Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mastering Dark Web & Cyber Privacy Certification Masterclass
1. Introduction
1.1 TOR-section-slides
1. Introduction to Privacy, Anonymity _ Security (6:45)
2. Course Breakdown (3:45)
3. Introduction to TOR (6:37)
4. Introduction to Hidden Services Onion Services (3:55)
5. Connecting to TOR (4:45)
2. The TOR Browser
1.1 TOR-Browser-section-slides
1. Section Intro _ Breakdown (1:49)
2. What is The TOR Browser (4:21)
3. Verifying _ Installing TOR Browser on Windows (10:20)
4. Verifying _ Installing TOR Browser on Mac OS X (10:44)
5. Verifying _ Installing TOR Browser on Linux (11:17)
6. TOR Bridges _ Pluggable Transports (6:48)
7. Bypassing TOR Censorship (6:14)
8. Intro to Virtual Private Networks (VPN) _ How to Use it with TOR (11:24)
9. Configuring TOR Browser For Maximum Security _ Anonymity (7:31)
10. TOR Browser Security Settings _ Intro to Information Theory (10:29)
3. TAILS - The Amnesic Incognito Live System
1.1 Tails-section-slides
1. Disadvantages of Using The TOR Browser on Windows, OS X or Linux (3:00)
2. What is TAILS (3:33)
3. TAILS Installation Options (5:02)
4. Installing TAILS From All Operating Systems (8:40)
5. Starting TAILS on All Operating Systems (9:04)
6. TAILS Basics - Part 1 (5:25)
7. TAILS Basics - Part 2 (6:01)
8. What is Persistence _ Why We Need it! (5:02)
9. Enabling Encrypted Persistence (12:14)
10. Bypassing Censorship Using Bridges _ Plugable Transports (7:12)
11. Using The TOR Browser on Tails (7:14)
12. Connecting to Captive Portals (8:00)
13. Connecting to VPN From TAILS - Method 1 (7:13)
14. Connecting to VPN From TAILS - Method 2 (15:45)
4. Accessing the Dark Net - Entry Points
1. Introduction _ Breakdown of Next Sections (1:58)
2. Discovering Hidden Services Using Darknet Search Engines (11:03)
3. Discovering Hidden Services Using Listings _ Onion Services (6:21)
5. Communicating Privately _ Anonymously - Using Email
1. Creating a Fake Anonymous Identity (5:41)
1.1 Emails
2. Using Temporary Email Accounts (6:11)
3. Using Privacy Focused Email Providers (9:46)
4. Using DarkNet Email Providers (8:58)
5. Picking The Right Email Service (7:21)
6. Communicating Privately _ Anonymously - Instant Messaging
1. Introduction to Jabber XMPP (8:08)
1.2 Instant Messaging
2. Setting up XMPP with Pidgin (7:59)
3. Enabling End-to-end Encryption in Pidgin (7:45)
4. Verifying Contacts (5:53)
7. File Management _ File Sharing
1.1 File Sharing _ Handling
1. Introduction (1:00)
2. Clearing Metadata _ Basic File Sharing (11:09)
3. Sharing Files Privately _ Anonymously (6:47)
4. Securely Removing Files (5:58)
5. Securely Wiping _ Encrypting Storage Devices (6:26)
8. Encryption
1. What is Encryption _ Why Its Important (2:38)
1.1 Encryption
2. Introduction to Symmetric _ Asymmetric Encryption (9:02)
3. Generating a PGP Key Pair (7:29)
4. Importing _ Exporting Keys (11:11)
5. Encrypting _ Decrypting Text (7:42)
6. Introduction to Digital Signatures (5:56)
7. Signing Messages _ Verifying Signatures (5:38)
8. Encrypting, Signing, Verifying _ Decrypting Files (10:53)
9. Using Key Servers (9:11)
9. Cryptocurrencies
1. Introduction - Why Use Cryptocurrency (2:50)
1.1 Crypto
2. What is Cryptocurrency _ How It works (7:45)
10. Cryptocurrencies - Bitcoin
1. Installing a Bitcoin Wallet (8:53)
2. Creating a Bitcoin Wallet (7:18)
3. 4 Ways to Anonymously Get Biotcoins (8:38)
4. Using Bitcoin ATMs (8:31)
5. Using P2P Services (13:05)
6. Sending _ Receiving Bitcoins (5:33)
7. Introduction to Mixers Tumblers (7:21)
8. Improve Bitcoin Anonymity Using Mixers (6:11)
11. Cryptocurrencies - Monero
1. Introduction to Monero (7:54)
2. Creating a Monero Wallet (7:35)
3. Restoring Monero Wallet on TAILS (3:40)
4. 4 ways to Anonymously Get Monero (8:55)
5. Crypto-exchanges - Converting One Cryptocurrency to Another (5:11)
6. Using a Crypto Exchanges to Increase Anonymity (8:02)
7. Conclusion (3:09)
12. Qubes OS
1. What is Qubes _ Why Use it (9:11)
1.1 Qubes
2. Installation Options _ Verifying Qubes (11:58)
3. Flashing Qubes to USB (3:21)
4. Preparing Computer For Qubes (7:16)
5. Installing Qubes (9:51)
6. Qubes Basics (10:54)
7. Overview of The Security Domains in Qubes (7:33)
8. Working With Multiple Security Domains Simultaneously (10:18)
9. Handling Files _ Text Across The Different Security Domains (10:32)
10. Installing Software to Specific Domains (12:18)
11. Handling MalwareViruses _ Suspicious Files Securely (10:45)
12. Connecting to TOR From Qubes Using Whonix Gateway (10:01)
13. Installing Software on Whonix (10:34)
Teach online with
9. Configuring TOR Browser For Maximum Security _ Anonymity
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock