Overview • Why Encryption • Protocols • Implementations • Clients • Client Configuration • Server • Patterns • Utilities • Third Party • Logging and Troubleshooting • Development Cookbook: Remote Processes • The Client Configuration File • Tunnels • Automated Backup • File Transfer with SFTP • Public Key Authentication • Certificate-based Authentication • Host-based Authentication • Load Balancing • Multiplexing • Proxies and Jump Hosts