Section 1 : Introduction

Lecture 1 Welcome to Volume III 0:35
Lecture 2 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 3 Security Quick Win 11:24
Lecture 4 Target Audience 1:54
Lecture 5 About Certification Pdf
Lecture 6 About Proctor Testing Pdf
Lecture 7 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 2 : Goals and Objectives for Volume III

Lecture 8 Goals and Learning Objectives 3:39

Section 3 : OPSEC Operational Security

Lecture 9 Goals and Learning Objectives 0:46
Lecture 10 Introduction to OPSEC 3:46
Lecture 11 Identities pseudonyms and aliases Identity Strategies 6:4
Lecture 12 Establishing Cover 9:13
Lecture 13 Identify Cross Contamination 5:57
Lecture 14 10 Rules of OPSEC 13:47
Lecture 15 Authorship Recognition and Evasion Methods 4:6
Lecture 16 The knock 4:49
Lecture 17 Case Studies of OPSEC Failures 7:22

Section 4 : Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu

Lecture 18 Goals and Learning Objectives 0:13
Lecture 19 Introduction to live operating systems 11:36
Lecture 20 Knoppix Puppy linux Jondo live Tiny core linux Window To Go 12:18
Lecture 21 Tails 13:44
Lecture 22 Tails Demo 9:49

Section 5 : Virtual Private Networks VPNs

Lecture 23 Goals and Learning Objectives 0:40
Lecture 24 Introduction to VPNs
Lecture 25 Which VPN protocol is best to use and why 11:44
Lecture 26 VPN Weaknesses 16:33
Lecture 27 Can you trust VPN providers 8:53
Lecture 28 VPNs and Domain Name System DNS Leaks 9:36
Lecture 29 Setting up an OpenVPN client in Windows Mac iPhone and Android 11:57
Lecture 30 Setting up an OpenVPN client on Linux
Lecture 31 Preventing VPN Leaks - Firewalls and kill switches 12:17
Lecture 32 Choosing the right VPN provider 11:43
Lecture 33 Setting up an OpenVPN server Part 1 - The fast and easy way 12:28
Lecture 34 Setting up an OpenVPN server Part 2 - Debian client 7:18
Lecture 35 Setting up an OpenVPN server Part 3 - Home VPN 3:13

Section 6 : Tor

Lecture 36 Goals and Learning Objectives 0:20
Lecture 37 What is Tor 7:36
Lecture 38 The Tor Network and Browser 8:14
Lecture 39 What should Tor be used for 10:37
Lecture 40 Directory Authorities and Relays 7:11
Lecture 41 Tor Bridges 6:19
Lecture 42 Tor Pluggable Transports and Traffic Obfuscation 8:20
Lecture 43 Torrc Configuration File 13:33
Lecture 44 Running other applications through Tor 13:55
Lecture 45 Tor Weaknesses Part 1 14:5
Lecture 46 Tor Weaknesses Part 2 6:55
Lecture 47 Conclusions on Tor and mitigation to reduce risk 4:31
Lecture 48 Attacking Tor how the NSA targets users online anonymity 14:5
Lecture 49 Hidden services The Tor darknet 3:4
Lecture 50 Finding Tor hidden services 2:45
Lecture 51 Other Tor Apps 2:43

Section 7 : VPN and Tor Routers

Lecture 52 Goals and Learning Objectives 0:15
Lecture 53 Introduction to VPN and Tor Routers 6:6
Lecture 54 Custom Router Firmware for VPN TOR Tunneling 6:19
Lecture 55 Off the shelf VPN and TOR Routers 6:57
Lecture 56 DIY Hardware TOR Routers 2:57
Lecture 57 TOR and VPN Gateway Virtual Machines

Section 8 : Proxies HTTP HTTPS SOCKs and Web

Lecture 58 Goals and Learning Objectives 0:18
Lecture 59 Proxies HTTP HTTPS and SOCKS Part 1 9:5
Lecture 60 Proxies HTTP HTTPS and SOCKS Part 2 7:37
Lecture 61 CGI proxies - Web proxy or web form proxy 4:15

