This visual execution shows how to secure a Raspberry Pi by using SSH keys and firewall rules. First, you generate an SSH key pair on your local machine. Then, you copy the public key to the Pi to allow key-based login. Next, you disable password login on the Pi to prevent password attacks. After that, you configure the firewall to allow SSH connections and enable it. Finally, you test the SSH connection to confirm it works without a password prompt. The variable tracker shows how SSH keys, firewall status, and SSH access method change step-by-step. Key moments clarify why disabling password login and firewall rules are important. The quiz tests understanding of each step's result and effects on security.