SSH , FTP , SCP , sudo and su for Linux and Unix

Learn most important protocol of ( SSH , FTP , SCP , su and sudo ) on Linux & Unix

Ratings 4.56 / 5.00
SSH , FTP , SCP , sudo and su for Linux and Unix

What You Will Learn!

  • How to access Linux and Unix using SSH
  • How to upload or download files from Windows to Linux or Windows to Unix using FTP
  • How to upload or download file from Linux to Unix or Unix to Linux using SCP

Description

Here's a brief description of each topic:

  1. SSH (Secure Shell):

    • Description: SSH is a cryptographic network protocol used to secure data communication over a computer network. It provides a secure channel for accessing and managing remote systems, allowing for secure command-line access, file transfers, and other network services.

  2. FTP (File Transfer Protocol):

    • Description: FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It allows users to upload or download files and directories, making it a common method for managing files on remote servers.

  3. SCP (Secure Copy):

    • Description: SCP is a secure file transfer protocol that uses SSH for data transfer and authentication. It provides a secure and efficient way to copy files between local and remote systems, ensuring the confidentiality and integrity of the transferred data.

  4. sudo (Superuser Do):

    • Description: "sudo" is a command-line utility in Unix-like operating systems that allows a permitted user to execute a command as the superuser or another user, as specified by the security policy. It provides a way to perform administrative tasks without logging in as the root user.

  5. su (Switch User):

    • Description: "su" is a command in Unix and Unix-like operating systems that allows a user to change the current user context to another user, including the superuser (root). It is often used to execute commands with elevated privileges or to switch to a different user account.

These concepts are fundamental for managing and securing systems, especially in the context of Linux and Unix environments. Understanding how to securely access remote systems, transfer files, and manage user privileges is crucial for effective system administration.

Who Should Attend!

  • everyone working on Linux or Unix environment

TAKE THIS COURSE

Tags

  • Linux Administration
  • Unix

Subscribers

874

Lectures

17

TAKE THIS COURSE



Related Courses