How to Secure SSH | Linux Security with HackerSploit
In this series, @HackerSploit takes us through a scenario where we'll have to secure a WordPress instance from SSH based attacks.
Chapters:
0:00 - Intro
1:06 - Project Scenario
2:56 - Creating the Server
8:00 - Disable Remote Root Login
13:30 - Securing Using SSH Keys
22:00 - Disable Password Authentication
New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube
Read the doc for more information on securing your server → https://www.linode.com/docs/guides/securing-your-server/
Learn more about getting started with Linode → https://www.linode.com/docs/guides/getting-started/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1
#Linode #Linux #Security #HackerSploit
Product: Linode, SSH, Linux Security; HackerSploit;