Section 1 : Introduction

Lecture 1 Introduction to Privacy, Anonymity & Security 6:45
Lecture 2 Course Breakdown 3:45
Lecture 3 Introduction to TOR 6:37
Lecture 4 Introduction to Hidden Services Onion Services 3:55
Lecture 5 Connecting to TOR 4:46

Section 2 : The TOR Browser

Lecture 6 Section Intro & Breakdown 1:49
Lecture 7 What is The TOR Browser 4:22
Lecture 8 Verifying & Installing TOR Browser on Windows 10:21
Lecture 9 Verifying & Installing TOR Browser on Mac OS X 10:44
Lecture 10 Verifying & Installing TOR Browser on Linux 11:17
Lecture 11 TOR Bridges & Pluggable Transports 6:48
Lecture 12 Bypassing TOR Censorship 6:14
Lecture 13 Intro to Virtual Private Networks (VPN) & How to Use it with TOR 11:25
Lecture 14 Configuring TOR Browser For Maximum Security & Anonymity 7:32
Lecture 15 TOR Browser Security Settings & Intro to Information Theory 10:29

Section 3 : TAILS - The Amnesic Incognito Live System

Lecture 16 Disadvantages of Using The TOR Browser on Windows, OS X or Linux 3:0
Lecture 17 What is TAILS 3:33
Lecture 18 TAILS Installation Options 5:2
Lecture 19 Installing TAILS From All Operating Systems 8:40
Lecture 20 Starting TAILS on All Operating Systems 9:4
Lecture 21 TAILS Basics - Part 1 5:25
Lecture 22 TAILS Basics - Part 2 6:2
Lecture 23 What is Persistence & Why We Need it! 5:2
Lecture 24 Enabling Encrypted Persistence 12:14
Lecture 25 Bypassing Censorship Using Bridges & Plugable Transports 7:12
Lecture 26 Using The TOR Browser on Tails 7:14
Lecture 27 Connecting to Captive Portals 8:1
Lecture 28 Connecting to VPN From TAILS - Method 1
Lecture 29 Connecting to VPN From TAILS - Method 2 15:45

Section 4 : Accessing the Dark Net - Entry Points

Lecture 30 Introduction & Breakdown of Next Sections
Lecture 31 Discovering Hidden Services Using Darknet Search Engines 11:3
Lecture 32 Discovering Hidden Services Using Listings & Onion Services 6:22

Section 5 : Communicating Privately & Anonymously - Using Email

Lecture 33 Creating a Fake Anonymous Identity
Lecture 34 Using Temporary Email Accounts 6:11
Lecture 35 Using Privacy Focused Email Providers 9:47
Lecture 36 Using DarkNet Email Providers 8:58
Lecture 37 Picking The Right Email Service 7:22

Section 6 : Communicating Privately & Anonymously - Instant Messaging

Lecture 38 Introduction to Jabber XMPP 8:9
Lecture 39 Setting up XMPP with Pidgin 7:59
Lecture 40 Enabling End-to-end Encryption in Pidgin 7:45
Lecture 41 Verifying Contacts

Section 7 : File Management & File Sharing

Lecture 42 Introduction 1:0
Lecture 43 Clearing Metadata & Basic File Sharing
Lecture 44 Sharing Files Privately & Anonymously 6:47
Lecture 45 Securely Removing Files 5:58
Lecture 46 Securely Wiping & Encrypting Storage Devices 6:26

Section 8 : Encryption

Lecture 47 What is Encryption & Why Its Important 2:38
Lecture 48 Introduction to Symmetric & Asymmetric Encryption 9:2
Lecture 49 Generating a PGP Key Pair 7:29
Lecture 50 Importing & Exporting Keys 11:11
Lecture 51 Encrypting & Decrypting Text 7:42
Lecture 52 Introduction to Digital Signatures 5:56
Lecture 53 Signing Messages & Verifying Signatures 5:38
Lecture 54 Encrypting, Signing, Verifying & Decrypting Files 10:53
Lecture 55 Using Key Servers 9:12

Section 9 : Cryptocurrencies

Lecture 56 Introduction - Why Use Cryptocurrency 2:50
Lecture 57 What is Cryptocurrency & How It works 7:45

Section 10 : Cryptocurrencies - Bitcoin

Lecture 58 Installing a Bitcoin Wallet 8:53
Lecture 59 Creating a Bitcoin Wallet 7:19
Lecture 60 4 Ways to Anonymously Get Biotcoins 8:39
Lecture 61 Using Bitcoin ATMs 8:31
Lecture 62 Using P2P Services 13:5
Lecture 63 Sending & Receiving Bitcoins 5:34
Lecture 64 Introduction to Mixers Tumblers 7:21
Lecture 65 Improve Bitcoin Anonymity Using Mixers 6:12

Section 11 : Cryptocurrencies - Monero

Lecture 66 Introduction to Monero 7:54
Lecture 67 Creating a Monero Wallet 7:35
Lecture 68 Restoring Monero Wallet on TAILS 3:41
Lecture 69 4 ways to Anonymously Get Monero 8:55
Lecture 70 Crypto-exchanges - Converting One Cryptocurrency to Another 5:11
Lecture 71 Using a Crypto Exchanges to Increase Anonymity 8:2
Lecture 72 Conclusion 3:10

Section 12 : Qubes OS

Lecture 73 What is Qubes & Why Use it 9:11
Lecture 74 Installation Options & Verifying Qubes 11:59
Lecture 75 Flashing Qubes to USB 3:22
Lecture 76 Preparing Computer For Qubes 7:16
Lecture 77 Installing Qubes 9:51
Lecture 78 Qubes Basics 10:54
Lecture 79 Overview of The Security Domains in Qubes 7:33
Lecture 80 Working With Multiple Security Domains Simultaneously 10:18
Lecture 81 Handling Files & Text Across The Different Security Domains 10:32
Lecture 82 Installing Software to Specific Domains 12:18
Lecture 83 Handling MalwareViruses & Suspicious Files Securely 10:46
Lecture 84 Connecting to TOR From Qubes Using Whonix Gateway 10:1
Lecture 85 Installing Software on Whonix 10:35