Lesson 16. Secure Network Connections

Time

This lesson takes approximately 2 hours to complete.

Goals

Understand open ports

Implement ssh, scp, and sftp

Set up a VPN client

One of the Achilles heels of computing security is the network itself. It provides the connectivity users need to collaborate, but also provides potential “stealing” points for attackers. You may use encrypted disk images, encrypted swap space, ACLs controlling access to files and folders, and myriad other proactive techniques to prevent security breaches, but as soon as you transfer a file over the network without precaution, you may leak your information.

In this lesson, you’ll see how to prevent attackers from “sniffing” out secret information on a network, ...

Get Apple Training Series: Mac OS X System Administration Reference, Volume 1 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.