Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Cyber Security Course
01 Introduction
001 Welcome to Volume III (0:35)
002 Introduction to the Instructor (2:06)
003 Security Quick Win (11:23)
004 Target Audience (1:54)
005 Study Recommendations (4:34)
006 Course updates (0:40)
02 Goals and Objectives for Volume III
007 Goals and Learning Objectives (3:39)
03 OPSEC Operational Security
008 Goals and Learning Objectives (0:45)
009 Introduction to OPSEC (3:45)
010 Identities pseudonyms and aliases Identity Strategies (6:04)
011 Establishing Cover (9:12)
012 Identify Cross Contamination (5:57)
013 10 Rules of OPSEC (13:47)
014 Authorship Recognition and Evasion Methods (4:06)
015 The knock (4:48)
016 Case Studies of OPSEC Failures (7:22)
04 Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu
017 Goals and Learning Objectives (0:13)
018 Introduction to live operating systems (11:35)
019 Knoppix Puppy linux Jondo live Tiny core linux Window To Go (12:18)
020 Tails (13:43)
021 Tails Demo (9:48)
05 Virtual Private Networks VPNs
022 Goals and Learning Objectives (0:39)
023 Introduction to VPNs (10:10)
024 Which VPN protocol is best to use and why (11:43)
025 VPN Weaknesses (16:32)
026 Can you trust VPN providers (8:52)
027 VPNs and Domain Name System DNS Leaks (9:36)
028 Setting up an OpenVPN client in Windows Mac iPhone and Android (11:56)
029 Setting up an OpenVPN client on Linux (9:24)
030 Preventing VPN Leaks - Firewalls and kill switches (12:16)
031 Choosing the right VPN provider (11:42)
032 Setting up an OpenVPN server Part 1 - The fast and easy way (12:28)
033 Setting up an OpenVPN server Part 2 - Debian client (7:18)
034 Setting up an OpenVPN server Part 3 - Home VPN (3:12)
06 Tor
035 Goals and Learning Objectives (0:20)
036 What is Tor (7:35)
037 The Tor Network and Browser (8:13)
038 What should Tor be used for (10:36)
039 Directory Authorities and Relays (7:11)
040 Tor Bridges (6:19)
041 Tor Pluggable Transports and Traffic Obfuscation (8:20)
042 Torrc Configuration File (13:32)
043 Running other applications through Tor (13:54)
044 Tor Weaknesses Part 1 (14:05)
045 Tor Weaknesses Part 2 (6:55)
046 Conclusions on Tor and mitigation to reduce risk (4:31)
047 Attacking Tor how the NSA targets users online anonymity (14:04)
048 Hidden services The Tor darknet (3:04)
049 Finding Tor hidden services (2:44)
050 Other Tor Apps (2:43)
07 VPN and Tor Routers
051 Goals and Learning Objectives (0:14)
052 Introduction to VPN and Tor Routers (6:05)
053 Custom Router Firmware for VPN TOR Tunneling (6:19)
054 Off the shelf VPN and TOR Routers (6:56)
055 DIY Hardware TOR Routers (2:56)
056 TOR and VPN Gateway Virtual Machines (5:55)
08 Proxies HTTP HTTPS SOCKs and Web
057 Goals and Learning Objectives (0:18)
058 Proxies HTTP HTTPS and SOCKS Part 1 (9:04)
060 CGI proxies - Web proxy or web form proxy (4:15)
059 Proxies HTTP HTTPS and SOCKS Part 2 (7:36)
09 SSH Secure Shell
061 Goals and Learning Objectives (0:18)
062 Introduction How to Login (5:23)
063 SSH Remote Port Forwarding (8:27)
064 SSH Local Port Forwarding (4:05)
065 SSH Socks5 Proxy Tunneling with Dynamic Ports (10:20)
066 SSH Public private key authentication (9:29)
067 SSH Hardening (4:16)
10 I2P - The Invisible Internet Project
068 Goals and Learning Objectives (0:16)
069 I2P - Introduction (11:28)
070 I2P Installing and Secure Configuration Part 1 (16:54)
071 I2P Installing and Secure Configuration Part 2 (11:15)
072 I2P Strengths and Weaknesses (4:21)
11 Other Privacy and Anonymising Services
073 Goals and Learning Objectives (0:15)
074 JonDonym - Introduction (8:43)
075 JonDonym - Installing and Secure Configuration (5:13)
076 Bullet Proof Hosting Services BPHS (4:14)
077 Botnets and Hacked Boxes (1:45)
12 Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection
078 Goals and Learning Objectives (0:15)
079 Outbound Firewall Bypassing - The Fundamentals Part 1 (10:08)
080 Outbound Firewall Bypassing - The Fundamentals Part 2 (10:45)
081 Outbound Bypassing - Tunneling through HTTP proxies (15:21)
082 Outbound Bypassing - Port Sharing and Knocking (7:37)
083 Outbound Bypassing Cloaking and Obfuscating (7:53)
084 Outbound Bypassing - Remote login - VNC and RDP (7:57)
085 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login (5:34)
13 ChainingNesting Privacy and Anonymising Services
086 Goals and Learning Objectives (0:27)
087 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor (6:35)
088 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet (10:38)
089 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet (10:17)
090 Nested VPNs - Strength and Weaknesses (8:01)
091 How to setup nested VPNs (6:16)
092 How to setup nested SSH (6:28)
093 How to setup proxy chains (7:14)
094 How to setup - User - VPN - Tor - Internet (2:08)
095 How to setup - User - SSH - Tor - Internet (3:45)
096 How to setup - User - JonDonym - Tor - Internet (1:42)
097 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy (15:16)
098 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix (8:02)
099 Setting up nested services 3 hops (4:58)
14 Off-site Internet Connections - Hotspots and Cafes
100 Goals and Learning Objectives (0:20)
101 Staying safe while on public Wi-Fi hotspots (4:32)
103 Using public Wi-Fi hotspots for security privacy and anonymity safely (9:30)
103 (7:38)
104 Finding public Wi-Fi hotspots (4:20)
105 Boosting Wi-Fi range (12:38)
106 How are Wi-Fi users geo located (4:50)
15 Mobile Cell Phones Cellular Networks
107 Goals and Learning Objectives (0:20)
108 Cellular Network Weaknesses - The Network Operator (6:03)
109 Cellular Networks Weaknesses - IMSI catchers (4:49)
110 Cellular Networks Weaknesses - Signaling System No7 SS7 (4:08)
111 Mobile and Cell Phone Weaknesses (10:29)
112 How to use a laptop and cellular networks for Internet privacy and anonymity (9:11)
113 How you are geo located when using a cellular network (4:28)
Teach online with
099 Setting up nested services 3 hops
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock