Course details
Learn a practicalskill-set in staying anonymous online and maintaining total privacy against evena well-resourced adversary with global influence.
Covering all major platforms includingWindows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.
Go from beginnerto expert in this easy to follow advanced course.
We cover in detailall the best anonymising and privacy methods. Including;
- Tor
- VPNs - Virtual Private Networks
- Proxy servers - HTTP, HTTPS, SOCKs and Web
- SSH Secure Shell
- Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
- OPSEC - Operation Security
- I2P - The Invisible Internet Project
- JonDoNym
- Off-site connections - Hotspots and Cafes
- Mobile, Cell Phones & Cellular Networks
- Bulletproof hosting
- and more....
For each of theseanonymizing methods we analysis in detail their strengths and weaknesses, welook at the techniques used to attack these anonymity services and what you cando to mitigate those de-anonymization attacks.
Advanced anonymity:We explore chaining and nesting anonymizing services together to provide layersof obfuscation for maximum anonymity against even the most well-resourcedadversaries.
We cover bypassingcensors, firewalls, and proxies. Learn to bypass the trickiest of censoringdevices including DPI (deep packet inspection).
The course coversboth the theory and practically how setup everything we discuss.
This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity.
Updated on 22 March, 2018IT, Computing and Technology Related Questions
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Fundamentals of Networking Engineering Course LineAED 89Duration: Upto 12 Hours
- Mastering Your iPhone Study 365AED 115
AED 833Duration: Upto 5 Hours - AED 10,898Duration: 12 Weeks Live virtual classroom