Using SSH for remote logins

Learn how encryption works with SSH for remote logins!

This workshop gives participants a basic introduction to how encryption works, using a practical, hands-on approach on how to set up and manage encryption keys. The pros and cons of various choices one has to make will be discussed.

Learning outcomes

After the workshop, you will have gained practical knowledge on how to access computer resources with SSH in a fun and efficient way.


Basic knowledge of Bash (Unix Shell) is recommended.

Participants need to bring a laptop (Windows, Mac or Linux are all fine), with an SSH client software installed, or admin rights to do so.

Target audience

Students or researchers who use (or will use) remote servers, cloud, or HPC resources.

Go back to the full Research bazaar programme

Published Dec. 13, 2019 2:36 PM - Last modified Dec. 17, 2019 9:35 AM