Curriculum
- Introduction
- The TOR Browser
- Section Intro & Breakdown
- What is The TOR Browser?
- Verifying & Installing TOR Browser on Windows
- Verifying & Installing TOR Browser on Mac OS X
- Verifying & Installing TOR Browser on Linux
- TOR Bridges & Pluggable Transports
- Bypassing TOR Censorship
- Intro to Virtual Private Networks (VPN) & How to Use it with TOR
- Configuring TOR Browser For Maximum Security & Anonymity
- TOR Browser Security Settings & Intro to Information Theory
- TAILS - The Amnesic Incognito Live System
- Disadvantages of Using The TOR Browser on Windows, OS X or Linux
- What is TAILS?
- TAILS Installation Options
- Installing TAILS From All Operating Systems
- Starting TAILS on All Operating Systems
- TAILS Basics – Part 1
- TAILS Basics – Part 2
- What is Persistence & Why We Need it!
- Enabling Encrypted Persistence
- Using The TOR Browser on Tails
- Connecting to Captive Portals
- Connecting to VPN From TAILS – Method 1
- Connecting to VPN From TAILS – Method 2
- Accessing the Dark Net - Entry Points
- Communicating Privately & Anonymously - Using Email
- Communicating Privately & Anonymously - Instant Messaging
- File Management & File Sharing
- Encryption
- What is Encryption & Why Its Important?
- Introduction to Symmetric & Asymmetric Encryption
- Generating a PGP Key Pair
- Importing & Exporting Keys
- Encrypting & Decrypting Text
- Introduction to Digital Signatures
- Signing Messages & Verifying Signatures
- Encrypting & Decrypting Files
- Signing & Verifying Files
- Cryptocurrencies
- Cryptocurrencies - Bitcoin
- Cryptocurrencies - Monero
- Qubes OS
- What is Qubes & Why Use it?
- Installation Options & Verifying Qubes
- Flashing Qubes to USB
- Preparing Computer For Qubes
- Installing Qubes OS
- Qubes OS Basics
- Overview of The Security Domains in Qubes OS
- Working With Multiple Security Domains Simultaneously
- Handling Files & Text Across The Different Security Domains
- Installing Software to Specific Domains
- Handling Malware/Viruses & Suspicious Files Securely
- Connecting to TOR From Qubes Using Whonix Gateway
- Installing Software on Whonix
- Bonus Section
HELI VEEPURI
Amazing Course
The content, concept and explanation are amazing. The course helped to be more secure, anonymous and private. Excellent work Mr. Zaid....Andrew Corkill
This was an excellent course. Incredibly practical, with enough theory to make what you are doing make sense. The explanations were very clear and to the point. I've seen other courses focused on the dark web, TOR, etc, but none that give such complete coverage of not only the dark web but also methods to remain anonymous, private and secure. You don't even need to go on the dark net to use this course because they can be applied to using normal internet, files, etc. The techniques can be applied to anything to make your current activities more private and secure. Great job!