Udemy - The Complete Cyber Security Course: Anonymous Browsing
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size2.9 GB
- Uploaded Bypinkihacks
- Downloads1248
- Last checkedJun. 14th '18
- Date uploadedJun. 20th '17
- Seeders 1
- Leechers0
Infohash : AD79F52FDBE5358D736252F12CF012DC0FF38ED1
Udemy - The Complete Cyber Security Course: Anonymous Browsing
Part 3
The Complete Cyber Security Course: Anonymous Browsing!
Source: https://www.udemy.com/the-complete-cyber-security-course-anonymous-browsing/
Learn a practical skill-set in in staying anonymous online and maintaining total privacy against even a well resourced adversary with global influence.
Covering all major platforms including Windows, MacOS, Linux. IOS and Android. Plus Tails, Whonix and others.
Go from beginner to expert in this easy to follow advanced course.
We cover in detail all the best anonymising and privacy methods. Including;
Tor
VPNs - Virtual Private Networks
Proxy servers - HTTP, HTTPS, SOCKs and Web
SSH Secure Shell
Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
OPSEC - Operation Security
I2P - The Invisible Internet Project
JonDoNym
Off site connections - Hotspots and Cafes
Mobile, Cell Phones & Cellular Networks
Bullet proof hosting
and more....
For each of these anonmizying methods we analysis in detail their strengths and weaknesses, we look at the techniques used to attack these anonymity services and what you can do to mitigate those de-anomisation attacks.
Advanced anonymity: We explore chaining and nesting anoymising services together to provide layers of obfuscation for maximum anonymity against even the most well resourced adversaries.
We cover bypassing censors, firewalls and proxies. Learn to bypass the trickiest of censoring devises including DPI (deep packet inspection).
The course covers both the theory and practically how setup every thing we discuss.
This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity.
Files:
3 - Anonymous Browsing 01 Introduction captions- 005 Study Recommendations-EN.srt (8.1 KB)
- 004 Target Audience-EN.srt (3.4 KB)
- 002 Introduction to the Instructor-EN.srt (2.6 KB)
- 006 Course updates-EN.srt (1.0 KB)
- 003 Security Quick Win.mp4 (44.6 MB)
- 005 Study Recommendations.mp4 (20.8 MB)
- 002 Introduction to the Instructor.mp4 (17.1 MB)
- 004 Target Audience.mp4 (8.7 MB)
- 001 Welcome to Volume III.mp4 (3.3 MB)
- 006 Course updates.mp4 (2.6 MB) 02 Goals and Objectives for Volume III
- 007 Goals and Learning Objectives.mp4 (19.6 MB)
- 013 10 Rules of OPSEC.mp4 (185.3 MB)
- 011 Establishing Cover.mp4 (60.0 MB)
- 012 Identify Cross Contamination.mp4 (51.1 MB)
- 016 Case Studies of OPSEC Failures.mp4 (29.6 MB)
- 014 Authorship Recognition and Evasion Methods.mp4 (18.8 MB)
- 010 Identities pseudonyms and aliases Identity Strategies.mp4 (14.5 MB)
- 015 The knock.mp4 (12.9 MB)
- 009 Introduction to OPSEC.mp4 (10.4 MB)
- 008 Goals and Learning Objectives.mp4 (4.2 MB)
- 019 Knoppix Puppy linux Jondo live Tiny core linux Window To Go.mp4 (63.9 MB)
- 020 Tails.mp4 (63.6 MB)
- 018 Introduction to live operating systems.mp4 (46.1 MB)
- 021 Tails Demo.mp4 (44.2 MB)
- 017 Goals and Learning Objectives.mp4 (1.2 MB)
- 028 Setting up an OpenVPN client in Windows Mac iPhone and Android.mp4 (86.8 MB)
- 029 Setting up an OpenVPN client on Linux.mp4 (58.6 MB)
- 032 Setting up an OpenVPN server Part 1 - The fast and easy way.mp4 (55.3 MB)
- 030 Preventing VPN Leaks - Firewalls and kill switches.mp4 (54.6 MB)
- 027 VPNs and Domain Name System DNS Leaks.mp4 (40.1 MB)
