Section 1 : Introduction
|
Lecture 1 | Introduction to Privacy, Anonymity & Security | 00:06:45 Duration |
|
Lecture 2 | Course Breakdown | 00:03:45 Duration |
|
Lecture 3 | Introduction to TOR | 00:06:37 Duration |
|
Lecture 4 | Introduction to Hidden Services Onion Services | 00:03:55 Duration |
|
Lecture 5 | Connecting to TOR | 00:04:46 Duration |
Section 2 : The TOR Browser
|
Lecture 1 | Section Intro & Breakdown | 00:01:49 Duration |
|
Lecture 2 | What is The TOR Browser | 00:04:22 Duration |
|
Lecture 3 | Verifying & Installing TOR Browser on Windows | 00:10:21 Duration |
|
Lecture 4 | Verifying & Installing TOR Browser on Mac OS X | 00:10:44 Duration |
|
Lecture 5 | Verifying & Installing TOR Browser on Linux | 00:11:17 Duration |
|
Lecture 6 | TOR Bridges & Pluggable Transports | 00:06:48 Duration |
|
Lecture 7 | Bypassing TOR Censorship | 00:06:14 Duration |
|
Lecture 8 | Intro to Virtual Private Networks (VPN) & How to Use it with TOR | 00:11:25 Duration |
|
Lecture 9 | Configuring TOR Browser For Maximum Security & Anonymity | 00:07:32 Duration |
|
Lecture 10 | TOR Browser Security Settings & Intro to Information Theory | 00:10:29 Duration |
Section 3 : TAILS - The Amnesic Incognito Live System
|
Lecture 1 | Disadvantages of Using The TOR Browser on Windows, OS X or Linux | 00:03:00 Duration |
|
Lecture 2 | What is TAILS | 00:03:33 Duration |
|
Lecture 3 | TAILS Installation Options | 00:05:02 Duration |
|
Lecture 4 | Installing TAILS From All Operating Systems | 00:08:40 Duration |
|
Lecture 5 | Starting TAILS on All Operating Systems | 00:09:04 Duration |
|
Lecture 6 | TAILS Basics - Part 1 | 00:05:25 Duration |
|
Lecture 7 | TAILS Basics - Part 2 | 00:06:02 Duration |
|
Lecture 8 | What is Persistence & Why We Need it! | 00:05:02 Duration |
|
Lecture 9 | Enabling Encrypted Persistence | 00:12:14 Duration |
|
Lecture 10 | Bypassing Censorship Using Bridges & Plugable Transports | 00:07:12 Duration |
|
Lecture 11 | Using The TOR Browser on Tails | 00:07:14 Duration |
|
Lecture 12 | Connecting to Captive Portals | 00:08:01 Duration |
|
Lecture 13 | Connecting to VPN From TAILS - Method 1 | |
|
Lecture 14 | Connecting to VPN From TAILS - Method 2 | 00:15:45 Duration |
Section 4 : Accessing the Dark Net - Entry Points
|
Lecture 1 | Introduction & Breakdown of Next Sections | |
|
Lecture 2 | Discovering Hidden Services Using Darknet Search Engines | 00:11:03 Duration |
|
Lecture 3 | Discovering Hidden Services Using Listings & Onion Services | 00:06:22 Duration |
Section 5 : Communicating Privately & Anonymously - Using Email
|
Lecture 1 | Creating a Fake Anonymous Identity | |
|
Lecture 2 | Using Temporary Email Accounts | 00:06:11 Duration |
|
Lecture 3 | Using Privacy Focused Email Providers | 00:09:47 Duration |
|
Lecture 4 | Using DarkNet Email Providers | 00:08:58 Duration |
|
Lecture 5 | Picking The Right Email Service | 00:07:22 Duration |
Section 6 : Communicating Privately & Anonymously - Instant Messaging
|
Lecture 1 | Introduction to Jabber XMPP | 00:08:09 Duration |
|
Lecture 2 | Setting up XMPP with Pidgin | 00:07:59 Duration |
|
Lecture 3 | Enabling End-to-end Encryption in Pidgin | 00:07:45 Duration |
|
Lecture 4 | Verifying Contacts |
