From the course: IT Security Foundations: Operating System Security
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Protocol good practices
From the course: IT Security Foundations: Operating System Security
Protocol good practices
- [Instructor] In general, when talking about protocol good practices, it's best to use protocols that can provide encryption and authentication. Now, let's take a look at some of the protocols that will make your network more secure. HTTPS is HTTP over secure socket layer or Transport Layer Security, which effectively creates a VPN between the server and the client encrypting all data. Secure Shell is used to log in for remote administration. For example, if you need to do a file transfer on your web hosting site or a even remote administration from your windows machine to a Unix environment. We can see here is where you can download Putty, and I've downloaded and extracted it, and now I'm running it. And here you can take a look at it. Go to help and introduction to Putty where you can get a little bit more familiar, where it says Putty is a free SSH, Telnet, and remote login client for Windows systems.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.