The Ultimate Dark Web, Anonymity, Privacy & Security Course – zSecurity

The Ultimate Dark Web, Anonymity, Privacy & Security Course

Avatar
(0 review)
$195.00 $49.00

Signing Messages & Verifying Signatures

This lecture will teach you how to sign data, and verify signatures to protect file integrity.

Welcome to the ultimate dark net, privacy, anonymity and security course. With no prior knowledge required this course will take you from a beginner to advanced in all of these topics; teaching you how to properly and securely discover data and websites on both the dark web and clear web, access hidden (onion) services, communicate privately and anonymously using instant messages and email, manually use end-to-end encryption to protect your privacy and make it impossible to read even if it gets intercepted, sign and verify files, share files anonymously, transfer funds anonymously using crypto currencies such as Bitcoin and Monero and much more! You’ll also learn how to do all of this in a secure manner making it very difficult for hackers or other entities to hack you or de-anonymise you, and even if you get hacked these entities won’t be able to easily control your system or de-anonymise you.

This course is highly practical but won’t neglect the theory, first you’ll understand the inner-workings of each topic and each technique covered, then you’ll learn how to apply it in real-life scenarios ultimately teaching you how to use the dark net and the clear net in a more private, more anonymouse and more secure manner, so by the end of the course you’ll be able to combine the skills you learned and use them in any situation that requires more privacy, more anonymity or more security.

This course covers four main topics, I chose to cover all of these topics in one course because I think it is very difficult to learn one without the others as they are very related, these main topics are:

1. Anonymity – anonymity is a state where your identity is unknown, achieving this on the internet is not easy because of the way it is designed, so in this course you’ll learn a number of techniques to improve your anonymity, you’ll first learn what the TOR network is, understand how it works and how it can significantly improve our anonymity, then you’ll learn how to connect to it using the TOR Browser, using TAILS and using Qubes OS, you’ll also learn how configure TOR properly to bypass censorship and connect even if its blocked!

2. Privacy – Using an anonymising network such as TOR is not enough to stay private and anonymous because the operating systems we use (Windows, OS X, Linux) constantly collect data about us, therefore in this course you’ll learn how to use two operating systems designed to be more private, more anonymous and more secure; TAILS and Qubes OS, you’ll learn how to install these operating systems on a USB stick so you can use them on any computer without affecting the original operating system and without leaving any traces!

There’s also a fully section on encryption in which you’ll learn how the two main types of encryptions work (symmetric and asymmetric), what is end-to-end encryption and how to use it to encrypt / decrypt and sign / verify data, this allows you to privately communicate and share any sort of data; whether it is simple text, or files such as images, videos…etc without worrying about it being intercepted.

The course also contains a full section on crypto-currencies, because the payment methods we are used to use are not private and not anonymous, so in this section you’ll learn about block chains, crypto-currencies is and how they work, and how to anonymously obtain two crypto currencies; Bitcoin and Monero and use them to send / receive funds.

3. Dark Net – This is the portion on the internet that is not indexed by search engines and require special configuration to access. Using anonymising networks and privacy-focused operating systems are 2 steps in the right direction of becoming more private and more anonymouse but unfortunately it is not enough, the services we use everyday are not private and constantly collect data about us, so the the search engines (Google or Bing), the email provers (ex: Gmail, or Yahoo), the instant messaging platforms (Whatsapp or Skype), the file sharing services (Dropbox or Google Drivet) ….etc all of these services are not private, not anonymouse and can be used to track us and de-anonymise us. Therefore in this course I will teach you how to carry out your normal day-to-day tasks in a more private and anonymous manner, so first I’ll teach you how to search for websites and content on both the clear net and on the dark net, then I’ll tech you how to discover hidden services (onion services) to carry out your normal day-to-day tasks privately and anonymously (such as communicating using emails, or instant messages, file sharing….etc).

4. Security – All of the above will drastically enhance your anonymity and privacy and allow you to access both the dark web and the clear web privately and anonymously, but if you get hacked, the hacker will gain control over your system and therefore will be able to easily bypass whatever anonymity techniques you’re using and de-anonymise you, so all of the above is useless without security. Therefore in this course I will teach you how to do all of the above securely, then at the last section of the course I’ll show you how to take your security to the next level by dividing your operating system into a number of security domains, these domains are completely isolated and used for different purposes, therefore even if you get hacked only a small portion of your system will be compromised and it would be very difficult for the hacker to compromise the entire system or de-anonymise you.

With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.

Note – This course is created for educational purposes only .

Course Features

  • Lectures 80
  • Duration 10.5 hours
  • Skill level All levels
  • Language English
  • Students 1497
  • Assessments Yes
  • Introduction 0/4

  • The TOR Browser 0/10

    • Lecture2.1
      Section Intro & Breakdown
      2m
    • Lecture2.2
      What is The TOR Browser?
      4m
    • Lecture2.3
      Verifying & Installing TOR Browser on Windows
      10m
    • Lecture2.4
      Verifying & Installing TOR Browser on Mac OS X
      11m
    • Lecture2.5
      Verifying & Installing TOR Browser on Linux
      11m
    • Lecture2.6
      TOR Bridges & Pluggable Transports
      7m
    • Lecture2.7
      Bypassing TOR Censorship
      6m
    • Lecture2.8
      Virtual Private Network (VPN) – What is it & How to Use it with TOR
      11m
    • Lecture2.9
      Configuring TOR Browser For Maximum Security & Anonymity
      7m
    • Lecture2.10
      TOR Browser Security Settings & Intro to Information Theory
      10m
  • TAILS - The Amnesic Incognito Live System 0/11

