Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Cyber Security Course! Volume 3: Anonymous Browsing
Training Overview
Description of Training
Video Overview (2:53)
Section: 1 Introduction
1. Welcome to Volume 3 (0:35)
2. Introduction to the Instructor! (2:06)
3. Security Quick Win! (11:23)
4. Target Audience (1:54)
5. Study Recommendations (4:19)
7. Course updates (0:40)
Section: 2 Goals and Objectives for Volume 3
8. Goals and Learning Objectives (3:39)
Section: 3 OPSEC (Operational Security)
9. Goals and Learning Objectives (0:45)
10. Introduction to OPSEC (3:45)
11. Identities, pseudonyms and aliases (Identity Strategies) (6:04)
12. Establishing Cover (9:12)
13. Identify Cross Contamination (5:57)
14. 10 Rules of OPSEC (13:47)
15. Authorship Recognition and Evasion Methods (4:06)
16. The knock (4:48)
17. Case Studies of OPSEC Failures (7:22)
Section: 4 Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny Core linux
18. Goals and Learning Objectives (0:13)
19. Introduction to live operating systems (11:35)
20. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go (12:18)
21. Tails (13:43)
22. Tails Demo (9:48)
Section: 5 Virtual Private Networks (VPNs)
23. Goals and Learning Objectives (0:39)
24. Introduction to VPNs (10:10)
25. Which VPN protocol is best to use? and why? (11:43)
26. VPN Weaknesses (16:32)
27. Can you trust VPN providers? (8:52)
28. VPNs and Domain Name System (DNS) Leaks (9:36)
29. Setting up an OpenVPN client in Windows, Mac, iPhone and Android (11:56)
30. Setting up an OpenVPN client on Linux (9:24)
31. Preventing VPN Leaks - Firewalls and kill switches (12:16)
33. Setting up an OpenVPN server Part 1 - The fast and easy way (12:28)
34. Setting up an OpenVPN server Part 2 - Debian client (7:18)
35. Setting up an OpenVPN server Part 3 - Home VPN (3:12)
Section: 6 Tor
36. Goals and Learning Objectives (0:20)
37. What is Tor? (7:35)
38. The Tor Network and Browser (8:13)
39. What should Tor be used for? (10:36)
40. Directory Authorities and Relays (7:11)
41. Tor Bridges (6:19)
42. Tor Pluggable Transports and Traffic Obfuscation (8:20)
43. Torrc Configuration File (13:32)
44. Running other applications through Tor (13:54)
45. Tor Weaknesses Part 1 (14:05)
46. Tor Weaknesses Part 2 (6:55)
47. Conclusions on Tor and mitigation to reduce risk (4:31)
48. Attacking Tor: how the NSA targets users' online anonymity (14:04)
49. Hidden services – The Tor darknet (3:04)
50. Finding Tor hidden services (2:44)
51. Other Tor Apps (2:43)
Section: 7 VPN and Tor Routers
52. Goals and Learning Objectives (0:14)
53. Introduction to VPN and Tor Routers (6:05)
54. Custom Router Firmware for VPN & TOR Tunneling (6:19)
55. Off the shelf VPN and TOR Routers (6:56)
56. DIY Hardware TOR Routers (2:56)
57. TOR and VPN Gateway Virtual Machines (5:55)
Section: 8 Proxies – HTTP, HTTPS, SOCKs and Web
58. Goals and Learning Objectives (0:18)
59. Proxies – HTTP, HTTPS and SOCKS Part 1 (9:04)
60. Proxies – HTTP, HTTPS and SOCKS Part 2 (7:36)
61. CGI proxies - Web proxy or web form proxy (4:15)
Section: 9 SSH Secure Shell
62. Goals and Learning Objectives (0:18)
63. Introduction & How to Login (5:23)
64. SSH Remote Port Forwarding (8:27)
65. SSH Local Port Forwarding (4:05)
66. SSH Socks5 Proxy Tunneling with Dynamic Ports (10:20)
67. SSH Public private key authentication (9:29)
68. SSH Hardening (4:16)
Section: 10 I2P - The Invisible Internet Project
