2016
13:29 hours
├── 01 Introduction
│ ├── 001 Welcome to Volume III.mp4
│ ├── 002 Introduction to the Instructor.mp4
│ ├── 003 Security Quick Win.mp4
│ ├── 004 Target Audience.mp4
│ ├── 005 Study Recommendations.mp4
│ ├── 006 Course updates.mp4
│ └── captions
│ ├── 002 Introduction to the Instructor-EN.srt
│ ├── 004 Target Audience-EN.srt
│ ├── 005 Study Recommendations-EN.srt
│ └── 006 Course updates-EN.srt
├── 02 Goals and Objectives for Volume III
│ └── 007 Goals and Learning Objectives.mp4
├── 03 OPSEC Operational Security
│ ├── 008 Goals and Learning Objectives.mp4
│ ├── 009 Introduction to OPSEC.mp4
│ ├── 010 Identities pseudonyms and aliases Identity Strategies.mp4
│ ├── 011 Establishing Cover.mp4
│ ├── 012 Identify Cross Contamination.mp4
│ ├── 013 10 Rules of OPSEC.mp4
│ ├── 014 Authorship Recognition and Evasion Methods.mp4
│ ├── 015 The knock.mp4
│ └── 016 Case Studies of OPSEC Failures.mp4
├── 04 Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu
│ ├── 017 Goals and Learning Objectives.mp4
│ ├── 018 Introduction to live operating systems.mp4
│ ├── 019 Knoppix Puppy linux Jondo live Tiny core linux Window To Go.mp4
│ ├── 020 Tails.mp4
│ └── 021 Tails Demo.mp4
├── 05 Virtual Private Networks VPNs
│ ├── 022 Goals and Learning Objectives.mp4
│ ├── 023 Introduction to VPNs.mp4
│ ├── 024 Which VPN protocol is best to use and why.mp4
│ ├── 025 VPN Weaknesses.mp4
│ ├── 026 Can you trust VPN providers.mp4
│ ├── 027 VPNs and Domain Name System DNS Leaks.mp4
│ ├── 028 Setting up an OpenVPN client in Windows Mac iPhone and Android.mp4
│ ├── 029 Setting up an OpenVPN client on Linux.mp4
│ ├── 030 Preventing VPN Leaks – Firewalls and kill switches.mp4
│ ├── 031 Choosing the right VPN provider.mp4
│ ├── 032 Setting up an OpenVPN server Part 1 – The fast and easy way.mp4
│ ├── 033 Setting up an OpenVPN server Part 2 – Debian client.mp4
│ └── 034 Setting up an OpenVPN server Part 3 – Home VPN.mp4
├── 06 Tor
│ ├── 035 Goals and Learning Objectives.mp4
│ ├── 036 What is Tor.mp4
│ ├── 037 The Tor Network and Browser.mp4
│ ├── 038 What should Tor be used for.mp4
│ ├── 039 Directory Authorities and Relays.mp4
│ ├── 040 Tor Bridges.mp4
│ ├── 041 Tor Pluggable Transports and Traffic Obfuscation.mp4
│ ├── 042 Torrc Configuration File.mp4
│ ├── 043 Running other applications through Tor.mp4
│ ├── 044 Tor Weaknesses Part 1.mp4
│ ├── 045 Tor Weaknesses Part 2.mp4
│ ├── 046 Conclusions on Tor and mitigation to reduce risk.mp4
│ ├── 047 Attacking Tor how the NSA targets users online anonymity.mp4
│ ├── 048 Hidden services The Tor darknet.mp4
│ ├── 049 Finding Tor hidden services.mp4
│ └── 050 Other Tor Apps.mp4
├── 07 VPN and Tor Routers
│ ├── 051 Goals and Learning Objectives.mp4
│ ├── 052 Introduction to VPN and Tor Routers.mp4
│ ├── 053 Custom Router Firmware for VPN TOR Tunneling.mp4
│ ├── 054 Off the shelf VPN and TOR Routers.mp4
│ ├── 055 DIY Hardware TOR Routers.mp4
│ └── 056 TOR and VPN Gateway Virtual Machines.mp4
├── 08 Proxies HTTP HTTPS SOCKs and Web
│ ├── 057 Goals and Learning Objectives.mp4
│ ├── 058 Proxies HTTP HTTPS and SOCKS Part 1.mp4
│ ├── 059 Proxies HTTP HTTPS and SOCKS Part 2.mp4
│ └── 060 CGI proxies – Web proxy or web form proxy.mp4
├── 09 SSH Secure Shell
│ ├── 061 Goals and Learning Objectives.mp4
│ ├── 062 Introduction How to Login.mp4
│ ├── 063 SSH Remote Port Forwarding.mp4
│ ├── 064 SSH Local Port Forwarding.mp4
│ ├── 065 SSH Socks5 Proxy Tunneling with Dynamic Ports.mp4
│ ├── 066 SSH Public private key authentication.mp4
│ └── 067 SSH Hardening.mp4
├── 10 I2P – The Invisible Internet Project
│ ├── 068 Goals and Learning Objectives.mp4
│ ├── 069 I2P – Introduction.mp4
│ ├── 070 I2P Installing and Secure Configuration Part 1.mp4
│ ├── 071 I2P Installing and Secure Configuration Part 2.mp4
│ └── 072 I2P Strengths and Weaknesses.mp4
├── 11 Other Privacy and Anonymising Services
│ ├── 073 Goals and Learning Objectives.mp4
│ ├── 074 JonDonym – Introduction.mp4
│ ├── 075 JonDonym – Installing and Secure Configuration.mp4
│ ├── 076 Bullet Proof Hosting Services BPHS.mp4
│ └── 077 Botnets and Hacked Boxes.mp4
├── 12 Censorship Circumvention – Bypassing Firewalls Deep Packet Inspection
│ ├── 078 Goals and Learning Objectives.mp4
│ ├── 079 Outbound Firewall Bypassing – The Fundamentals Part 1.mp4
│ ├── 080 Outbound Firewall Bypassing – The Fundamentals Part 2.mp4
│ ├── 081 Outbound Bypassing – Tunneling through HTTP proxies.mp4
│ ├── 082 Outbound Bypassing – Port Sharing and Knocking.mp4
│ ├── 083 Outbound Bypassing Cloaking and Obfuscating.mp4
│ ├── 084 Outbound Bypassing – Remote login – VNC and RDP.mp4
│ └── 085 Inbound Bypassing – Reverse shells SSH remote tunneling and remote login.mp4
├── 13 ChainingNesting Privacy and Anonymising Services
│ ├── 086 Goals and Learning Objectives.mp4
│ ├── 087 Introduction to nesting and chaining – Proxies VPN SSH JonDonym and Tor.mp4
│ ├── 088 Strengths and Weaknesses User – SSH-VPN-JonDonym – Tor – Internet.mp4
│ ├── 089 Strengths and Weaknesses User – Tor – SSH-VPN-JonDonym – Internet.mp4
│ ├── 090 Nested VPNs – Strength and Weaknesses.mp4
│ ├── 091 How to setup nested VPNs.mp4
│ ├── 092 How to setup nested SSH.mp4
│ ├── 093 How to setup proxy chains.mp4
│ ├── 094 How to setup – User – VPN – Tor – Internet.mp4
│ ├── 095 How to setup – User – SSH – Tor – Internet.mp4
│ ├── 096 How to setup – User – JonDonym – Tor – Internet.mp4
│ ├── 097 How to setup – User – Tor – SSHVPNJonDoym – Internet with transproxy.mp4
│ ├── 098 How to setup – User – Tor – SSHVPNJonDoym – Internet with Whonix.mp4
│ └── 099 Setting up nested services 3 hops.mp4
├── 14 Off-site Internet Connections – Hotspots and Cafes
│ ├── 100 Goals and Learning Objectives.mp4
│ ├── 101 Staying safe while on public Wi-Fi hotspots.mp4
│ ├── 103.mp4
│ ├── 103 Using public Wi-Fi hotspots for security privacy and anonymity safely.mp4
│ ├── 104 Finding public Wi-Fi hotspots.mp4
│ ├── 105 Boosting Wi-Fi range.mp4
│ └── 106 How are Wi-Fi users geo located.mp4
├── 15 Mobile Cell Phones Cellular Networks
│ ├── 107 Goals and Learning Objectives.mp4
│ ├── 108 Cellular Network Weaknesses – The Network Operator.mp4
│ ├── 109 Cellular Networks Weaknesses – IMSI catchers.mp4
│ ├── 110 Cellular Networks Weaknesses – Signaling System No7 SS7.mp4
│ ├── 111 Mobile and Cell Phone Weaknesses.mp4
│ ├── 112 How to use a laptop and cellular networks for Internet privacy and anonymity.mp4
│ └── 113 How you are geo located when using a cellular network.mp4
└── 16 BONUS SECTION – Whats next Volume IV
├── 114 BONUS – Important Information.mp4
├── 115 Congratulations.mp4
├── 116 Certificate Of Completion for CPEs.html
├── 117 BONUS – Example Lecture from Volume I- Intro to Isolation Compartmentalization.mp4
├── 118 BONUS – Example Lecture from Volume II – Firefox Hardening.mp4
├── 119 BONUS – Example Lecture from Volume 4 – Email Tracking Exploits.mp4