5. Study Recommendations

5. Study Recommendations

Maintaining security, privacy and anonymity can be a complex thing in order to achieve good security, good privacy. 

And to be anonymous, you must understand detail. 

So the course goes in depth. 

It is both broad and in depth, any course that just touches on the surface of security, we'll leave gaps and any gap makes you vulnerable.

So any course attempts to help protect you online has to have some depth and breadth to it, or it would fail to teach you enough so you can protect yourself aligned. 

But just because the topic is in depth and complex, doesn't mean it's not possible to learn. 

If you find the topic interesting, then that's all yours need.

I recommend making notes, read around the topics we cover and feel free to ask questions, when you have them, I provide lots of external references to websites, reports, news articles, Wikipedia, and so on is not necessary to read them all, these are just for further reading. 

If you want to go further into the topic.

I also recommend setting up a test environment in order to practice what you learn and I'll teach you how to set up a test environment later on in the course, one of the best ways to learn is to learn, to teach someone else. 

If you have in your mind that you need to teach what you are learning to someone else after, or actually do teach someone else that will really help you retain what you learned.

According to a psychology report, learners retain approximately 90% of what they learn when they teach someone else or if they use it immediately, which is why I recommend you learn it from the perspective that you're going to teach someone else or actually teach someone else. 

And you set up the test environment.

So you can use these things immediately. 

This is not a course for you just to watch and listen, and then forget, this is a course for you to actually learn and then be able to practically apply. 

And also learners would chain approximately 75% of what they learn when they practice what they learned. 

And you can see some of the other statistics here.

There are many referenced items in this course, and most of them are free. 

I've made an effort to make sure that they are free, but you may want to purchase additional software, hardware, and services that are discussed in this course. 

An example could be, you want to buy a VPN or you want an email service, or you want to buy a hardware router, or you want to pay for a virtual machine and so on.

Although it's absolutely not necessary to buy anything to understand this course.

I'm just letting you know that you may wish to make additional purchases after you learn certain topics. 

And I have no affiliation with any of the products that are discussed in this course. 

They're only what I recommend or what are required to know about in order to understand the topic.

I could have a different operating systems on the course, and it may be, you never have any intention to use a particular operating system that I'm talking about. 

When I am talking about a particular operating system, I make it clear most often in the title. 

So you can potentially miss those videos, if you wish, like for example, windows 10, you may never have any intention to use that to therefore, there may be no point in watching a video that teaches you how to change the privacy settings.

So, as I said, you might choose to skip those sections as they're not relevant to you, but that's up to you. 

I don't recommend you skip the sections on Linux, particularly because when it comes to serious security and privacy, the Linux and Linux type operating systems really are required. 

And some final advice take affirmative action.

Knowledge is no good. 

If it's not applied, most people will listen to some of this course and apply only a bit of it. 

But if the consequences of a breach in your security, privacy, or anonymity is high, then you have to take affirmative action and apply the techniques I teach you here. 

And finally my hope is that the information this cause will be used positively to improve people's freedom, security, privacy, and anonymity, and above all Liberty.

Please do no harm with this information and stay illegal.

Complete and Continue  

Become a Member and Get Unlimited Access to 310+ Top Cyber Security Courses.