Section 1 : Introduction

Lecture 1 Welcome to Volume III 00:00:35 Duration
Lecture 2 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 3 Security Quick Win 00:11:24 Duration
Lecture 4 Target Audience 00:01:54 Duration
Lecture 5 About Certification
Lecture 6 About Proctor Testing
Lecture 7 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM

Section 2 : Goals and Objectives for Volume III

Lecture 1 Goals and Learning Objectives 00:03:39 Duration

Section 3 : OPSEC Operational Security

Lecture 1 Goals and Learning Objectives 00:00:46 Duration
Lecture 2 Introduction to OPSEC 00:03:46 Duration
Lecture 3 Identities pseudonyms and aliases Identity Strategies 00:06:04 Duration
Lecture 4 Establishing Cover 00:09:13 Duration
Lecture 5 Identify Cross Contamination 00:05:57 Duration
Lecture 6 10 Rules of OPSEC 00:13:47 Duration
Lecture 7 Authorship Recognition and Evasion Methods 00:04:06 Duration
Lecture 8 The knock 00:04:49 Duration
Lecture 9 Case Studies of OPSEC Failures 00:07:22 Duration

Section 4 : Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu

Lecture 1 Goals and Learning Objectives 00:00:13 Duration
Lecture 2 Introduction to live operating systems 00:11:36 Duration
Lecture 3 Knoppix Puppy linux Jondo live Tiny core linux Window To Go 00:12:18 Duration
Lecture 4 Tails 00:13:44 Duration
Lecture 5 Tails Demo 00:09:49 Duration

Section 5 : Virtual Private Networks VPNs

Lecture 1 Goals and Learning Objectives 00:00:40 Duration
Lecture 2 Introduction to VPNs
Lecture 3 Which VPN protocol is best to use and why 00:11:44 Duration
Lecture 4 VPN Weaknesses 00:16:33 Duration
Lecture 5 Can you trust VPN providers 00:08:53 Duration
Lecture 6 VPNs and Domain Name System DNS Leaks 00:09:36 Duration
Lecture 7 Setting up an OpenVPN client in Windows Mac iPhone and Android 00:11:57 Duration
Lecture 8 Setting up an OpenVPN client on Linux
Lecture 9 Preventing VPN Leaks - Firewalls and kill switches 00:12:17 Duration
Lecture 10 Choosing the right VPN provider 00:11:43 Duration
Lecture 11 Setting up an OpenVPN server Part 1 - The fast and easy way 00:12:28 Duration
Lecture 12 Setting up an OpenVPN server Part 2 - Debian client 00:07:18 Duration
Lecture 13 Setting up an OpenVPN server Part 3 - Home VPN 00:03:13 Duration

Section 6 : Tor

Lecture 1 Goals and Learning Objectives 00:00:20 Duration
Lecture 2 What is Tor 00:07:36 Duration
Lecture 3 The Tor Network and Browser 00:08:14 Duration
Lecture 4 What should Tor be used for 00:10:37 Duration
Lecture 5 Directory Authorities and Relays 00:07:11 Duration
Lecture 6 Tor Bridges 00:06:19 Duration
Lecture 7 Tor Pluggable Transports and Traffic Obfuscation 00:08:20 Duration
Lecture 8 Torrc Configuration File 00:13:33 Duration
Lecture 9 Running other applications through Tor 00:13:55 Duration
Lecture 10 Tor Weaknesses Part 1 00:14:05 Duration
Lecture 11 Tor Weaknesses Part 2 00:06:55 Duration
Lecture 12 Conclusions on Tor and mitigation to reduce risk 00:04:31 Duration
Lecture 13 Attacking Tor how the NSA targets users online anonymity 00:14:05 Duration
Lecture 14 Hidden services The Tor darknet 00:03:04 Duration
Lecture 15 Finding Tor hidden services 00:02:45 Duration
Lecture 16 Other Tor Apps 00:02:43 Duration

Section 7 : VPN and Tor Routers

Lecture 1 Goals and Learning Objectives 00:00:15 Duration
Lecture 2 Introduction to VPN and Tor Routers 00:06:06 Duration
Lecture 3 Custom Router Firmware for VPN TOR Tunneling 00:06:19 Duration
Lecture 4 Off the shelf VPN and TOR Routers 00:06:57 Duration
Lecture 5 DIY Hardware TOR Routers 00:02:57 Duration
Lecture 6 TOR and VPN Gateway Virtual Machines

Section 8 : Proxies HTTP HTTPS SOCKs and Web

Lecture 1 Goals and Learning Objectives 00:00:18 Duration
Lecture 2 Proxies HTTP HTTPS and SOCKS Part 1 00:09:05 Duration
Lecture 3 Proxies HTTP HTTPS and SOCKS Part 2 00:07:37 Duration
Lecture 4 CGI proxies - Web proxy or web form proxy 00:04:15 Duration