69. Goals and Learning Objectives (0:16)
70. I2P - Introduction (11:28)
71. I2P Installing and Secure Configuration Part 1 (16:54)
72. I2P Installing and Secure Configuration Part 2 (11:15)
73. I2P Strengths and Weaknesses (4:21)
Section: 11 Other Privacy and Anonymising Services
74. Goals and Learning Objectives (0:15)
75. JonDonym - Introduction (8:43)
76. JonDonym - Installing and Secure Configuration (5:13)
77. Bullet Proof Hosting Services (BPHS) (4:14)
78. Botnets and Hacked Boxes (1:45)
Section: 12 Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection
79. Goals and Learning Objectives (0:15)
80. Outbound Firewall Bypassing - The Fundamentals Part 1 (10:08)
81. Outbound Firewall Bypassing - The Fundamentals Part 2 (10:45)
82. Outbound Bypassing - Tunneling through HTTP proxies (15:21)
83. Outbound Bypassing - Port Sharing and Knocking (7:37)
84. Outbound Bypassing – Cloaking and Obfuscating (7:57)
85. Outbound Bypassing - Remote login - VNC and RDP (5:34)
86. Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login (7:53)
Section: 13 Chaining/Nesting Privacy and Anonymising Services
87. Goals and Learning Objectives (0:27)
88. Introduction to nesting and chaining - Proxies, VPN, SSH, JonDonym and Tor (6:35)
89. Strengths and Weaknesses : (User -> SSH-VPN-JonDonym -> Tor -> Internet) (10:38)
90. Strengths and Weaknesses : (User -> Tor -> SSH-VPN-JonDonym -> Internet) (10:17)
91. Nested VPNs - Strength and Weaknesses (8:01)
92. How to setup nested VPNs (6:16)
93. How to setup nested SSH (6:28)
94. How to setup proxy chains (7:14)
95. How to setup - (User -> VPN -> Tor -> Internet) (2:08)
96. How to setup - (User -> SSH -> Tor -> Internet) (3:45)
97. How to setup - (User -> JonDonym -> Tor -> Internet) (1:42)
98. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with transproxy (15:16)
99. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with Whonix (8:02)
100. Setting up nested services (3 + hops) (4:58)
Section: 14 Off-site Internet Connections - Hotspots and Cafes
101. Goals and Learning Objectives (0:20)
102. Staying safe while on public Wi-Fi hotspots (4:32)
103. Using Internet Cafés for security, privacy and anonymity safely (7:38)
104. Using public Wi-Fi hotspots for security, privacy and anonymity safely (9:30)
105. Finding public Wi-Fi hotspots (4:20)
106. Boosting Wi-Fi range (12:38)
107. How are Wi-Fi users geo located? (4:50)
Section: 15 Mobile, Cell Phones & Cellular Networks
108. Goals and Learning Objectives (0:20)
109. Cellular Network Weaknesses - The Network Operator (6:03)
110. Cellular Networks Weaknesses - IMSI catchers (4:49)
111. Cellular Networks Weaknesses - Signaling System No7 (SS7) (4:08)
112. Mobile and Cell Phone Weaknesses (10:29)
113. How to use a laptop and cellular networks for Internet privacy and anonymity (9:11)
114. How you are geo located when using a cellular network (4:28)
Section: 16 BONUS SECTION - Whats next Volume IV
115. Important information (0:46)
116. Congratulations (1:14)
117. Certificate of Completion for CPEs (0:56)
118. BONUS - Example Lecture from Volume I- Intro to Isolation & Compartmentalization (2:10)
119. BONUS - Example Lecture from Volume II - Firefox Hardening (18:49)
120. BONUS - Example Lecture from Volume 4 - Email Tracking & Exploits (10:33)
Audio Version of Training
Audio Download
9. Goals and Learning Objectives
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock