Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Cyber Security Course! Volume 3 : Anonymous Browsing
Section: 1 Introduction
1. Welcome to Volume III (0:35)
2. Introduction to the Instructor! (2:06)
3. Security Quick Win! (11:24)
3. Target Audience (1:54)
4. Study Recommendations (4:34)
5. The Forum - For Questions, Answers and Other Resources (1:34)
6. Course updates (0:40)
Section: 2 Goals and Objectives for Volume III
7. Goals and Learning Objectives (3:39)
Section: 3 OPSEC (Operational Security)
8. Goals and Learning Objectives (0:45)
9. Introduction to OPSEC (3:45)
10. Identities, pseudonyms and aliases (Identity Strategies) (6:04)
11. Establishing Cover (9:12)
12. Identify Cross Contamination (5:57)
13. 10 Rules of OPSEC (13:47)
14. Authorship Recognition and Evasion Methods (4:06)
15. The knock (4:48)
16. Case Studies of OPSEC Failures (7:22)
Section: 4 Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny Core linux
17. Goals and Learning Objectives (0:13)
18. Introduction to live operating systems (11:36)
19. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go (12:18)
20. Tails (13:43)
21. Tails Demo (9:49)
Section: 5 Virtual Private Networks (VPNs)
22. Goals and Learning Objectives (0:39)
23. Introduction to VPNs (10:10)
24. Which VPN protocol is best to use? and why? (11:43)
25. VPN Weaknesses (16:32)
26. Can you trust VPN providers? (8:52)
27. VPNs and Domain Name System (DNS) Leaks (9:36)
28. Setting up an OpenVPN client in Windows, Mac, iPhone and Android (11:56)
29. Setting up an OpenVPN client on Linux (9:24)
30. Preventing VPN Leaks - Firewalls and kill switches (12:16)
31. Choosing the right VPN provider (11:42)
32. Setting up an OpenVPN server Part 1 - The fast and easy way (12:28)
33. Setting up an OpenVPN server Part 2 - Debian client (7:18)
34. Setting up an OpenVPN server Part 3 - Home VPN (3:12)
Section: 6 Tor
35. Goals and Learning Objectives (0:20)
36. What is Tor? (7:35)
37. The Tor Network and Browser (8:13)
38. What should Tor be used for? (10:36)
39. Directory Authorities and Relays (7:11)
40. Tor Bridges (6:19)
41. Tor Pluggable Transports and Traffic Obfuscation (8:20)
42. Torrc Configuration File (13:32)
43. Running other applications through Tor (13:54)
44. Tor Weaknesses Part 1 (14:05)
45. Tor Weaknesses Part 2 (6:55)
46. Conclusions on Tor and mitigation to reduce risk (4:31)
47. Attacking Tor: how the NSA targets users' online anonymity (14:04)
48. Hidden services – The Tor darknet (3:04)
49. Finding Tor hidden services (2:44)
50. Other Tor Apps (2:43)
Section: 7 VPN and Tor Routers
51. Goals and Learning Objectives (0:14)
52. Introduction to VPN and Tor Routers (6:05)
53. Custom Router Firmware for VPN & TOR Tunneling (6:19)
54. Off the shelf VPN and TOR Routers (6:57)
55. DIY Hardware TOR Routers (2:56)
56. TOR and VPN Gateway Virtual Machines (5:55)
Section: 8 Proxies – HTTP, HTTPS, SOCKs and Web
57. Goals and Learning Objectives (0:18)
58. Proxies – HTTP, HTTPS and SOCKS Part 1 (9:04)
59. Proxies – HTTP, HTTPS and SOCKS Part 2 (7:36)
60. CGI proxies - Web proxy or web form proxy (4:15)
Section: 9 SSH Secure Shell
61. Goals and Learning Objectives (0:18)
62. Introduction & How to Login (5:23)
63. SSH Remote Port Forwarding (8:27)
64. SSH Local Port Forwarding (4:05)
65. SSH Socks5 Proxy Tunneling with Dynamic Ports (10:20)
66. SSH Public private key authentication (9:29)
67. SSH Hardening (4:16)
