Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 008 Goals and Learning Objectives (0:45)
- 009 Introduction to OPSEC (3:45)
- 010 Identities pseudonyms and aliases Identity Strategies (6:04)
- 011 Establishing Cover (9:12)
- 012 Identify Cross Contamination (5:57)
- 013 10 Rules of OPSEC (13:47)
- 014 Authorship Recognition and Evasion Methods (4:06)
- 015 The knock (4:48)
- 016 Case Studies of OPSEC Failures (7:22)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 022 Goals and Learning Objectives (0:39)
- 023 Introduction to VPNs (10:10)
- 024 Which VPN protocol is best to use and why (11:43)
- 025 VPN Weaknesses (16:32)
- 026 Can you trust VPN providers (8:52)
- 027 VPNs and Domain Name System DNS Leaks (9:36)
- 028 Setting up an OpenVPN client in Windows Mac iPhone and Android (11:56)
- 029 Setting up an OpenVPN client on Linux (9:24)
- 030 Preventing VPN Leaks - Firewalls and kill switches (12:16)
- 031 Choosing the right VPN provider (11:42)
- 032 Setting up an OpenVPN server Part 1 - The fast and easy way (12:28)
- 033 Setting up an OpenVPN server Part 2 - Debian client (7:18)
- 034 Setting up an OpenVPN server Part 3 - Home VPN (3:12)
Available in
days
days
after you enroll
- 035 Goals and Learning Objectives (0:20)
- 036 What is Tor (7:35)
- 037 The Tor Network and Browser (8:13)
- 038 What should Tor be used for (10:36)
- 039 Directory Authorities and Relays (7:11)
- 040 Tor Bridges (6:19)
- 041 Tor Pluggable Transports and Traffic Obfuscation (8:20)
- 042 Torrc Configuration File (13:32)
- 043 Running other applications through Tor (13:54)
- 044 Tor Weaknesses Part 1 (14:05)
- 045 Tor Weaknesses Part 2 (6:55)
- 046 Conclusions on Tor and mitigation to reduce risk (4:31)
- 047 Attacking Tor how the NSA targets users online anonymity (14:04)
- 048 Hidden services The Tor darknet (3:04)
- 049 Finding Tor hidden services (2:44)
- 050 Other Tor Apps (2:43)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 078 Goals and Learning Objectives (0:15)
- 079 Outbound Firewall Bypassing - The Fundamentals Part 1 (10:08)
- 080 Outbound Firewall Bypassing - The Fundamentals Part 2 (10:45)
- 081 Outbound Bypassing - Tunneling through HTTP proxies (15:21)
- 082 Outbound Bypassing - Port Sharing and Knocking (7:37)
- 083 Outbound Bypassing Cloaking and Obfuscating (7:53)
- 084 Outbound Bypassing - Remote login - VNC and RDP (7:57)
- 085 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login (5:34)
Available in
days
days
after you enroll
- 086 Goals and Learning Objectives (0:27)
- 087 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor (6:35)
- 088 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet (10:38)
- 089 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet (10:17)
- 090 Nested VPNs - Strength and Weaknesses (8:01)
- 091 How to setup nested VPNs (6:16)
- 092 How to setup nested SSH (6:28)
- 093 How to setup proxy chains (7:14)
- 094 How to setup - User - VPN - Tor - Internet (2:08)
- 095 How to setup - User - SSH - Tor - Internet (3:45)
- 096 How to setup - User - JonDonym - Tor - Internet (1:42)
- 097 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy (15:16)
- 098 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix (8:02)
- 099 Setting up nested services 3 hops (4:58)
Available in
days
days
after you enroll
- 100 Goals and Learning Objectives (0:20)
- 101 Staying safe while on public Wi-Fi hotspots (4:32)
- 103 Using public Wi-Fi hotspots for security privacy and anonymity safely (9:30)
- 103 (7:38)
- 104 Finding public Wi-Fi hotspots (4:20)
- 105 Boosting Wi-Fi range (12:38)
- 106 How are Wi-Fi users geo located (4:50)
Available in
days
days
after you enroll
- 107 Goals and Learning Objectives (0:20)
- 108 Cellular Network Weaknesses - The Network Operator (6:03)
- 109 Cellular Networks Weaknesses - IMSI catchers (4:49)
- 110 Cellular Networks Weaknesses - Signaling System No7 SS7 (4:08)
- 111 Mobile and Cell Phone Weaknesses (10:29)
- 112 How to use a laptop and cellular networks for Internet privacy and anonymity (9:11)
- 113 How you are geo located when using a cellular network (4:28)