Log in
Choose your language

SSH course

SSH course
from 4 to 360h flexible workload
valid certificate in your country

What will I learn?

This course teaches hardening sshd_config, disabling weak authentication, selecting secure ciphers, and maintaining usable access. Learners design secure environments, manage keys effectively, and optimize remote logins using bastion hosts, SSH config, and SFTP. It covers monitoring, MFA, automation, and incident response to ensure resilient, auditable SSH setups against real threats.

Elevify advantages

Develop skills

  • Harden sshd_config by securing authentication, ciphers, and root access quickly.
  • Design secure SSH environments considering threats, roles, and network boundaries.
  • Master SSH key generation, rotation, and deployment without service interruptions.
  • Streamline SSH access with bastion hosts, ProxyJump, and secure agent forwarding.
  • Implement SSH monitoring and defense using firewalls, MFA, logs, and brute-force protection.

Suggested summary

Before starting, you can change the chapters and the workload. Choose which chapter to start with. Add or remove chapters. Increase or decrease the course workload.
Workload: between 4 and 360 hours

What our students say

I was just promoted to Intelligence Advisor of the Prison System, and the course from Elevify was crucial for me to be the chosen one.
EmersonPolice Investigator
The course was essential to meet the expectations of my boss and the company where I work.
SilviaNurse
Very great course. Lots of rich information.
WiltonCivil Firefighter

FAQs

Who is Elevify? How does it work?

Do the courses have certificates?

Are the courses free?

What is the course workload?

What are the courses like?

How do the courses work?

What is the duration of the courses?

What is the cost or price of the courses?

What is an EAD or online course and how does it work?

PDF Course