17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[UdemyCourseDownloader] The Complete Cyber Security Course Anonymous Browsing!
Learn a practical skill-set in staying anonymous online and maintaining total privacy against even a well-resourced adversary with global influence.
Covering all major platforms including Windows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.
Become a cyber security specialist. - Go from beginner to expert in this easy to follow advanced course.
We cover in detail all the best anonymising and privacy methods. Including;
Tor
VPNs - Virtual Private Networks
Proxy servers - HTTP, HTTPS, SOCKs and Web
SSH Secure Shell
Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
OPSEC - Operation Security
I2P - The Invisible Internet Project
JonDoNym
Off-site connections - Hotspots and Cafes
Mobile, Cell Phones & Cellular Networks
Bulletproof hosting
and more....
For each of these anonymizing methods we analysis in detail their strengths and weaknesses, we look at the techniques used to attack these anonymity services and what you can do to mitigate those de-anonymization attacks.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01 Introduction/001 Welcome to Volume III.mp4
3.3 MB
01 Introduction/002 Introduction to the Instructor.mp4
17.1 MB
01 Introduction/003 Security Quick Win.mp4
44.6 MB
01 Introduction/004 Target Audience.mp4
8.7 MB
01 Introduction/005 Study Recommendations.mp4
27.9 MB
01 Introduction/006 Course updates.mp4
2.6 MB
02 Goals and Objectives for Volume III/007 Goals and Learning Objectives.mp4
19.6 MB
03 OPSEC Operational Security/008 Goals and Learning Objectives.mp4
4.2 MB
03 OPSEC Operational Security/009 Introduction to OPSEC.mp4
10.4 MB
03 OPSEC Operational Security/010 Identities pseudonyms and aliases Identity Strategies.mp4