Udemy The Complete Cyber Security Course : Anonymous Browsing! Udemy
Price: AED 441

    Course details

    Learn a practicalskill-set in staying anonymous online and maintaining total privacy against evena well-resourced adversary with global influence.

    Covering all major platforms includingWindows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.

    Go from beginnerto expert in this easy to follow advanced course.

    We cover in detailall the best anonymising and privacy methods. Including;

    • Tor
    • VPNs - Virtual Private Networks
    • Proxy servers - HTTP, HTTPS, SOCKs and Web
    • SSH Secure Shell
    • Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
    • OPSEC - Operation Security
    • I2P - The Invisible Internet Project
    • JonDoNym
    • Off-site connections - Hotspots and Cafes
    • Mobile, Cell Phones & Cellular Networks
    • Bulletproof hosting 
    • and more....

    For each of theseanonymizing methods we analysis in detail their strengths and weaknesses, welook at the techniques used to attack these anonymity services and what you cando to mitigate those de-anonymization attacks.

    Advanced anonymity:We explore chaining and nesting anonymizing services together to provide layersof obfuscation for maximum anonymity against even the most well-resourcedadversaries.

    We cover bypassingcensors, firewalls, and proxies. Learn to bypass the trickiest of censoringdevices including DPI (deep packet inspection).

    The course coversboth the theory and practically how setup everything we discuss.   

    This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity.  

    Updated on 22 March, 2018
    Courses you can instantly connect with... Do an online course on IT, Computing and Technology starting now. See all courses