The Complete Cyber Security Course: Anonymous Browsing!
About Course
Learn how to stay anonymous online and maintain total privacy with this complete cyber security course, completely free on Theetay! This course is from Udemy and teaches you practical skills to protect yourself from even the most sophisticated adversaries.
This comprehensive course covers all major platforms including Windows, MacOS, Linux, iOS, and Android, as well as Tails, Whonix, and more. You will learn about:
- Tor
- VPNs (Virtual Private Networks)
- Proxy servers (HTTP, HTTPS, SOCKs, and Web)
- SSH Secure Shell
- Live Operating Systems (Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux)
- OPSEC (Operation Security)
- I2P (The Invisible Internet Project)
- JonDoNym
- Off-site connections (Hotspots and Cafes)
- Mobile, Cell Phones & Cellular Networks
- Bulletproof hosting
- and more…
The course goes into detail about the strengths and weaknesses of each anonymizing method, how these methods are attacked, and how to mitigate those attacks. You’ll also learn about advanced anonymity techniques, like chaining and nesting anonymizing services together for maximum obfuscation. Additionally, you’ll learn how to bypass censors, firewalls, and proxies, even the most difficult ones like DPI (deep packet inspection).
This course covers both the theory and practical implementation of everything discussed, making it a complete guide to cyber security privacy and anonymity.
This is Volume 3 of 4 in the series, and you can access it completely free on Theetay!
Course Content
01. Introduction
-
A Message from the Professor
-
001. Welcome to Volume III.mp4
00:00 -
002. Introduction to the Instructor!.mp4
00:00 -
003. Security Quick Win!.mp4
00:00 -
004. Target Audience.mp4
00:00 -
005. Study Recommendations.mp4
00:00 -
006. Course updates.mp4
00:00 -
007. Cyber Security and Ethical Hacking Careers.mp4
00:00 -
(Tutorialsplanet.NET).url
00:00
02. Goals and Objectives for Volume III
03. OPSEC (Operational Security)
04. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu
05. Virtual Private Networks (VPNs)
06. Tor
07. VPN and Tor Routers
08. Proxies – HTTP, HTTPS, SOCKs and Web
09. SSH Secure Shell
10. I2P – The Invisible Internet Project
11. Other Privacy and Anonymising Services
12. Censorship Circumvention – Bypassing Firewalls & Deep Packet Inspection
13. ChainingNesting Privacy and Anonymising Services
14. Off-site Internet Connections – Hotspots and Cafes
15. Mobile, Cell Phones & Cellular Networks
16. Wrap Up
17. BONUS Section
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.