Using SSH for remote logins
Learn how encryption works with SSH for remote logins!
This workshop gives participants a basic introduction to how encryption works, using a practical, hands-on approach on how to set up and manage encryption keys. The pros and cons of various choices one has to make will be discussed.
After the workshop, you will have gained practical knowledge on how to access computer resources with SSH in a fun and efficient way.
Basic knowledge of Bash (Unix Shell) is recommended.
Participants need to bring a laptop (Windows, Mac or Linux are all fine), with an SSH client software installed, or admin rights to do so.
Students or researchers who use (or will use) remote servers, cloud, or HPC resources.