This plan includes
- Limited free courses access
- Play & Pause Course Videos
- Video Recorded Lectures
- Learn on Mobile/PC/Tablet
- Quizzes and Real Projects
- Lifetime Course Certificate
- Email & Chat Support
What you'll learn?
- An advanced practical skill-set in how to stay anonymous online, how to maintain privacy and how to bypass firewalls and proxies.
- After this course, you will have a detailed understanding of how anonymity online might be achieved against various types of adversaries. From corporations to nation-state adversaries.
- Start a career in cyber security. Become a cyber security specialist.
- The very latest up-to-date information and methods.
- You will learn how to apply effective OPSEC or operational security to maintain anonymity online. OPSEC is the actions and behaviors required to maintain security and anonymity.
- We look at live operating systems, what they are, which are the best ones, and how they can be used for security, privacy, and anonymity.
- You will gain a complete understanding of how to use virtual private networks (or VPNs) for security, privacy and to attempt anonymity. Everything from choosing a provider to preventing protocol leaks.
- We fully explore the anonymising service and darknet known as Tor. What are its weaknesses and what you can do to mitigate those weaknesses to improve your anonymity and security when you are using Tor. Including exploring the use of virtual and hardware routers and gateways.
- You will learn how proxies servers are used for privacy and hiding your IP address. You will understand the difference between the various types of proxies, what they are suitable for, and importantly learn about their many weaknesses.
- We cover how to use the extremely versatile SSH protocol for optimal security, privacy, and anonymity. Covering local, remote and dynamic port forwarding. Authentication and hardening.
- You will understand the i2p darknet and how to best use it with optimal configuration to protect your security and anonymity.
- We look at other privacy and anonymizing services too such as JonDoNym, botnets, and bulletproof hosting services.
- We cover in detail how censorship can be circumvented by learning how to bypass firewalls, proxies, deep packet inspection technology and nation state censorship.
- Then we learn the more advanced methods of anonymization by exploring nesting and chaining anonymizing services together. You will understand their strengths, weaknesses and what each chaining method is suitable for.
- You will understand how to use off-site connections such as Wi-Fi hotspots and Internet cafes for privacy and anonymity. How to use them securely and anonymously even against a well-resourced adversary with global influence.
- We cover how to use cellular networks for privacy and anonymity. You will understand the inherent weaknesses of cellular networks and how to use them best for privacy and anonymity.
- For each section, you will learn both the theory and how to step by step setup each method.
- A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Course Overview
Welcome to the ultimate dark net, privacy, anonymity and security course. With no prior knowledge required this course will take you from a beginner to advanced in all of these topics; teaching you how to properly and securely discover data and websites on both the dark web and clear web, access hidden (onion) services, communicate privately and anonymously using instant messages and email, manually use end-to-end encryption to protect your privacy and make it impossible to read even if it gets intercepted, sign and verify files, share files anonymously, transfer funds anonymously using crypto currencies such as Bitcoin and Monero and much more! You'll also learn how to do all of this in a secure manner making it very difficult for hackers or other entities to hack you or de-anonymise you, and even if you get hacked these entities won't be able to easily control your system or de-anonymise you.
This course is highly practical but won't neglect the theory, first you'll understand the inner-workings of each topic and each technique covered, then you'll learn how to apply it in real-life scenarios ultimately teaching you how to use the dark net and the clear net in a more private, more anonymouse and more secure manner, so by the end of the course you'll be able to combine the skills you learned and use them in any situation that requires more privacy, more anonymity or more security.
This course covers four main topics, I chose to cover all of these topics in one course because I think it is very difficult to learn one without the others as they are very related, these main topics are:
1. Anonymity - anonymity is a state where your identity is unknown, achieving this on the internet is not easy because of the way it is designed, so in this course you'll learn a number of techniques to improve your anonymity, you'll first learn what the TOR network is, understand how it works and how it can significantly improve our anonymity, then you'll learn how to connect to it using the TOR Browser, using TAILS and using Qubes OS, you'll also learn how configure TOR properly to bypass censorship and connect even if its blocked!
2. Privacy - Using an anonymising network such as TOR is not enough to stay private and anonymous because the operating systems we use (Windows, OS X, Linux) constantly collect data about us, therefore in this course you'll learn how to use two operating systems designed to be more private, more anonymous and more secure; TAILS and Qubes OS, you'll learn how to install these operating systems on a USB stick so you can use them on any computer without affecting the original operating system and without leaving any traces!
