-
Урок 1.
00:00:36
Welcome to Volume III
-
Урок 2.
00:02:07
Introduction to the Instructor!
-
Урок 3.
00:11:25
Security Quick Win!
-
Урок 4.
00:01:55
Target Audience
-
Урок 5.
00:04:20
Study Recommendations
-
Урок 6.
00:00:41
Course updates
-
Урок 7.
00:03:40
Goals and Learning Objectives
-
Урок 8.
00:00:46
Goals and Learning Objectives
-
Урок 9.
00:03:47
Introduction to OPSEC
-
Урок 10.
00:06:05
Identities, pseudonyms and aliases (Identity Strategies)
-
Урок 11.
00:09:13
Establishing Cover
-
Урок 12.
00:05:58
Identify Cross Contamination
-
Урок 13.
00:13:48
10 Rules of OPSEC
-
Урок 14.
00:04:07
Authorship Recognition and Evasion Methods
-
Урок 15.
00:04:49
The knock
-
Урок 16.
00:07:23
Case Studies of OPSEC Failures
-
Урок 17.
00:00:14
Goals and Learning Objectives
-
Урок 18.
00:11:37
Introduction to live operating systems
-
Урок 19.
00:12:19
Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go
-
Урок 20.
00:13:44
Tails
-
Урок 21.
00:09:50
Tails Demo
-
Урок 22.
00:00:41
Goals and Learning Objectives
-
Урок 23.
00:10:11
Introduction to VPNs
-
Урок 24.
00:11:45
Which VPN protocol is best to use? and why?
-
Урок 25.
00:16:33
VPN Weaknesses
-
Урок 26.
00:08:53
Can you trust VPN providers?
-
Урок 27.
00:09:37
VPNs and Domain Name System (DNS) Leaks
-
Урок 28.
00:11:57
Setting up an OpenVPN client in Windows, Mac, iPhone and Android
-
Урок 29.
00:09:25
Setting up an OpenVPN client on Linux
-
Урок 30.
00:12:18
Preventing VPN Leaks - Firewalls and kill switches
-
Урок 31.
00:11:43
Choosing the right VPN provider
-
Урок 32.
00:12:29
Setting up an OpenVPN server Part 1 - The fast and easy way
-
Урок 33.
00:07:19
Setting up an OpenVPN server Part 2 - Debian client
-
Урок 34.
00:03:13
Setting up an OpenVPN server Part 3 - Home VPN
-
Урок 35.
00:00:21
Goals and Learning Objectives
-
Урок 36.
00:07:36
What is Tor?
-
Урок 37.
00:08:14
The Tor Network and Browser
-
Урок 38.
00:10:37
What should Tor be used for?
-
Урок 39.
00:07:12
Directory Authorities and Relays
-
Урок 40.
00:06:20
Tor Bridges
-
Урок 41.
00:08:21
Tor Pluggable Transports and Traffic Obfuscation
-
Урок 42.
00:13:33
Torrc Configuration File
-
Урок 43.
00:13:56
Running other applications through Tor
-
Урок 44.
00:14:06
Tor Weaknesses Part 1
-
Урок 45.
00:06:56
Tor Weaknesses Part 2
-
Урок 46.
00:04:32
Conclusions on Tor and mitigation to reduce risk
-
Урок 47.
00:14:05
Attacking Tor: how the NSA targets users' online anonymity
-
Урок 48.
00:03:05
Hidden services – The Tor darknet
-
Урок 49.
00:02:46
Finding Tor hidden services
-
Урок 50.
00:02:44
Other Tor Apps
-
Урок 51.
00:00:15
Goals and Learning Objectives
-
Урок 52.
00:06:06
Introduction to VPN and Tor Routers
-
Урок 53.
00:06:20
Custom Router Firmware for VPN & TOR Tunneling
-
Урок 54.
00:06:58
Off the shelf VPN and TOR Routers
-
Урок 55.
00:02:57
DIY Hardware TOR Routers
-
Урок 56.
00:05:56
TOR and VPN Gateway Virtual Machines
-
Урок 57.
00:00:19
Goals and Learning Objectives
-
Урок 58.
00:09:05
Proxies – HTTP, HTTPS and SOCKS Part 1
-
Урок 59.
00:07:37
Proxies – HTTP, HTTPS and SOCKS Part 2
-
Урок 60.
00:04:16
CGI proxies - Web proxy or web form proxy
-
Урок 61.
00:00:19
Goals and Learning Objectives
-
Урок 62.
00:05:24
Introduction & How to Login
-
Урок 63.
