Disabling SSH after he leaves is not going to make the server secure after he leaves.
Once you let him in, he can do anything he wants. He can install PHP scripts, he can install software that will let him SSH in on a different port. He can install software that automatically erases your hard drive after a week. He can modify the operating system. He can modify PHP. He can write a script that sends an email to himself of your passwords.
No matter WHAT you do after he leaves, you can't change the fact that he was logged into your system. Pretty much the ONLY thing you can do to be truly safe is to format the hard drive and re-install everything after he leaves (which of course, defeats the purpose).
Actually, you could get MD5 checksums of every application on the box and then check to see if those checksums are the same (and that there are no new applications on the box) after he leaves. Even if you did this, though, you don't know whether or not the applications he installs for you are safe.
Does all this sound extreme? Yes - and it might be going a little overboard. But when you ask a security question, there's no fooling around with the answer. If you don't understand the truth of the risk, then you can't make good decisions. (Frankly, he's probably not going to do anything bad but that wasn't your question).
If he were to do something bad, you might not know about it for months or years. It's better to have an insecure server an know that it's insecure than to have an insecure server and not know. Disabling SSH after he leaves is not going to make the server secure after he leaves.