- Introduction 5
- Introduction to Privacy, Anonymity & SecurityLecture1.1
- Course BreakdownLecture1.204 min
- Introduction to TORLecture1.307 min
- Introduction to Hidden Services / Onion ServicesLecture1.404 min
- Connecting to TORLecture1.505 min
- The TOR Browser 10
- Section Intro & BreakdownLecture2.1
- What is The TOR Browser?Lecture2.204 min
- Verifying & Installing TOR Browser on WindowsLecture2.309 min
- Verifying & Installing TOR Browser on Mac OS XLecture2.410 min
- Verifying & Installing TOR Browser on LinuxLecture2.510 min
- TOR Bridges & Pluggable TransportsLecture2.6
- Bypassing TOR CensorshipLecture2.705 min
- Intro to Virtual Private Networks (VPN) & How to Use it with TORLecture2.811 min
- Configuring TOR Browser For Maximum Security & AnonymityLecture2.905 min
- TOR Browser Security Settings & Intro to Information TheoryLecture2.1009 min
- TAILS - The Amnesic Incognito Live System 13
- Disadvantages of Using The TOR Browser on Windows, OS X or LinuxLecture3.1
- What is TAILS?Lecture3.204 min
- TAILS Installation OptionsLecture3.305 min
- Installing TAILS From All Operating SystemsLecture3.409 min
- Starting TAILS on All Operating SystemsLecture3.510 min
- TAILS Basics – Part 1Lecture3.605 min
- TAILS Basics – Part 2Lecture3.706 min
- What is Persistence & Why We Need it!Lecture3.805 min
- Enabling Encrypted PersistenceLecture3.911 min
- Using The TOR Browser on TailsLecture3.1007 min
- Connecting to Captive PortalsLecture3.1108 min
- Connecting to VPN From TAILS – Method 1Lecture3.1207 min
- Connecting to VPN From TAILS – Method 2Lecture3.1316 min
- Accessing the Dark Net - Entry Points 3
- Introduction & Breakdown of Next SectionsLecture4.102 min
- Discovering Hidden Services Using Darknet Search EnginesLecture4.2
- Discovering Hidden Services Using Listings & Onion ServicesLecture4.306 min
- Communicating Privately & Anonymously - Using Email 5
- Creating a Fake Anonymous IdentityLecture5.106 min
- Using Temporary Email AccountsLecture5.206 min
- Using Private Email ProvidersLecture5.310 min
- Using DarkNet Email ProvidersLecture5.409 min
- Picking The Right Email ServiceLecture5.507 min
- Communicating Privately & Anonymously - Instant Messaging 4
- Introduction to Jabber / XMPPLecture6.108 min
- Setting up XMPP with PidginLecture6.208 min
- Enabling End-to-end Encryption in PidginLecture6.308 min
- Verifying ContactsLecture6.406 min
- File Management & File Sharing 5
- IntroductionLecture7.1
- Clearing Metadata & Basic File SharingLecture7.211 min
- Sharing Files Privately & AnonymouslyLecture7.3
- Securely Removing FilesLecture7.406 min
- Securely Wiping & Encrypting Storage DevicesLecture7.506 min
- Encryption 9
- What is Encryption & Why Its Important?Lecture8.1
- Introduction to Symmetric & Asymmetric EncryptionLecture8.209 min
- Generating a PGP Key PairLecture8.307 min
- Importing & Exporting KeysLecture8.410 min
- Encrypting & Decrypting TextLecture8.506 min
- Introduction to Digital SignaturesLecture8.606 min
- Signing Messages & Verifying SignaturesLecture8.7
- Encrypting & Decrypting FilesLecture8.807 min
- Signing & Verifying FilesLecture8.904 min
- Cryptocurrencies 2
- Introduction – Why Use Cryptocurrency?Lecture9.1
- What is Cryptocurrency & How It worksLecture9.208 min
- Cryptocurrencies - Bitcoin 8
- Installing a Bitcoin WalletLecture10.109 min
- Creating a Bitcoin WalletLecture10.207 min
- 4 Ways to Anonymously Get BitcoinsLecture10.309 min
- Using Bitcoin ATMsLecture10.409 min
- Using P2P ServicesLecture10.513 min
- Sending & Receiving BitcoinsLecture10.606 min
- Introduction to Mixers / TumblersLecture10.707 min
- Improve Bitcoin Anonymity Using MixersLecture10.806 min
- Cryptocurrencies - Monero 7
- Introduction to MoneroLecture11.1
- Creating a Monero WalletLecture11.208 min
- Restoring Monero Wallet on TAILSLecture11.304 min
- 4 ways to Anonymously Get MoneroLecture11.409 min
- Crypt-exchanges – Converting One Cryptocurrency to AnotherLecture11.505 min
- Using a Crypto Exchanges to Increase AnonymityLecture11.608 min
- ConclusionLecture11.703 min
- Qubes OS 13
- What is Qubes & Why Use it?Lecture12.1
- Installation Options & Verifying QubesLecture12.212 min
- Flashing Qubes to USBLecture12.303 min
- Preparing Computer For QubesLecture12.407 min
- Installing Qubes OSLecture12.510 min
- Qubes OS BasicsLecture12.611 min
- Overview of The Security Domains in Qubes OSLecture12.708 min
- Working With Multiple Security Domains SimultaneouslyLecture12.810 min
- Handling Files & Text Across The Different Security DomainsLecture12.911 min
- Installing Software to Specific DomainsLecture12.1012 min
- Handling Malware/Viruses & Suspicious Files SecurelyLecture12.1111 min
- Connecting to TOR From Qubes Using Whonix GatewayLecture12.1210 min
- Installing Software on WhonixLecture12.1311 min
- Bonus Section 1
- Bonus Lecture – What’s Next?Lecture13.1
What is Qubes & Why Use it?
This lecture will introduce you to Qubes OS, you’ll learn what it is, how it works, how it compares to TAILS and how it can massively improve our security.
