Навыки, которые вы получите:
Cyber attacks
Cybersecurity
Welcome to the ultimate dark net, privacy, anonymity and security course. With no prior knowledge required this course will take you from a beginner to advanced in all of these topics.
Necessary preparation
- Basic IT Skills.
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory.
- Operating System: Windows / OS X / Linux.
Who is this course for
- Anybody interested in improving their privacy and anonymity.
- Anybody interested in learning how to access the dark net safely.
- Journalists, ethical hackers and security researchers.
The Program
- Introduction.
- The TOR Browser.
- TAILS-The Amnesic Incognito Live System
- Accessing the Dark Net-Entry Points.
- Communicating Privately &Anonymously-Using Email.
- Communicating Privately &Anonymously-Instant Messaging.
- File Management & File Sharing.
- Encryption.
- Cryptocurrencies.
- Cryptocurrencies-Bitcoin.
- Cryptocurrencies-Monero.
- Qubes -OS.
What will you learn
- 85+ videos (10+ hours) to take you from 0 to advanced in anonymity, privacy & security.
- Anonymously access the dark net and TOR hidden services (onion services).
- Install, configure & use anonymouse and private operating systems such as TAILS & Qubes OSUnderstand how cryptocurrencies work and anonymously use and handle Bitcoin & Monero.
- Privately communicate using emails and instant messages.Understand asymmetric & symmetric encryption and manually encrypt, sign, decrypt and verify data.
- Anonymously obtain Bitcoint & MoneroDiscover hidden services (onion services) on the darknet.
- Use darknet search engines and services.
- Use Qubes & TAILS from usb sticks on any computer without affecting it and without leaving any traces.
- Bypass censorship & connect to TOR even if it’s blocked.
- Use TOR bridges and pluggable transports to bypass filters.
- Understand what VPN is and how to use it with TOR.
- Configure TOR for maximum security & anonymity.
- Handle and share files privately and anonymously.
- Use daknet email services.Use temporary email services.
- Configure & use Jabber / XMPP to communicate privately on the dark net.
- Setup & use end-to-end encryption.
- Understand symmetric and asymmetric encryptions.
- Use PGP to encrypt and decrypt data.Use PGP to sign and verify integrity.
- Understand what is cryptocurrency and how it works.
- Understand how Bitcoin and Monero work.
- Anonymously obtain and use Bitcoin and Monero.
- Use exchanges to convert one cryptcurrency to another.
- Anonymously transfer funds using Bitcoin & Monero.
- Secure your computer and your data by dividing it into a number of isolated domains.
- Securely handle files (even malware/viruses) without affecting your computer.