Need to access resources on a closed network? Create a secure tunnel to an insecure site? SSH has you covered. Many of us use SSH every day and only scratch the surface. In this talk, we'll dive into little-known features of SSH such as user and host configurations, security measures, tunnels, and more. Attendees will learn how to configure SSH to meet their needs, how to utilize SSH to access and protect resources, and realize their everyday tools, like SSH, have much more functionality that is perceived.