Section: 10 I2P - The Invisible Internet Project
68. Goals and Learning Objectives (0:17)
69. I2P - Introduction (11:28)
70. I2P Installing and Secure Configuration Part 1 (16:54)
71. I2P Installing and Secure Configuration Part 2 (11:15)
72. I2P Strengths and Weaknesses (4:21)
Section: 11 Other Privacy and Anonymising Services
73. Goals and Learning Objectives (0:15)
74. JonDonym - Introduction (8:43)
75. JonDonym - Installing and Secure Configuration (5:13)
76. Bullet Proof Hosting Services (BPHS) (4:14)
77. Botnets and Hacked Boxes (1:45)
Section: 12 Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection
78. Goals and Learning Objectives (0:15)
79. Outbound Firewall Bypassing - The Fundamentals Part 1 (10:08)
80. Outbound Firewall Bypassing - The Fundamentals Part 2 (10:45)
81. Outbound Bypassing - Tunneling through HTTP proxies (15:21)
82. Outbound Bypassing - Port Sharing and Knocking (7:37)
83. Outbound Bypassing – Cloaking and Obfuscating (7:57)
84. Outbound Bypassing - Remote login - VNC and RDP (5:34)
85. Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login (7:53)
Section: 13 Chaining/Nesting Privacy and Anonymising Services
86. Goals and Learning Objectives (0:27)
87. Introduction to nesting and chaining - Proxies, VPN, SSH, JonDonym and Tor (6:35)
88. Strengths and Weaknesses : (User -> SSH-VPN-JonDonym -> Tor -> Internet) (10:38)
89. Strengths and Weaknesses : (User -> Tor -> SSH-VPN-JonDonym -> Internet) (10:17)
90. Nested VPNs - Strength and Weaknesses (8:01)
91. How to setup nested VPNs (6:16)
92. How to setup nested SSH (6:28)
93. How to setup proxy chains (7:14)
94. How to setup - (User -> VPN -> Tor -> Internet) (2:08)
95. How to setup - (User -> SSH -> Tor -> Internet) (3:45)
96. How to setup - (User -> JonDonym -> Tor -> Internet) (1:42)
97. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with transproxy (15:16)
98. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with Whonix (8:02)
99. Setting up nested services (3 + hops) (4:58)
Section: 14 Off-site Internet Connections - Hotspots and Cafes
100. Goals and Learning Objectives (0:21)
101. Staying safe while on public Wi-Fi hotspots (4:32)
102. Using Internet Cafés for security, privacy and anonymity safely (7:38)
103. Using public Wi-Fi hotspots for security, privacy and anonymity safely (9:30)
104. Finding public Wi-Fi hotspots (4:20)
105. Boosting Wi-Fi range (12:38)
106. How are Wi-Fi users geo located? (4:50)
Section: 15 Mobile, Cell Phones & Cellular Networks
107. Goals and Learning Objectives (0:20)
108. Cellular Network Weaknesses - The Network Operator (6:03)
109. Cellular Networks Weaknesses - IMSI catchers (4:49)
110. Cellular Networks Weaknesses - Signaling System No7 (SS7) (4:08)
111. Mobile and Cell Phone Weaknesses (10:29)
112. How to use a laptop and cellular networks for Internet privacy and anonymity (9:11)
113. How you are geo located when using a cellular network (4:28)
Section: 16 BONUS SECTION - Whats next Volume IV
114. Important information (0:46)
115. Congratultions (1:14)
116. Certificate of Completion for CPEs (0:56)
117. BONUS - Example Lecture from Volume I- Intro to Isolation & Compartmentalization (2:10)
118. BONUS - Example Lecture from Volume II - Firefox Hardening (18:49)
119. BONUS - Example Lecture from Volume 4 - Email Tracking & Exploits (10:33)
115. Congratultions
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock