Learn how to set up SSH public key authentication, generate and install SSH keys, and understand the related security risks and mitigations.