- 031 Choosing the right VPN provider.mp4 (37.1 MB)
- 024 Which VPN protocol is best to use and why.mp4 (34.6 MB)
- 026 Can you trust VPN providers.mp4 (33.9 MB)
- 025 VPN Weaknesses.mp4 (30.8 MB)
- 033 Setting up an OpenVPN server Part 2 - Debian client.mp4 (24.1 MB)
- 023 Introduction to VPNs.mp4 (23.8 MB)
- 034 Setting up an OpenVPN server Part 3 - Home VPN.mp4 (18.3 MB)
- 022 Goals and Learning Objectives.mp4 (3.7 MB)
- 046 Conclusions on Tor and mitigation to reduce risk.mp4 (122.6 MB)
- 044 Tor Weaknesses Part 1.mp4 (87.3 MB)
- 037 The Tor Network and Browser.mp4 (56.7 MB)
- 042 Torrc Configuration File.mp4 (46.0 MB)
- 043 Running other applications through Tor.mp4 (33.1 MB)
- 047 Attacking Tor how the NSA targets users online anonymity.mp4 (26.2 MB)
- 038 What should Tor be used for.mp4 (23.3 MB)
- 041 Tor Pluggable Transports and Traffic Obfuscation.mp4 (17.8 MB)
- 036 What is Tor.mp4 (17.6 MB)
- 039 Directory Authorities and Relays.mp4 (16.3 MB)
- 045 Tor Weaknesses Part 2.mp4 (15.1 MB)
- 040 Tor Bridges.mp4 (14.7 MB)
- 049 Finding Tor hidden services.mp4 (9.7 MB)
- 048 Hidden services The Tor darknet.mp4 (7.9 MB)
- 050 Other Tor Apps.mp4 (6.5 MB)
- 035 Goals and Learning Objectives.mp4 (1.8 MB)
- 053 Custom Router Firmware for VPN TOR Tunneling.mp4 (21.4 MB)
- 054 Off the shelf VPN and TOR Routers.mp4 (18.8 MB)
- 056 TOR and VPN Gateway Virtual Machines.mp4 (16.3 MB)
- 052 Introduction to VPN and Tor Routers.mp4 (10.8 MB)
- 055 DIY Hardware TOR Routers.mp4 (7.3 MB)
- 051 Goals and Learning Objectives.mp4 (1.3 MB)
- 058 Proxies HTTP HTTPS and SOCKS Part 1.mp4 (17.1 MB)
- 059 Proxies HTTP HTTPS and SOCKS Part 2.mp4 (16.3 MB)
- 060 CGI proxies - Web proxy or web form proxy.mp4 (9.1 MB)
- 057 Goals and Learning Objectives.mp4 (1.6 MB)
- 066 SSH Public private key authentication.mp4 (21.9 MB)
- 065 SSH Socks5 Proxy Tunneling with Dynamic Ports.mp4 (21.8 MB)
- 063 SSH Remote Port Forwarding.mp4 (18.5 MB)
- 067 SSH Hardening.mp4 (16.2 MB)
- 062 Introduction How to Login.mp4 (11.4 MB)
- 064 SSH Local Port Forwarding.mp4 (8.2 MB)
- 061 Goals and Learning Objectives.mp4 (1.6 MB)
- 070 I2P Installing and Secure Configuration Part 1.mp4 (58.9 MB)
- 071 I2P Installing and Secure Configuration Part 2.mp4 (47.0 MB)
- 069 I2P - Introduction.mp4 (30.3 MB)
- 072 I2P Strengths and Weaknesses.mp4 (10.2 MB)
- 068 Goals and Learning Objectives.mp4 (1.6 MB)
- 076 Bullet Proof Hosting Services BPHS.mp4 (31.1 MB)
- 074 JonDonym - Introduction.mp4 (21.0 MB)
- 077 Botnets and Hacked Boxes.mp4 (18.5 MB)
- 075 JonDonym - Installing and Secure Configuration.mp4 (14.3 MB)
- 073 Goals and Learning Objectives.mp4 (1.4 MB)
- 081 Outbound Bypassing - Tunneling through HTTP proxies.mp4 (31.8 MB)
- 082 Outbound Bypassing - Port Sharing and Knocking.mp4 (20.8 MB)
- 080 Outbound Firewall Bypassing - The Fundamentals Part 2.mp4 (20.1 MB)
- 079 Outbound Firewall Bypassing - The Fundamentals Part 1.mp4 (19.3 MB)
- 083 Outbound Bypassing Cloaking and Obfuscating.mp4 (18.1 MB)
- 085 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login.mp4 (17.0 MB)
- 084 Outbound Bypassing - Remote login - VNC and RDP.mp4 (11.0 MB)
- 078 Goals and Learning Objectives.mp4 (1.4 MB)
- 097 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy.mp4 (50.4 MB)
- 098 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix.mp4 (21.7 MB)
- 088 Strengths and We
Code:
- udp://9.rarbg.me:2710/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://tracker.openbittorrent.com:80/announce
- udp://tracker.leechers-paradise.org:6969/announce