs and what you should be aware of if either of these needs to change.
π Download the Ultimate Sysadmin Cert Guide: https://blog.cbt.gg/b7uv
β¬οΈ 4-Week Study Plan: MD-100 & MD-101: https://blog.cbt.gg/qiq5
Start learning with CBT Nuggets:
β’ Linux Foundation Certified SysAdmin (LFCS) | https://courses.cbt.gg/422
β’ Linux Essentials | https://courses.cbt.gg/45b
β’ Linux Server Administration | https://courses.cbt.gg/ekv
β’ Everything Linux | https://courses.cbt.gg/un3
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
3.1K
Likes
43
Duration
7:35
Published
Jul 10, 2014
User Reviews
4.4
(3) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.