Section 1 : Introduction
|
Lecture 1 | Welcome to Volume III | 00:00:35 Duration |
|
Lecture 2 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 3 | Security Quick Win | 00:11:24 Duration |
|
Lecture 4 | Target Audience | 00:01:54 Duration |
|
Lecture 5 | About Certification | |
|
Lecture 6 | About Proctor Testing | |
|
Lecture 7 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM |
Section 2 : Goals and Objectives for Volume III
|
Lecture 1 | Goals and Learning Objectives | 00:03:39 Duration |
Section 3 : OPSEC Operational Security
|
Lecture 1 | Goals and Learning Objectives | 00:00:46 Duration |
|
Lecture 2 | Introduction to OPSEC | 00:03:46 Duration |
|
Lecture 3 | Identities pseudonyms and aliases Identity Strategies | 00:06:04 Duration |
|
Lecture 4 | Establishing Cover | 00:09:13 Duration |
|
Lecture 5 | Identify Cross Contamination | 00:05:57 Duration |
|
Lecture 6 | 10 Rules of OPSEC | 00:13:47 Duration |
|
Lecture 7 | Authorship Recognition and Evasion Methods | 00:04:06 Duration |
|
Lecture 8 | The knock | 00:04:49 Duration |
|
Lecture 9 | Case Studies of OPSEC Failures | 00:07:22 Duration |
Section 4 : Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu
|
Lecture 1 | Goals and Learning Objectives | 00:00:13 Duration |
|
Lecture 2 | Introduction to live operating systems | 00:11:36 Duration |
|
Lecture 3 | Knoppix Puppy linux Jondo live Tiny core linux Window To Go | 00:12:18 Duration |
|
Lecture 4 | Tails | 00:13:44 Duration |
|
Lecture 5 | Tails Demo | 00:09:49 Duration |
Section 5 : Virtual Private Networks VPNs
|
Lecture 1 | Goals and Learning Objectives | 00:00:40 Duration |
|
Lecture 2 | Introduction to VPNs | |
|
Lecture 3 | Which VPN protocol is best to use and why | 00:11:44 Duration |
|
Lecture 4 | VPN Weaknesses | 00:16:33 Duration |
|
Lecture 5 | Can you trust VPN providers | 00:08:53 Duration |
|
Lecture 6 | VPNs and Domain Name System DNS Leaks | 00:09:36 Duration |
|
Lecture 7 | Setting up an OpenVPN client in Windows Mac iPhone and Android | 00:11:57 Duration |
|
Lecture 8 | Setting up an OpenVPN client on Linux | |
|
Lecture 9 | Preventing VPN Leaks - Firewalls and kill switches | 00:12:17 Duration |
|
Lecture 10 | Choosing the right VPN provider | 00:11:43 Duration |
|
Lecture 11 | Setting up an OpenVPN server Part 1 - The fast and easy way | 00:12:28 Duration |
|
Lecture 12 | Setting up an OpenVPN server Part 2 - Debian client | 00:07:18 Duration |
|
Lecture 13 | Setting up an OpenVPN server Part 3 - Home VPN | 00:03:13 Duration |
Section 6 : Tor
|
Lecture 1 | Goals and Learning Objectives | 00:00:20 Duration |
|
Lecture 2 | What is Tor | 00:07:36 Duration |
|
Lecture 3 | The Tor Network and Browser | 00:08:14 Duration |
|
Lecture 4 | What should Tor be used for | 00:10:37 Duration |
|
Lecture 5 | Directory Authorities and Relays | 00:07:11 Duration |
|
Lecture 6 | Tor Bridges | 00:06:19 Duration |
|
Lecture 7 | Tor Pluggable Transports and Traffic Obfuscation | 00:08:20 Duration |
|
Lecture 8 | Torrc Configuration File | 00:13:33 Duration |
|
Lecture 9 | Running other applications through Tor | 00:13:55 Duration |
|
Lecture 10 | Tor Weaknesses Part 1 | 00:14:05 Duration |
|
Lecture 11 | Tor Weaknesses Part 2 | 00:06:55 Duration |
|
Lecture 12 | Conclusions on Tor and mitigation to reduce risk | 00:04:31 Duration |
|
Lecture 13 | Attacking Tor how the NSA targets users online anonymity | 00:14:05 Duration |
|
Lecture 14 | Hidden services The Tor darknet | 00:03:04 Duration |
|
Lecture 15 | Finding Tor hidden services | 00:02:45 Duration |
|
Lecture 16 | Other Tor Apps | 00:02:43 Duration |
Section 7 : VPN and Tor Routers
|
Lecture 1 | Goals and Learning Objectives | 00:00:15 Duration |
|
Lecture 2 | Introduction to VPN and Tor Routers | 00:06:06 Duration |
|
Lecture 3 | Custom Router Firmware for VPN TOR Tunneling | 00:06:19 Duration |
|