00:08:28
SSH Remote Port Forwarding
-
Урок 64.
00:04:06
SSH Local Port Forwarding
-
Урок 65.
00:10:21
SSH Socks5 Proxy Tunneling with Dynamic Ports
-
Урок 66.
00:09:30
SSH Public private key authentication
-
Урок 67.
00:04:17
SSH Hardening
-
Урок 68.
00:00:18
Goals and Learning Objectives
-
Урок 69.
00:11:29
I2P - Introduction
-
Урок 70.
00:16:56
I2P Installing and Secure Configuration Part 1
-
Урок 71.
00:11:16
I2P Installing and Secure Configuration Part 2
-
Урок 72.
00:04:22
I2P Strengths and Weaknesses
-
Урок 73.
00:00:16
Goals and Learning Objectives
-
Урок 74.
00:08:44
JonDonym - Introduction
-
Урок 75.
00:05:14
JonDonym - Installing and Secure Configuration
-
Урок 76.
00:04:15
Bullet Proof Hosting Services (BPHS)
-
Урок 77.
00:01:47
Botnets and Hacked Boxes
-
Урок 78.
00:00:16
Goals and Learning Objectives
-
Урок 79.
00:10:09
Outbound Firewall Bypassing - The Fundamentals Part 1
-
Урок 80.
00:10:46
Outbound Firewall Bypassing - The Fundamentals Part 2
-
Урок 81.
00:15:22
Outbound Bypassing - Tunneling through HTTP proxies
-
Урок 82.
00:07:38
Outbound Bypassing - Port Sharing and Knocking
-
Урок 83.
00:07:58
Outbound Bypassing – Cloaking and Obfuscating
-
Урок 84.
00:05:35
Outbound Bypassing - Remote login - VNC and RDP
-
Урок 85.
00:07:54
Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login
-
Урок 86.
00:00:28
Goals and Learning Objectives
-
Урок 87.
00:06:36
Introduction to nesting and chaining - Proxies, VPN, SSH, JonDonym and Tor
-
Урок 88.
00:10:40
Strengths and Weaknesses : (User -> SSH-VPN-JonDonym -> Tor -> Internet)
-
Урок 89.
00:10:19
Strengths and Weaknesses : (User -> Tor -> SSH-VPN-JonDonym -> Internet)
-
Урок 90.
00:08:02
Nested VPNs - Strength and Weaknesses
-
Урок 91.
00:06:17
How to setup nested VPNs
-
Урок 92.
00:06:29
How to setup nested SSH
-
Урок 93.
00:07:15
How to setup proxy chains
-
Урок 94.
00:02:10
How to setup - (User -> VPN -> Tor -> Internet)
-
Урок 95.
00:03:46
How to setup - (User -> SSH -> Tor -> Internet)
-
Урок 96.
00:01:43
How to setup - (User -> JonDonym -> Tor -> Internet)
-
Урок 97.
00:15:17
How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with transproxy
-
Урок 98.
00:08:03
How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with Whonix
-
Урок 99.
00:04:59
Setting up nested services (3 + hops)
-
Урок 100.
00:00:22
Goals and Learning Objectives
-
Урок 101.
00:04:33
Staying safe while on public Wi-Fi hotspots
-
Урок 102.
00:07:39
Using Internet CafГ©s for security, privacy and anonymity safely
-
Урок 103.
00:09:31
Using public Wi-Fi hotspots for security, privacy and anonymity safely
-
Урок 104.
00:04:21
Finding public Wi-Fi hotspots
-
Урок 105.
00:12:39
Boosting Wi-Fi range
-
Урок 106.
00:04:51
How are Wi-Fi users geo located?
-
Урок 107.
00:00:21
Goals and Learning Objectives
-
Урок 108.
00:06:04
Cellular Network Weaknesses - The Network Operator
-
Урок 109.
00:04:50
Cellular Networks Weaknesses - IMSI catchers
-
Урок 110.
00:04:09
Cellular Networks Weaknesses - Signaling System No7 (SS7)
-
Урок 111.
00:10:30
Mobile and Cell Phone Weaknesses
-
Урок 112.
00:09:12
How to use a laptop and cellular networks for Internet privacy and anonymity
-
Урок 113.
00:04:29
How you are geo located when using a cellular network
-
Урок 114.
00:01:15
Congratulations
-
Урок 115.
00:00:57
Certificate Of Completion for CPEs
-
Урок 116.
00:02:11
Intro to Isolation & Compartmentalization
-
Урок 117.
00:18:51
Firefox Hardening
-
Урок 118.
00:10:34
Email Tracking & Exploits