تفاصيل الدورة

Learn a practicalskill-set in staying anonymous online and maintaining total privacy against evena well-resourced adversary with global influence.

Covering all major platforms includingWindows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.

Go from beginnerto expert in this easy to follow advanced course.

We cover in detailall the best anonymising and privacy methods. Including;

  • Tor
  • VPNs - Virtual Private Networks
  • Proxy servers - HTTP, HTTPS, SOCKs and Web
  • SSH Secure Shell
  • Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
  • OPSEC - Operation Security
  • I2P - The Invisible Internet Project
  • JonDoNym
  • Off-site connections - Hotspots and Cafes
  • Mobile, Cell Phones & Cellular Networks
  • Bulletproof hosting 
  • and more....

For each of theseanonymizing methods we analysis in detail their strengths and weaknesses, welook at the techniques used to attack these anonymity services and what you cando to mitigate those de-anonymization attacks.

Advanced anonymity:We explore chaining and nesting anonymizing services together to provide layersof obfuscation for maximum anonymity against even the most well-resourcedadversaries.

We cover bypassingcensors, firewalls, and proxies. Learn to bypass the trickiest of censoringdevices including DPI (deep packet inspection).

The course coversboth the theory and practically how setup everything we discuss.   

This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity.  

تحديث بتاريخ 22 March, 2018
دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على IT, Computing and Technology ابتداءً من الآن. See all courses

قيِم هذه الصفحة