8. Goals and Learning Objectives

So well can the Volume 3.

Let's talk about the goals and learning objectives for this volume.

Volume 3 takes a detailed look at how to stay anonymous online how to maintain privacy and how to bypass sensors.

After this call you will have a detailed understanding of how anonymity online might be achieved against various types of adversaries.

You'll learn how to apply effective OPSEC or operational security for maintaining anonymity online OPSEC is the actions and behaviors required in order to maintain security and anonymity.

We look at live operating systems what they are which are the best ones and how they can be used for security.

Privacy and anonymity you'll gain a complete understanding of how to use Virtual Private Networks also known as VPN for security privacy and to attempt anonymity.

Everything from choosing a provider to preventing protocol leaks.

We will explore the anonymising service and dark net known as TOR alter its weaknesses what you can do to mitigate those witnesses to improve your anonymity and security.

When you were using Tor including exploring the use of virtual and hardware routers and gateways you will learn how proxy servers are useful privacy and for hiding your IP address.

You understand the difference between the various types of proxies what they are suitable for and importantly learn about them any weaknesses we cover how to use the extremely versatile SSH protocol for optimal security privacy and anonymity covering local remote and dynamic port forwarding also authentication and hardening of SSH.

You'll understand the I2P.net and how to best use it with optimal configuration to protect your security and anonymity.

We look at all the privacy and anonymizing services 2 such as JonDoNYM, Botnet, bullet proof hosting and others recovering detail how censorship can be circumvented by learning how to bypass firewall, Proxies Deep packet inspection technology and even Nation-State censorship.

Then we learn the more advanced methods of anonymization by exploring nesting and chaining anonymity services together.

You understand their strengths weaknesses and what each chaining method is suitable for.

You understand how to use offsite connections such as Wi-Fi hot spots Internet cafes for privacy and anonymity how to use them securely and anonymously even against well resourced adversaries with global influence such as nation states.

We cover how to use cellular networks for privacy and anonymity.

You understand the weaknesses of cellular networks and how to best use those for privacy and anonymity for each section in this course.

You will learn both the theory and how to step by step set up each method.

If you want to know about the previous volumes and the continuation of the course through the all the volumes check out the bonus lectures.

At the end to understand how all of these volumes fit together into one complete course on cybersecurity.

This is volume 3 of 4 of your complete guide to security privacy and anonymity.

Complete and Continue  

Become a Member and Get Unlimited Access to 300+ Top Cyber Security Courses.