Curriculum
Course:
The Complete Cyber Security Course
Login
Curriculum
The Complete Cyber Security Course
01 Introduction
0/6
001 Welcome to Volume III
Video lesson
Preview
002 Introduction to the Instructor
Video lesson
003 Security Quick Win
Video lesson
004 Target Audience
Video lesson
005 Study Recommendations
Video lesson
006 Course updates
Video lesson
02 Goals and Objectives for Volume III
0/1
007 Goals and Learning Objectives
Video lesson
03 OPSEC Operational Security
0/9
008 Goals and Learning Objectives
Video lesson
009 Introduction to OPSEC
Video lesson
010 Identities pseudonyms and aliases Identity Strategies
Video lesson
011 Establishing Cover
Video lesson
012 Identify Cross Contamination
Video lesson
013 10 Rules of OPSEC
Video lesson
014 Authorship Recognition and Evasion Methods
Video lesson
015 The knock
Video lesson
016 Case Studies of OPSEC Failures
Video lesson
04 Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu
0/5
017 Goals and Learning Objectives
Video lesson
018 Introduction to live operating systems
Video lesson
019 Knoppix Puppy linux Jondo live Tiny core linux Window To Go
Video lesson
020 Tails
Video lesson
021 Tails Demo
Video lesson
05 Virtual Private Networks VPNs
0/13
022 Goals and Learning Objectives
Video lesson
023 Introduction to VPNs
Video lesson
024 Which VPN protocol is best to use and why
Video lesson
025 VPN Weaknesses
Video lesson
026 Can you trust VPN providers
Video lesson
027 VPNs and Domain Name System DNS Leaks
Video lesson
028 Setting up an OpenVPN client in Windows Mac iPhone and Android
Video lesson
029 Setting up an OpenVPN client on Linux
Video lesson
030 Preventing VPN Leaks - Firewalls and kill switches
Video lesson
031 Choosing the right VPN provider
Video lesson
032 Setting up an OpenVPN server Part 1 - The fast and easy way
Video lesson
033 Setting up an OpenVPN server Part 2 - Debian client
Video lesson
034 Setting up an OpenVPN server Part 3 - Home VPN
Video lesson
06 Tor
0/16
035 Goals and Learning Objectives
Video lesson
036 What is Tor
Video lesson
037 The Tor Network and Browser
Video lesson
038 What should Tor be used for
Video lesson
039 Directory Authorities and Relays
Video lesson
040 Tor Bridges
Video lesson
041 Tor Pluggable Transports and Traffic Obfuscation
Video lesson
042 Torrc Configuration File
Video lesson
043 Running other applications through Tor
Video lesson
044 Tor Weaknesses Part 1
Video lesson
045 Tor Weaknesses Part 2
Video lesson
046 Conclusions on Tor and mitigation to reduce risk
Video lesson
047 Attacking Tor how the NSA targets users online anonymity
Video lesson
048 Hidden services The Tor darknet
Video lesson
049 Finding Tor hidden services
Video lesson
050 Other Tor Apps
Video lesson
07 VPN and Tor Routers
0/6
051 Goals and Learning Objectives
Video lesson
052 Introduction to VPN and Tor Routers
Video lesson
053 Custom Router Firmware for VPN TOR Tunneling
Video lesson
054 Off the shelf VPN and TOR Routers
Video lesson
055 DIY Hardware TOR Routers
Video lesson
056 TOR and VPN Gateway Virtual Machines
Video lesson
08 Proxies HTTP HTTPS SOCKs and Web
0/4
057 Goals and Learning Objectives
Video lesson
058 Proxies HTTP HTTPS and SOCKS Part 1
Video lesson
059 Proxies HTTP HTTPS and SOCKS Part 2
Video lesson
060 CGI proxies - Web proxy or web form proxy
Video lesson
09 SSH Secure Shell
0/7
061 Goals and Learning Objectives
Video lesson
062 Introduction How to Login
Video lesson
063 SSH Remote Port Forwarding
Video lesson
064 SSH Local Port Forwarding
Video lesson
065 SSH Socks5 Proxy Tunneling with Dynamic Ports
Video lesson
066 SSH Public private key authentication