    • Lecture3.1
      Disadvantages of Using The TOR Browser on Windows, OS X or Linux
      3m
    • Lecture3.2
      Installation Options
      5m
    • Lecture3.3
      Installing TAILS From All Operating Systems
      9m
    • Lecture3.4
      Starting TAILS on All Operating Systems
      9m
    • Lecture3.5
      TAILS Basics – Part 1
      5m
    • Lecture3.6
      TAILS Basics – Part 2
      6m
    • Lecture3.7
      What is Persistence & Why We Need it!
      5m
    • Lecture3.8
      Enabling Encrypted Persistence
      12m
    • Lecture3.9
      Bypassing Censorship Using Bridges & Plugable Transports
      7m
    • Lecture3.10
      Using The TOR Browser on Tails
      7m
    • Lecture3.11
      Connecting to Captive Portals
      8m
  • Accessing the Dark Net - Entry Points 0/7

    • Lecture4.1
      Introduction & Breakdown of Next Sections
      2m
    • Lecture4.2
      Discovering Hidden Services Using Darknet Search Engines
      11m
    • Lecture4.3
      Discovering Hidden Services Using Listings & Onion Services
      6m
    • Lecture4.4
      Creating a Fake Anonymous Identity
      6m
    • Lecture4.5
      Using Temporary Email Accounts
      6m
    • Lecture4.6
      Using Privacy Focused Email Providers
      10m
    • Lecture4.7
      Using DarkNet Email Providers
      9m
  • Communicating Privately & Anonymously - Instant Messaging 0/4

    • Lecture5.1
      What is Jabber / XMPP & How it Works?
      8m
    • Lecture5.2
      Setting up XMPP with Pidgin
      8m
    • Lecture5.3
      Enabling End-to-end Encryption in Pidgin
      8m
    • Lecture5.4
      Verifying Contacts
      6m
  • File Management & File Sharing 0/5

  • Encryption 0/9

    • Lecture7.1
      What is Encryption & Why Its Important?
      2m
    • Lecture7.2
      Symmetric VS Asymmetric encryption
      9m
    • Lecture7.3
      Generating a PGP Key Pair
      7m
    • Lecture7.4
      Importing & Exporting Keys
      11m
    • Lecture7.5
      Encrypting & Decrypting Text
      8m
    • Lecture7.6
      Signing – How it Works
      6m
    • Lecture7.7
      Signing Messages & Verifying Signatures
      6m
    • Lecture7.8
      Encrypting, Signing, Verifying & Decrypting Files
      11m
    • Lecture7.9
      Using Key Servers
      9m
  • Cryptocurrencies 0/2

  • Cryptocurrencies - Bitcoin 0/8

    • Lecture9.1
      Installing a Bitcoin Wallet
      9m
    • Lecture9.2
      Creating a Bitcoin Wallet
      7m
    • Lecture9.3
      4 Ways to Anonymously Get Biotcoins
      9m
    • Lecture9.4
      Using Bitcoin ATMs
      8m
    • Lecture9.5
      Using P2P Services
      13m
    • Lecture9.6
      Sending & Receiving Bitcoins
      5m
    • Lecture9.7
      What Are Mixers/Tumblers & Why Use Them?
      7m
    • Lecture9.8
      Improve Bitcoin Anonymity Using Mixers
      6m
  • Cryptocurrencies - Monero 0/7

    • Lecture10.1
      What is Monero
      8m
    • Lecture10.2
      Creating a Monero Wallet
      7m
    • Lecture10.3
      Restoring Wallet on TAILS
      4m
    • Lecture10.4
      4 ways to Anonymously Get Monero
      9m
    • Lecture10.5
      Crypt-exchanges – Converting One Cryptocurrency to Another
      5m
    • Lecture10.6
      Using a Crypto Exchanges to Increase Anonymity
      8m
    • Lecture10.7
      Conclusion
      3m
  • Qubes OS 0/13

    • Lecture11.1
      What is Qubes & Why Use it?
      9m
    • Lecture11.2
      Installation Options & Verifying Qubes
      12m
    • Lecture11.3
      Flashing Qubes to USB
      3m
    • Lecture11.4
      Preparing Computer For Qubes
      7m
    • Lecture11.5
      Installing Qubes
      10m
    • Lecture11.6
      Qubes Basics
      11m
    • Lecture11.7
      Overview of The Security Domains in Qubes
      7m
    • Lecture11.8
      Working With Multiple Security Domains Simultaneously
      10m
    • Lecture11.9
      Handling Files & Text Across The Different Security Domains
      10m
    • Lecture11.10
      Installing Software to Specific Domains
      12m
    • Lecture11.11
      Handling Malware/Viruses & Suspicious Files Securely
      11m
    • Lecture11.12
      Connecting to TOR From Qubes Using Whonix Gateway
      10m
    • Lecture11.13
      Whonix – Installing Software
      10m
Avatar
Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. I studied computer science in University College Dublin, I graduated in may 2016. I have a very good experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty.org), I also worked as a pentester for the same company. In 2013 I started teaching my first course online in Arabic, this course received amazing feedback which motivated me to create an English version of this course. The english course became the most popular and the top paid course in Udemy for almost a year, this motivated me to make more courses on ethical hacking, now I have a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0
$195.00 $49.00