Course details
Learn a practicalskill-set in staying anonymous online and maintaining total privacy against evena well-resourced adversary with global influence.
Covering all major platforms includingWindows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.
Go from beginnerto expert in this easy to follow advanced course.
We cover in detailall the best anonymising and privacy methods. Including;
- Tor
- VPNs - Virtual Private Networks
- Proxy servers - HTTP, HTTPS, SOCKs and Web
- SSH Secure Shell
- Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
- OPSEC - Operation Security
- I2P - The Invisible Internet Project
- JonDoNym
- Off-site connections - Hotspots and Cafes
- Mobile, Cell Phones & Cellular Networks
- Bulletproof hosting
- and more....
For each of theseanonymizing methods we analysis in detail their strengths and weaknesses, welook at the techniques used to attack these anonymity services and what you cando to mitigate those de-anonymization attacks.
Advanced anonymity:We explore chaining and nesting anonymizing services together to provide layersof obfuscation for maximum anonymity against even the most well-resourcedadversaries.
We cover bypassingcensors, firewalls, and proxies. Learn to bypass the trickiest of censoringdevices including DPI (deep packet inspection).
The course coversboth the theory and practically how setup everything we discuss.
This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity.
Updated on 22 March, 2018- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Installation, Storage, and Compute with Windows Alpha AcademyUSD 24
USD 280Duration: Upto 14 Hours - IT Expert Diploma Skill-UpUSD 389Duration: Upto 200 Hours
- USD 2,967Duration: 12 Weeks Live virtual classroom