Back to Browse

Stop using root! The secure server setup guide (DigitalOcean & SSH)

186 views
Jan 18, 2026
39:39

Welcome to Module 1 of our full-stack deployment series! In this video, we are building the foundation of our cloud infrastructure by setting up a secure Ubuntu server and configuring remote access. We start by choosing a cloud provider and deploying a virtual machine (Droplet) running Ubuntu 24.04 LTS. While this guide uses DigitalOcean, the Linux commands and security principles we cover are universal. This means you can apply these exact steps whether you are using AWS, Linode, or even a local Raspberry Pi. Security is our top priority from the very first minute. I’ll walk you through the "Lock and Key" security model to explain why SSH keys are vastly superior to passwords. You will learn how to generate a high-security ED25519 key pair, perform initial system updates, and harden your server by moving away from the default root user. Finally, we will perform "server hardening" by disabling root login and password authentication entirely. To make your workflow more efficient, I’ll also show you how to create an SSH configuration file on your local machine so you can log in to your server using a simple, easy-to-remember shortcut. Links mentioned in this video: GitHub repository: https://github.com/ImadSaddik/FullStackDeploymentHandbook DigitalOcean ($200 free credit): https://m.do.co/c/4f9010fc5eb3 SSH config documentation: https://www.ssh.com/academy/ssh/config Don't forget to like, subscribe, and leave a comment if you have any questions or feedback! ⭐️ Contents ⭐️ (00:00) Introduction & Learning Objectives (01:10) The Deployment Handbook & GitHub Repo (01:44) Setting up DigitalOcean & Free Credit (02:24) Creating your first Cloud Project (03:09) Configuring the Droplet (OS, Region, and Size) (07:05) Choosing an Authentication Method (08:12) How SSH keys work: The "Lock & Key" model (11:01) Generating ED25519 SSH Keys in the Terminal (14:55) Adding your Public Key to the Cloud Provider (15:53) Finalizing and Deploying the Server (17:53) First Login: Connecting via SSH (19:45) Initial Maintenance: Update & Upgrade Ubuntu (21:45) Why you should avoid using the Root User (22:44) Creating a New User with Sudo Privileges (24:55) Migrating SSH Keys to the New User (27:26) Hardening: Disabling Root Login & Password Auth (32:35) Understanding SSH Drop-in Configuration Files (36:45) Efficiency Trick: Creating SSH Shortcuts (38:58) What's Next

Download

1 formats

Video Formats

360pmp427.3 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Stop using root! The secure server setup guide (DigitalOcean & SSH) | NatokHD