The Complete Cyber Security Course : Anonymous Browsing!
- Description
- Curriculum
- FAQ
- Reviews
Learn a practical
skill-set in staying anonymous online and maintaining total privacy against even
a well-resourced adversary with global influence.
Covering all major platforms including
Windows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.
Become a cyber security specialist. – Go from beginner
to expert in this easy to follow advanced course.
We cover in detail
all the best anonymising and privacy methods. Including;
- Tor
- VPNs – Virtual Private Networks
- Proxy servers – HTTP, HTTPS, SOCKs and Web
- SSH Secure Shell
- Live Operating Systems – Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
- OPSEC – Operation Security
- I2P – The Invisible Internet Project
- JonDoNym
- Off-site connections –Â Hotspots and Cafes
- Mobile, Cell Phones & Cellular Networks
- Bulletproof hostingÂ
- and more….
For each of these
anonymizing methods we analysis in detail their strengths and weaknesses, we
look at the techniques used to attack these anonymity services and what you can
do to mitigate those de-anonymization attacks.
Advanced anonymity:
We explore chaining and nesting anonymizing services together to provide layers
of obfuscation for maximum anonymity against even the most well-resourced
adversaries.
We cover bypassing
censors, firewalls, and proxies. Learn to bypass the trickiest of censoring
devices including DPI (deep packet inspection).
The course covers
both the theory and practically how setup everything we discuss. Â
This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity. Â
-
9Goals and Learning ObjectivesVideo lesson
-
10Introduction to OPSECVideo lesson
-
11Identities, pseudonyms and aliases (Identity Strategies)Video lesson
-
12Establishing CoverVideo lesson
-
13Identify Cross ContaminationVideo lesson
-
1410 Rules of OPSECVideo lesson
-
15Authorship Recognition and Evasion MethodsVideo lesson
-
16The knockVideo lesson
-
17Case Studies of OPSEC FailuresVideo lesson
-
23Goals and Learning ObjectivesVideo lesson
-
24Introduction to VPNsVideo lesson
-
25Which VPN protocol is best to use? and why?Video lesson
-
26VPN WeaknessesVideo lesson
-
27Can you trust VPN providers?Video lesson
-
28VPNs and Domain Name System (DNS) LeaksVideo lesson
-
29Setting up an OpenVPN client in Windows, Mac, iPhone and AndroidVideo lesson
-
30Setting up an OpenVPN client on LinuxVideo lesson
-
31Preventing VPN Leaks - Firewalls and kill switchesVideo lesson
-
32Choosing the right VPN providerVideo lesson
-
33Setting up an OpenVPN server Part 1 - The fast and easy wayVideo lesson
-
34Setting up an OpenVPN server Part 2 - Debian clientVideo lesson
-
35Setting up an OpenVPN server Part 3 - Home VPNVideo lesson
-
36Goals and Learning ObjectivesVideo lesson
-
37What is Tor?Video lesson
-
38The Tor Network and BrowserVideo lesson
-
39What should Tor be used for?Video lesson
-
40Directory Authorities and RelaysVideo lesson
-
41Tor BridgesVideo lesson
-
42Tor Pluggable Transports and Traffic ObfuscationVideo lesson
-
43Torrc Configuration FileVideo lesson
-
44Running other applications through TorVideo lesson
-
45Tor Weaknesses Part 1Video lesson
-
46Tor Weaknesses Part 2Video lesson
-
47Conclusions on Tor and mitigation to reduce riskVideo lesson
-
48Attacking Tor: how the NSA targets users' online anonymityVideo lesson
-
49Hidden services – The Tor darknetVideo lesson
-
50Finding Tor hidden servicesVideo lesson
-
51Other Tor AppsVideo lesson
-
52Goals and Learning ObjectivesVideo lesson
-
53Introduction to VPN and Tor RoutersVideo lesson
-
54Custom Router Firmware for VPN & TOR TunnelingVideo lesson
-
55Off the shelf VPN and TOR RoutersVideo lesson
-
56DIY Hardware TOR RoutersVideo lesson
-
57TOR and VPN Gateway Virtual MachinesVideo lesson
-
62Goals and Learning ObjectivesVideo lesson
-
63Introduction & How to LoginVideo lesson
-
64SSH Remote Port ForwardingVideo lesson
-
65SSH Local Port ForwardingVideo lesson
-
66SSH Socks5 Proxy Tunneling with Dynamic PortsVideo lesson
-
67SSH Public private key authenticationVideo lesson
-
68SSH HardeningVideo lesson
-
79Goals and Learning ObjectivesVideo lesson
-
80Outbound Firewall Bypassing - The Fundamentals Part 1Video lesson
-
81Outbound Firewall Bypassing - The Fundamentals Part 2Video lesson
-
82Outbound Bypassing - Tunneling through HTTP proxiesVideo lesson
-
83Outbound Bypassing - Port Sharing and KnockingVideo lesson
-
84Outbound Bypassing – Cloaking and ObfuscatingVideo lesson
-
85Outbound Bypassing - Remote login - VNC and RDPVideo lesson
-
86Inbound Bypassing - Reverse shells, SSH remote tunneling and remote loginVideo lesson