There's also a fully section on encryption in which you'll learn how the two main types of encryptions work (symmetric and asymmetric), what is end-to-end encryption and how to use it to encrypt / decrypt and sign / verify data, this allows you to privately communicate and share any sort of data; whether it is simple text, or files such as images, videos...etc without worrying about it being intercepted.
The course also contains a full section on crypto-currencies, because the payment methods we are used to use are not private and not anonymous, so in this section you'll learn about block chains, crypto-currencies is and how they work, and how to anonymously obtain two crypto currencies; Bitcoin and Monero and use them to send / receive funds.
3. Dark Net - This is the portion on the internet that is not indexed by search engines and require special configuration to access. Using anonymising networks and privacy-focused operating systems are 2 steps in the right direction of becoming more private and more anonymouse but unfortunately it is not enough, the services we use everyday are not private and constantly collect data about us, so the the search engines (Google or Bing), the email provers (ex: Gmail, or Yahoo), the instant messaging platforms (Whatsapp or Skype), the file sharing services (Dropbox or Google Drivet) ....etc all of these services are not private, not anonymouse and can be used to track us and de-anonymise us. Therefore in this course I will teach you how to carry out your normal day-to-day tasks in a more private and anonymous manner, so first I'll teach you how to search for websites and content on both the clear net and on the dark net, then I'll tech you how to discover hidden services (onion services) to carry out your normal day-to-day tasks privately and anonymously (such as communicating using emails, or instant messages, file sharing....etc).
4. Security - All of the above will drastically enhance your anonymity and privacy and allow you to access both the dark web and the clear web privately and anonymously, but if you get hacked, the hacker will gain control over your system and therefore will be able to easily bypass whatever anonymity techniques you're using and de-anonymise you, so all of the above is useless without security. Therefore in this course I will teach you how to do all of the above securely, then at the last section of the course I'll show you how to take your security to the next level by dividing your operating system into a number of security domains, these domains are completely isolated and used for different purposes, therefore even if you get hacked only a small portion of your system will be compromised and it would be very difficult for the hacker to compromise the entire system or de-anonymise you.
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
Notes:
-
This course is created for educational purposes only .
-
This course is totally a product of Zaid Sabih & zSecurity and no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.
Pre-requisites
- Basic IT Skills.
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory.
- Operating System: Windows / OS X / Linux.
Target Audience
- Anybody interested in improving their privacy and anonymity.
- Anybody interested in learning how to access the dark net safely.
- Journalists, ethical hackers and security researchers
Curriculum 24 Lectures 04:03:58
-
Section 1 : Advanced anonymity Lectures
- Lecture 2 :
- 2 Download & install tor browser in kali
- Lecture 3 :
- 5 try 1 proxychains4 setup
- Lecture 4 :
- 6 try 2 Proxy chains setup
- Lecture 5 :
- 7 Proxychains4 installation & how to use it in kali
- Lecture 6 :
- 8 privacy anonsurf installing
- Lecture 7 :
- 9 Anonsurf Usage part 1
- Lecture 8 :
- 10 Anonsurf part 2 i2p
- Lecture 9 :
- 11 i2P service installation & configuration part 1
- Lecture 10 :
- 11 i2P service installation & configuration part 2
- Lecture 11 :
- 12 Utopia Installation process & Test
- Lecture 12 :
- 13 Utopia application part 2
- Lecture 13 :
- 20 Anonimity major lecture part1
- Lecture 14 :
- 21 Openvpn part 1 not successful old method
- Lecture 15 :
- 22 open Vpn part 2 Successful
- Lecture 16 :
- 23 Onion Share - host dark website free - chat anonumously - share data anonumou
- Lecture 17 :
- 24 Tail OS - a complete privacy operating system course
- Lecture 18 :
- 25 Track the tor speed limits in kali linux
- Lecture 19 :
- 26 Whonix Operating system
- Lecture 20 :
- 27 Qubes-OS part 1
- Lecture 21 :
- 28 KickSecure OS
- Lecture 22 :
- 29 i2p router next part host your website or service in the i2p
Our learners work at
Frequently Asked Questions
-
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time. -
Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic. -
Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on. -
How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want. -
Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly. -
Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion. -
For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions. -
Is there any free trial?
Currently, we do not offer any free trial. -
Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
6635 Course Views
7 Courses