Section 9 : SSH Secure Shell

Lecture 62 Goals and Learning Objectives 0:18
Lecture 63 Introduction How to Login 5:23
Lecture 64 SSH Remote Port Forwarding 8:27
Lecture 65 SSH Local Port Forwarding 4:5
Lecture 66 SSH Socks5 Proxy Tunneling with Dynamic Ports 10:20
Lecture 67 SSH Public private key authentication 9:30
Lecture 68 SSH Hardening 4:16

Section 10 : I2P - The Invisible Internet Project

Lecture 69 Goals and Learning Objectives 0:17
Lecture 70 I2P - Introduction 11:29
Lecture 71 I2P Installing and Secure Configuration Part 1 16:55
Lecture 72 I2P Installing and Secure Configuration Part 2 11:15
Lecture 73 I2P Strengths and Weaknesses 4:21

Section 11 : Other Privacy and Anonymising Services

Lecture 74 Goals and Learning Objectives 0:16
Lecture 75 JonDonym - Introduction 8:44
Lecture 76 JonDonym - Installing and Secure Configuration 5:13
Lecture 77 Bullet Proof Hosting Services BPHS 4:14
Lecture 78 Botnets and Hacked Boxes 1:46

Section 12 : Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection

Lecture 79 Goals and Learning Objectives 0:15
Lecture 80 Outbound Firewall Bypassing - The Fundamentals Part 1 10:9
Lecture 81 Outbound Firewall Bypassing - The Fundamentals Part 2 10:45
Lecture 82 Outbound Bypassing - Tunneling through HTTP proxies 15:21
Lecture 83 Outbound Bypassing - Port Sharing and Knocking 7:37
Lecture 84 Outbound Bypassing Cloaking and Obfuscating 7:57
Lecture 85 Outbound Bypassing - Remote login - VNC and RDP 5:34
Lecture 86 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login 7:53

Section 13 : ChainingNesting Privacy and Anonymising Services

Lecture 87 Goals and Learning Objectives 0:27
Lecture 88 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor
Lecture 89 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet 10:39
Lecture 90 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet 10:18
Lecture 91 Nested VPNs - Strength and Weaknesses 8:2
Lecture 92 How to setup nested VPNs 6:16
Lecture 93 How to setup nested SSH 6:28
Lecture 94 How to setup proxy chains 7:14
Lecture 95 How to setup - User - VPN - Tor - Internet 2:9
Lecture 96 How to setup - User - SSH - Tor - Internet 3:46
Lecture 97 How to setup - User - JonDonym - Tor - Internet 1:42
Lecture 98 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy 15:16
Lecture 99 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix 8:3
Lecture 100 Setting up nested services 3 hops 4:58

Section 14 : Off-site Internet Connections - Hotspots and Cafes

Lecture 101 Goals and Learning Objectives 0:21
Lecture 102 Staying safe while on public Wi-Fi hotspots 4:33
Lecture 103 Using Internet Cafes for security, privacy and anonymity safety 9:30
Lecture 104 Using Public Wi-Fi hotspots for security, privacy and anonymity safety 7:39
Lecture 105 Finding public Wi-Fi hotspots
Lecture 106 Boosting Wi-Fi range 12:38
Lecture 107 How are Wi-Fi users geo located 4:50

Section 15 : Mobile Cell Phones Cellular Networks

Lecture 108 Goals and Learning Objectives 0:20
Lecture 109 Cellular Network Weaknesses - The Network Operator 6:3
Lecture 110 Cellular Networks Weaknesses - IMSI catchers 4:49
Lecture 111 Cellular Networks Weaknesses - Signaling System No7 SS7 4:9
Lecture 112 Mobile and Cell Phone Weaknesses 10:29
Lecture 113 How to use a laptop and cellular networks for Internet privacy and anonymity 9:12
Lecture 114 How you are geo located when using a cellular network 4:29