Section 9 : SSH Secure Shell

Lecture 1 Goals and Learning Objectives 00:00:18 Duration
Lecture 2 Introduction How to Login 00:05:23 Duration
Lecture 3 SSH Remote Port Forwarding 00:08:27 Duration
Lecture 4 SSH Local Port Forwarding 00:04:05 Duration
Lecture 5 SSH Socks5 Proxy Tunneling with Dynamic Ports 00:10:20 Duration
Lecture 6 SSH Public private key authentication 00:09:30 Duration
Lecture 7 SSH Hardening 00:04:16 Duration

Section 10 : I2P - The Invisible Internet Project

Lecture 1 Goals and Learning Objectives 00:00:17 Duration
Lecture 2 I2P - Introduction 00:11:29 Duration
Lecture 3 I2P Installing and Secure Configuration Part 1 00:16:55 Duration
Lecture 4 I2P Installing and Secure Configuration Part 2 00:11:15 Duration
Lecture 5 I2P Strengths and Weaknesses 00:04:21 Duration

Section 11 : Other Privacy and Anonymising Services

Lecture 1 Goals and Learning Objectives 00:00:16 Duration
Lecture 2 JonDonym - Introduction 00:08:44 Duration
Lecture 3 JonDonym - Installing and Secure Configuration 00:05:13 Duration
Lecture 4 Bullet Proof Hosting Services BPHS 00:04:14 Duration
Lecture 5 Botnets and Hacked Boxes 00:01:46 Duration

Section 12 : Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection

Lecture 1 Goals and Learning Objectives 00:00:15 Duration
Lecture 2 Outbound Firewall Bypassing - The Fundamentals Part 1 00:10:09 Duration
Lecture 3 Outbound Firewall Bypassing - The Fundamentals Part 2 00:10:45 Duration
Lecture 4 Outbound Bypassing - Tunneling through HTTP proxies 00:15:21 Duration
Lecture 5 Outbound Bypassing - Port Sharing and Knocking 00:07:37 Duration
Lecture 6 Outbound Bypassing Cloaking and Obfuscating 00:07:57 Duration
Lecture 7 Outbound Bypassing - Remote login - VNC and RDP 00:05:34 Duration
Lecture 8 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login 00:07:53 Duration

Section 13 : ChainingNesting Privacy and Anonymising Services

Lecture 1 Goals and Learning Objectives 00:00:27 Duration
Lecture 2 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor
Lecture 3 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet 00:10:39 Duration
Lecture 4 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet 00:10:18 Duration
Lecture 5 Nested VPNs - Strength and Weaknesses 00:08:02 Duration
Lecture 6 How to setup nested VPNs 00:06:16 Duration
Lecture 7 How to setup nested SSH 00:06:28 Duration
Lecture 8 How to setup proxy chains 00:07:14 Duration
Lecture 9 How to setup - User - VPN - Tor - Internet 00:02:09 Duration
Lecture 10 How to setup - User - SSH - Tor - Internet 00:03:46 Duration
Lecture 11 How to setup - User - JonDonym - Tor - Internet 00:01:42 Duration
Lecture 12 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy 00:15:16 Duration
Lecture 13 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix 00:08:03 Duration
Lecture 14 Setting up nested services 3 hops 00:04:58 Duration

Section 14 : Off-site Internet Connections - Hotspots and Cafes

Lecture 1 Goals and Learning Objectives 00:00:21 Duration
Lecture 2 Staying safe while on public Wi-Fi hotspots 00:04:33 Duration
Lecture 3 Using Internet Cafes for security, privacy and anonymity safety 00:09:30 Duration
Lecture 4 Using Public Wi-Fi hotspots for security, privacy and anonymity safety 00:07:39 Duration
Lecture 5 Finding public Wi-Fi hotspots
Lecture 6 Boosting Wi-Fi range 00:12:38 Duration
Lecture 7 How are Wi-Fi users geo located 00:04:50 Duration

Section 15 : Mobile Cell Phones Cellular Networks

Lecture 1 Goals and Learning Objectives 00:00:20 Duration
Lecture 2 Cellular Network Weaknesses - The Network Operator 00:06:03 Duration
Lecture 3 Cellular Networks Weaknesses - IMSI catchers 00:04:49 Duration
Lecture 4 Cellular Networks Weaknesses - Signaling System No7 SS7 00:04:09 Duration
Lecture 5 Mobile and Cell Phone Weaknesses 00:10:29 Duration
Lecture 6 How to use a laptop and cellular networks for Internet privacy and anonymity 00:09:12 Duration
Lecture 7 How you are geo located when using a cellular network 00:04:29 Duration