Securing user accounts
Audit services
Firewalls
Encryption technologies
Virtual network computing (VNC)
Access control
Public key infrastructure (PKI)
Logfiles
Guards! Guards!
Incidents
Troubleshooting
Figure out why something does not work as intended.
To provide a solution to resolve the issue.
SSH authentication error
Connection refused