Video lesson
067 SSH Hardening
Video lesson
10 I2P - The Invisible Internet Project
0/5
068 Goals and Learning Objectives
Video lesson
069 I2P - Introduction
Video lesson
070 I2P Installing and Secure Configuration Part 1
Video lesson
071 I2P Installing and Secure Configuration Part 2
Video lesson
072 I2P Strengths and Weaknesses
Video lesson
11 Other Privacy and Anonymising Services
0/5
073 Goals and Learning Objectives
Video lesson
074 JonDonym - Introduction
Video lesson
075 JonDonym - Installing and Secure Configuration
Video lesson
076 Bullet Proof Hosting Services BPHS
Video lesson
077 Botnets and Hacked Boxes
Video lesson
12 Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection
0/8
078 Goals and Learning Objectives
Video lesson
079 Outbound Firewall Bypassing - The Fundamentals Part 1
Video lesson
080 Outbound Firewall Bypassing - The Fundamentals Part 2
Video lesson
081 Outbound Bypassing - Tunneling through HTTP proxies
Video lesson
082 Outbound Bypassing - Port Sharing and Knocking
Video lesson
083 Outbound Bypassing Cloaking and Obfuscating
Video lesson
084 Outbound Bypassing - Remote login - VNC and RDP
Video lesson
085 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login
Video lesson
0/14
086 Goals and Learning Objectives
Video lesson
087 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor
Video lesson
088 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet
Video lesson
089 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet
Video lesson
090 Nested VPNs - Strength and Weaknesses
Video lesson
091 How to setup nested VPNs
Video lesson
092 How to setup nested SSH
Video lesson
093 How to setup proxy chains
Video lesson
094 How to setup - User - VPN - Tor - Internet
Video lesson
095 How to setup - User - SSH - Tor - Internet
Video lesson
096 How to setup - User - JonDonym - Tor - Internet
Video lesson
097 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy
Video lesson
098 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix
Video lesson
099 Setting up nested services 3 hops
Video lesson
14 Off-site Internet Connections - Hotspots and Cafes
0/7
100 Goals and Learning Objectives
Video lesson
101 Staying safe while on public Wi-Fi hotspots
Video lesson
103 Using public Wi-Fi hotspots for security privacy and anonymity safely
Video lesson
103
Video lesson
104 Finding public Wi-Fi hotspots
Video lesson
105 Boosting Wi-Fi range
Video lesson
106 How are Wi-Fi users geo located
Video lesson
15 Mobile Cell Phones Cellular Networks
0/7
107 Goals and Learning Objectives
Video lesson
108 Cellular Network Weaknesses - The Network Operator
Video lesson
109 Cellular Networks Weaknesses - IMSI catchers
Video lesson
110 Cellular Networks Weaknesses - Signaling System No7 SS7
Video lesson
111 Mobile and Cell Phone Weaknesses
Video lesson
112 How to use a laptop and cellular networks for Internet privacy and anonymity
Video lesson
113 How you are geo located when using a cellular network
Video lesson
16 BONUS SECTION - Whats next Volume IV
0/5
114 BONUS - Important Information
Video lesson
115 Congratulations
Video lesson
117 BONUS - Example Lecture from Volume I- Intro to Isolation Compartmentalization
Video lesson
118 BONUS - Example Lecture from Volume II - Firefox Hardening
Video lesson
119 BONUS - Example Lecture from Volume 4 - Email Tracking Exploits
Video lesson
Video lesson
001 Welcome to Volume III
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
I want to sign up as instructor
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
No account?
Sign Up
Sign In
Lost Password?
✕
Compare Products