Section 1 : Introduction

Lecture 1 Introduction to Privacy, Anonymity & Security 00:06:45 Duration
Lecture 2 Course Breakdown 00:03:45 Duration
Lecture 3 Introduction to TOR 00:06:37 Duration
Lecture 4 Introduction to Hidden Services Onion Services 00:03:55 Duration
Lecture 5 Connecting to TOR 00:04:46 Duration

Section 2 : The TOR Browser

Lecture 1 Section Intro & Breakdown 00:01:49 Duration
Lecture 2 What is The TOR Browser 00:04:22 Duration
Lecture 3 Verifying & Installing TOR Browser on Windows 00:10:21 Duration
Lecture 4 Verifying & Installing TOR Browser on Mac OS X 00:10:44 Duration
Lecture 5 Verifying & Installing TOR Browser on Linux 00:11:17 Duration
Lecture 6 TOR Bridges & Pluggable Transports 00:06:48 Duration
Lecture 7 Bypassing TOR Censorship 00:06:14 Duration
Lecture 8 Intro to Virtual Private Networks (VPN) & How to Use it with TOR 00:11:25 Duration
Lecture 9 Configuring TOR Browser For Maximum Security & Anonymity 00:07:32 Duration
Lecture 10 TOR Browser Security Settings & Intro to Information Theory 00:10:29 Duration

Section 3 : TAILS - The Amnesic Incognito Live System

Lecture 1 Disadvantages of Using The TOR Browser on Windows, OS X or Linux 00:03:00 Duration
Lecture 2 What is TAILS 00:03:33 Duration
Lecture 3 TAILS Installation Options 00:05:02 Duration
Lecture 4 Installing TAILS From All Operating Systems 00:08:40 Duration
Lecture 5 Starting TAILS on All Operating Systems 00:09:04 Duration
Lecture 6 TAILS Basics - Part 1 00:05:25 Duration
Lecture 7 TAILS Basics - Part 2 00:06:02 Duration
Lecture 8 What is Persistence & Why We Need it! 00:05:02 Duration
Lecture 9 Enabling Encrypted Persistence 00:12:14 Duration
Lecture 10 Bypassing Censorship Using Bridges & Plugable Transports 00:07:12 Duration
Lecture 11 Using The TOR Browser on Tails 00:07:14 Duration
Lecture 12 Connecting to Captive Portals 00:08:01 Duration
Lecture 13 Connecting to VPN From TAILS - Method 1
Lecture 14 Connecting to VPN From TAILS - Method 2 00:15:45 Duration

Section 4 : Accessing the Dark Net - Entry Points

Lecture 1 Introduction & Breakdown of Next Sections
Lecture 2 Discovering Hidden Services Using Darknet Search Engines 00:11:03 Duration
Lecture 3 Discovering Hidden Services Using Listings & Onion Services 00:06:22 Duration

Section 5 : Communicating Privately & Anonymously - Using Email

Lecture 1 Creating a Fake Anonymous Identity
Lecture 2 Using Temporary Email Accounts 00:06:11 Duration
Lecture 3 Using Privacy Focused Email Providers 00:09:47 Duration
Lecture 4 Using DarkNet Email Providers 00:08:58 Duration
Lecture 5 Picking The Right Email Service 00:07:22 Duration

Section 6 : Communicating Privately & Anonymously - Instant Messaging

Lecture 1 Introduction to Jabber XMPP 00:08:09 Duration
Lecture 2 Setting up XMPP with Pidgin 00:07:59 Duration
Lecture 3 Enabling End-to-end Encryption in Pidgin 00:07:45 Duration
Lecture 4 Verifying Contacts

Section 7 : File Management & File Sharing

Lecture 1 Introduction 00:01:00 Duration
Lecture 2 Clearing Metadata & Basic File Sharing
Lecture 3 Sharing Files Privately & Anonymously 00:06:47 Duration
Lecture 4 Securely Removing Files 00:05:58 Duration
Lecture 5 Securely Wiping & Encrypting Storage Devices 00:06:26 Duration

Section 8 : Encryption

Lecture 1 What is Encryption & Why Its Important 00:02:38 Duration
Lecture 2 Introduction to Symmetric & Asymmetric Encryption 00:09:02 Duration
Lecture 3 Generating a PGP Key Pair 00:07:29 Duration
Lecture 4 Importing & Exporting Keys 00:11:11 Duration
Lecture 5 Encrypting & Decrypting Text 00:07:42 Duration
Lecture 6 Introduction to Digital Signatures 00:05:56 Duration
Lecture 7 Signing Messages & Verifying Signatures 00:05:38 Duration
Lecture 8 Encrypting, Signing, Verifying & Decrypting Files 00:10:53 Duration
Lecture 9 Using Key Servers 00:09:12 Duration

Section 9 : Cryptocurrencies

Lecture 1 Introduction - Why Use Cryptocurrency 00:02:50 Duration
Lecture 2 What is Cryptocurrency & How It works 00:07:45 Duration

Section 10 : Cryptocurrencies - Bitcoin

Lecture 1 Installing a Bitcoin Wallet 00:08:53 Duration
Lecture 2 Creating a Bitcoin Wallet 00:07:19 Duration
Lecture 3 4 Ways to Anonymously Get Biotcoins 00:08:39 Duration
Lecture 4 Using Bitcoin ATMs 00:08:31 Duration
Lecture 5 Using P2P Services 00:13:05 Duration
Lecture 6 Sending & Receiving Bitcoins 00:05:34 Duration
Lecture 7 Introduction to Mixers Tumblers 00:07:21 Duration
Lecture 8 Improve Bitcoin Anonymity Using Mixers 00:06:12 Duration

Section 11 : Cryptocurrencies - Monero

Lecture 1 Introduction to Monero 00:07:54 Duration
Lecture 2 Creating a Monero Wallet 00:07:35 Duration
Lecture 3 Restoring Monero Wallet on TAILS 00:03:41 Duration
Lecture 4 4 ways to Anonymously Get Monero 00:08:55 Duration
Lecture 5 Crypto-exchanges - Converting One Cryptocurrency to Another 00:05:11 Duration
Lecture 6 Using a Crypto Exchanges to Increase Anonymity 00:08:02 Duration
Lecture 7 Conclusion 00:03:10 Duration

Section 12 : Qubes OS

Lecture 1 What is Qubes & Why Use it 00:09:11 Duration
Lecture 2 Installation Options & Verifying Qubes 00:11:59 Duration
Lecture 3 Flashing Qubes to USB 00:03:22 Duration
Lecture 4 Preparing Computer For Qubes 00:07:16 Duration
Lecture 5 Installing Qubes 00:09:51 Duration
Lecture 6 Qubes Basics 00:10:54 Duration
Lecture 7 Overview of The Security Domains in Qubes 00:07:33 Duration
Lecture 8 Working With Multiple Security Domains Simultaneously 00:10:18 Duration
Lecture 9 Handling Files & Text Across The Different Security Domains 00:10:32 Duration
Lecture 10 Installing Software to Specific Domains 00:12:18 Duration
Lecture 11 Handling MalwareViruses & Suspicious Files Securely 00:10:46 Duration
Lecture 12 Connecting to TOR From Qubes Using Whonix Gateway 00:10:01 Duration
Lecture 13 Installing Software on Whonix 00:10:35 Duration