Course Curriculum
01 Introduction
Available in
days
days
after you enroll
02 Goals and Objectives for Volume III
Available in
days
days
after you enroll
03 OPSEC Operational Security
Available in
days
days
after you enroll
- 008 Goals and Learning Objectives (0:45)
- 009 Introduction to OPSEC (3:45)
- 010 Identities pseudonyms and aliases Identity Strategies (6:04)
- 011 Establishing Cover (9:12)
- 012 Identify Cross Contamination (5:57)
- 013 10 Rules of OPSEC (13:47)
- 014 Authorship Recognition and Evasion Methods (4:06)
- 015 The knock (4:48)
- 016 Case Studies of OPSEC Failures (7:22)
04 Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu
Available in
days
days
after you enroll
05 Virtual Private Networks VPNs
Available in
days
days
after you enroll
- 022 Goals and Learning Objectives (0:39)
- 023 Introduction to VPNs (10:10)
- 024 Which VPN protocol is best to use and why (11:43)
- 025 VPN Weaknesses (16:32)
- 026 Can you trust VPN providers (8:52)
- 027 VPNs and Domain Name System DNS Leaks (9:36)
- 028 Setting up an OpenVPN client in Windows Mac iPhone and Android (11:56)
- 029 Setting up an OpenVPN client on Linux (9:24)
- 030 Preventing VPN Leaks - Firewalls and kill switches (12:16)
- 031 Choosing the right VPN provider (11:42)
- 032 Setting up an OpenVPN server Part 1 - The fast and easy way (12:28)
- 033 Setting up an OpenVPN server Part 2 - Debian client (7:18)
- 034 Setting up an OpenVPN server Part 3 - Home VPN (3:12)
06 Tor
Available in
days
days
after you enroll
- 035 Goals and Learning Objectives (0:20)
- 036 What is Tor (7:35)
- 037 The Tor Network and Browser (8:13)
- 038 What should Tor be used for (10:36)
- 039 Directory Authorities and Relays (7:11)
- 040 Tor Bridges (6:19)
- 041 Tor Pluggable Transports and Traffic Obfuscation (8:20)
- 042 Torrc Configuration File (13:32)
- 043 Running other applications through Tor (13:54)
- 044 Tor Weaknesses Part 1 (14:05)
- 045 Tor Weaknesses Part 2 (6:55)
- 046 Conclusions on Tor and mitigation to reduce risk (4:31)
- 047 Attacking Tor how the NSA targets users online anonymity (14:04)
- 048 Hidden services The Tor darknet (3:04)
- 049 Finding Tor hidden services (2:44)
- 050 Other Tor Apps (2:43)
07 VPN and Tor Routers
Available in
days
days
after you enroll
08 Proxies HTTP HTTPS SOCKs and Web
Available in
days
days
after you enroll
09 SSH Secure Shell
Available in
days
days
after you enroll
10 I2P - The Invisible Internet Project
Available in
days
days
after you enroll
11 Other Privacy and Anonymising Services
Available in
days
days
after you enroll
12 Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection
Available in
days
days
after you enroll
- 078 Goals and Learning Objectives (0:15)
- 079 Outbound Firewall Bypassing - The Fundamentals Part 1 (10:08)
- 080 Outbound Firewall Bypassing - The Fundamentals Part 2 (10:45)
- 081 Outbound Bypassing - Tunneling through HTTP proxies (15:21)
- 082 Outbound Bypassing - Port Sharing and Knocking (7:37)
- 083 Outbound Bypassing Cloaking and Obfuscating (7:53)
- 084 Outbound Bypassing - Remote login - VNC and RDP (7:57)
- 085 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login (5:34)
13 ChainingNesting Privacy and Anonymising Services
Available in
days
days
after you enroll
- 086 Goals and Learning Objectives (0:27)
- 087 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor (6:35)
- 088 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet (10:38)
- 089 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet (10:17)
- 090 Nested VPNs - Strength and Weaknesses (8:01)
- 091 How to setup nested VPNs (6:16)
- 092 How to setup nested SSH (6:28)
- 093 How to setup proxy chains (7:14)
- 094 How to setup - User - VPN - Tor - Internet (2:08)
- 095 How to setup - User - SSH - Tor - Internet (3:45)
- 096 How to setup - User - JonDonym - Tor - Internet (1:42)
- 097 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy (15:16)
- 098 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix (8:02)
- 099 Setting up nested services 3 hops (4:58)
14 Off-site Internet Connections - Hotspots and Cafes
Available in
days
days
after you enroll
- 100 Goals and Learning Objectives (0:20)
- 101 Staying safe while on public Wi-Fi hotspots (4:32)
- 103 Using public Wi-Fi hotspots for security privacy and anonymity safely (9:30)
- 103 (7:38)
- 104 Finding public Wi-Fi hotspots (4:20)
- 105 Boosting Wi-Fi range (12:38)
- 106 How are Wi-Fi users geo located (4:50)
15 Mobile Cell Phones Cellular Networks
Available in
days
days
after you enroll
- 107 Goals and Learning Objectives (0:20)
- 108 Cellular Network Weaknesses - The Network Operator (6:03)
- 109 Cellular Networks Weaknesses - IMSI catchers (4:49)
- 110 Cellular Networks Weaknesses - Signaling System No7 SS7 (4:08)
- 111 Mobile and Cell Phone Weaknesses (10:29)
- 112 How to use a laptop and cellular networks for Internet privacy and anonymity (9:11)
- 113 How you are geo located when using a cellular network (4:28)