Section 7 : File Management & File Sharing
|
Lecture 1 | Introduction | 00:01:00 Duration |
|
Lecture 2 | Clearing Metadata & Basic File Sharing | |
|
Lecture 3 | Sharing Files Privately & Anonymously | 00:06:47 Duration |
|
Lecture 4 | Securely Removing Files | 00:05:58 Duration |
|
Lecture 5 | Securely Wiping & Encrypting Storage Devices | 00:06:26 Duration |
Section 8 : Encryption
|
Lecture 1 | What is Encryption & Why Its Important | 00:02:38 Duration |
|
Lecture 2 | Introduction to Symmetric & Asymmetric Encryption | 00:09:02 Duration |
|
Lecture 3 | Generating a PGP Key Pair | 00:07:29 Duration |
|
Lecture 4 | Importing & Exporting Keys | 00:11:11 Duration |
|
Lecture 5 | Encrypting & Decrypting Text | 00:07:42 Duration |
|
Lecture 6 | Introduction to Digital Signatures | 00:05:56 Duration |
|
Lecture 7 | Signing Messages & Verifying Signatures | 00:05:38 Duration |
|
Lecture 8 | Encrypting, Signing, Verifying & Decrypting Files | 00:10:53 Duration |
|
Lecture 9 | Using Key Servers | 00:09:12 Duration |
Section 9 : Cryptocurrencies
|
Lecture 1 | Introduction - Why Use Cryptocurrency | 00:02:50 Duration |
|
Lecture 2 | What is Cryptocurrency & How It works | 00:07:45 Duration |
Section 10 : Cryptocurrencies - Bitcoin
|
Lecture 1 | Installing a Bitcoin Wallet | 00:08:53 Duration |
|
Lecture 2 | Creating a Bitcoin Wallet | 00:07:19 Duration |
|
Lecture 3 | 4 Ways to Anonymously Get Biotcoins | 00:08:39 Duration |
|
Lecture 4 | Using Bitcoin ATMs | 00:08:31 Duration |
|
Lecture 5 | Using P2P Services | 00:13:05 Duration |
|
Lecture 6 | Sending & Receiving Bitcoins | 00:05:34 Duration |
|
Lecture 7 | Introduction to Mixers Tumblers | 00:07:21 Duration |
|
Lecture 8 | Improve Bitcoin Anonymity Using Mixers | 00:06:12 Duration |
Section 11 : Cryptocurrencies - Monero
|
Lecture 1 | Introduction to Monero | 00:07:54 Duration |
|
Lecture 2 | Creating a Monero Wallet | 00:07:35 Duration |
|
Lecture 3 | Restoring Monero Wallet on TAILS | 00:03:41 Duration |
|
Lecture 4 | 4 ways to Anonymously Get Monero | 00:08:55 Duration |
|
Lecture 5 | Crypto-exchanges - Converting One Cryptocurrency to Another | 00:05:11 Duration |
|
Lecture 6 | Using a Crypto Exchanges to Increase Anonymity | 00:08:02 Duration |
|
Lecture 7 | Conclusion | 00:03:10 Duration |
Section 12 : Qubes OS
|
Lecture 1 | What is Qubes & Why Use it | 00:09:11 Duration |
|
Lecture 2 | Installation Options & Verifying Qubes | 00:11:59 Duration |
|
Lecture 3 | Flashing Qubes to USB | 00:03:22 Duration |
|
Lecture 4 | Preparing Computer For Qubes | 00:07:16 Duration |
|
Lecture 5 | Installing Qubes | 00:09:51 Duration |
|
Lecture 6 | Qubes Basics | 00:10:54 Duration |
|
Lecture 7 | Overview of The Security Domains in Qubes | 00:07:33 Duration |
|
Lecture 8 | Working With Multiple Security Domains Simultaneously | 00:10:18 Duration |
|
Lecture 9 | Handling Files & Text Across The Different Security Domains | 00:10:32 Duration |
|
Lecture 10 | Installing Software to Specific Domains | 00:12:18 Duration |
|
Lecture 11 | Handling MalwareViruses & Suspicious Files Securely | 00:10:46 Duration |
|
Lecture 12 | Connecting to TOR From Qubes Using Whonix Gateway | 00:10:01 Duration |
|
Lecture 13 | Installing Software on Whonix | 00:10:35 Duration |