From the course: IT Security Foundations: Operating System Security

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Protocol good practices

Protocol good practices

- [Instructor] In general, when talking about protocol good practices, it's best to use protocols that can provide encryption and authentication. Now, let's take a look at some of the protocols that will make your network more secure. HTTPS is HTTP over secure socket layer or Transport Layer Security, which effectively creates a VPN between the server and the client encrypting all data. Secure Shell is used to log in for remote administration. For example, if you need to do a file transfer on your web hosting site or a even remote administration from your windows machine to a Unix environment. We can see here is where you can download Putty, and I've downloaded and extracted it, and now I'm running it. And here you can take a look at it. Go to help and introduction to Putty where you can get a little bit more familiar, where it says Putty is a free SSH, Telnet, and remote login client for Windows systems.…

Contents