Lecture 4 | Off the shelf VPN and TOR Routers | 00:06:57 Duration |
|
Lecture 5 | DIY Hardware TOR Routers | 00:02:57 Duration |
|
Lecture 6 | TOR and VPN Gateway Virtual Machines |
Section 8 : Proxies HTTP HTTPS SOCKs and Web
|
Lecture 1 | Goals and Learning Objectives | 00:00:18 Duration |
|
Lecture 2 | Proxies HTTP HTTPS and SOCKS Part 1 | 00:09:05 Duration |
|
Lecture 3 | Proxies HTTP HTTPS and SOCKS Part 2 | 00:07:37 Duration |
|
Lecture 4 | CGI proxies - Web proxy or web form proxy | 00:04:15 Duration |
Section 9 : SSH Secure Shell
|
Lecture 1 | Goals and Learning Objectives | 00:00:18 Duration |
|
Lecture 2 | Introduction How to Login | 00:05:23 Duration |
|
Lecture 3 | SSH Remote Port Forwarding | 00:08:27 Duration |
|
Lecture 4 | SSH Local Port Forwarding | 00:04:05 Duration |
|
Lecture 5 | SSH Socks5 Proxy Tunneling with Dynamic Ports | 00:10:20 Duration |
|
Lecture 6 | SSH Public private key authentication | 00:09:30 Duration |
|
Lecture 7 | SSH Hardening | 00:04:16 Duration |
Section 10 : I2P - The Invisible Internet Project
|
Lecture 1 | Goals and Learning Objectives | 00:00:17 Duration |
|
Lecture 2 | I2P - Introduction | 00:11:29 Duration |
|
Lecture 3 | I2P Installing and Secure Configuration Part 1 | 00:16:55 Duration |
|
Lecture 4 | I2P Installing and Secure Configuration Part 2 | 00:11:15 Duration |
|
Lecture 5 | I2P Strengths and Weaknesses | 00:04:21 Duration |
Section 11 : Other Privacy and Anonymising Services
|
Lecture 1 | Goals and Learning Objectives | 00:00:16 Duration |
|
Lecture 2 | JonDonym - Introduction | 00:08:44 Duration |
|
Lecture 3 | JonDonym - Installing and Secure Configuration | 00:05:13 Duration |
|
Lecture 4 | Bullet Proof Hosting Services BPHS | 00:04:14 Duration |
|
Lecture 5 | Botnets and Hacked Boxes | 00:01:46 Duration |
Section 12 : Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection
|
Lecture 1 | Goals and Learning Objectives | 00:00:15 Duration |
|
Lecture 2 | Outbound Firewall Bypassing - The Fundamentals Part 1 | 00:10:09 Duration |
|
Lecture 3 | Outbound Firewall Bypassing - The Fundamentals Part 2 | 00:10:45 Duration |
|
Lecture 4 | Outbound Bypassing - Tunneling through HTTP proxies | 00:15:21 Duration |
|
Lecture 5 | Outbound Bypassing - Port Sharing and Knocking | 00:07:37 Duration |
|
Lecture 6 | Outbound Bypassing Cloaking and Obfuscating | 00:07:57 Duration |
|
Lecture 7 | Outbound Bypassing - Remote login - VNC and RDP | 00:05:34 Duration |
|
Lecture 8 | Inbound Bypassing - Reverse shells SSH remote tunneling and remote login | 00:07:53 Duration |
Section 13 : ChainingNesting Privacy and Anonymising Services
Section 14 : Off-site Internet Connections - Hotspots and Cafes
|
Lecture 1 | Goals and Learning Objectives | 00:00:21 Duration |
|
Lecture 2 | Staying safe while on public Wi-Fi hotspots | 00:04:33 Duration |
|
Lecture 3 | Using Internet Cafes for security, privacy and anonymity safety | 00:09:30 Duration |
|
Lecture 4 | Using Public Wi-Fi hotspots for security, privacy and anonymity safety | 00:07:39 Duration |
|
Lecture 5 | Finding public Wi-Fi hotspots | |
|
Lecture 6 | Boosting Wi-Fi range | 00:12:38 Duration |
|
Lecture 7 | How are Wi-Fi users geo located | 00:04:50 Duration |
Section 15 : Mobile Cell Phones Cellular Networks
|
Lecture 1 | Goals and Learning Objectives | 00:00:20 Duration |
|
Lecture 2 | Cellular Network Weaknesses - The Network Operator | 00:06:03 Duration |
|
Lecture 3 | Cellular Networks Weaknesses - IMSI catchers | 00:04:49 Duration |
|
Lecture 4 | Cellular Networks Weaknesses - Signaling System No7 SS7 | 00:04:09 Duration |
|
Lecture 5 | Mobile and Cell Phone Weaknesses | 00:10:29 Duration |
|
Lecture 6 | How to use a laptop and cellular networks for Internet privacy and anonymity | 00:09:12 Duration |
|
Lecture 7 | How you are geo located when using a cellular network | 00:04:29 Duration |