• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      • Home
      • All courses
      • Security
      • The Ultimate Dark Web, Anonymity, Privacy & Security Course
      CoursesSecurityThe Ultimate Dark Web, Anonymity, Privacy & Security Course
      • Introduction 4

        • Lecture1.1
          Introduction to Privacy, Anonymity & Security 07 min
        • Lecture1.2
          Course Breakdown 04 min
        • Lecture1.3
          Introduction to TOR 06 min
        • Lecture1.4
          Connecting to TOR 05 min
      • The TOR Browser 10

        • Lecture2.1
          Section Intro & Breakdown 02 min
        • Lecture2.2
          What is The TOR Browser? 04 min
        • Lecture2.3
          Verifying & Installing TOR Browser on Windows 10 min
        • Lecture2.4
          Verifying & Installing TOR Browser on Mac OS X 11 min
        • Lecture2.5
          Verifying & Installing TOR Browser on Linux 11 min
        • Lecture2.6
          TOR Bridges & Pluggable Transports 07 min
        • Lecture2.7
          Bypassing TOR Censorship 06 min
        • Lecture2.8
          Virtual Private Network (VPN) – What is it & How to Use it with TOR 11 min
        • Lecture2.9
          Configuring TOR Browser For Maximum Security & Anonymity 07 min
        • Lecture2.10
          TOR Browser Security Settings & Intro to Information Theory 10 min
      • TAILS - The Amnesic Incognito Live System 14

        • Lecture3.1
          Disadvantages of Using The TOR Browser on Windows, OS X or Linux 03 min
        • Lecture3.2
          What is TAILS? 03 min
        • Lecture3.3
          Installation Options 05 min
        • Lecture3.4
          Installing TAILS From All Operating Systems 09 min
        • Lecture3.5
          Starting TAILS on All Operating Systems 09 min
        • Lecture3.6
          TAILS Basics – Part 1 05 min
        • Lecture3.7
          TAILS Basics – Part 2 06 min
        • Lecture3.8
          What is Persistence & Why We Need it! 05 min
        • Lecture3.9
          Enabling Encrypted Persistence 12 min
        • Lecture3.10
          Bypassing Censorship Using Bridges & Plugable Transports 07 min
        • Lecture3.11
          Using The TOR Browser on Tails 07 min
        • Lecture3.12
          Connecting to Captive Portals 08 min
        • Lecture3.13
          Connecting to VPN From TAILS – Method 1 07 min
        • Lecture3.14
          Connecting to VPN From TAILS – Method 2 16 min
      • Accessing the Dark Net - Entry Points 3

        • Lecture4.1
          Introduction & Breakdown of Next Sections 02 min
        • Lecture4.2
          Discovering Hidden Services Using Darknet Search Engines 11 min
        • Lecture4.3
          Discovering Hidden Services Using Listings & Onion Services 06 min
      • Communicating Privately & Anonymously - Using Email 5

        • Lecture5.1
          Creating a Fake Anonymous Identity 06 min
        • Lecture5.2
          Using Temporary Email Accounts 06 min
        • Lecture5.3
          Using Privacy Focused Email Providers 10 min
        • Lecture5.4
          Using DarkNet Email Providers 09 min
        • Lecture5.5
          Picking The Right Email Service 07 min
      • Communicating Privately & Anonymously - Instant Messaging 4

        • Lecture6.1
          Introduction to Jabber / XMPP 08 min
        • Lecture6.2
          Setting up XMPP with Pidgin 08 min
        • Lecture6.3
          Enabling End-to-end Encryption in Pidgin 08 min
        • Lecture6.4
          Verifying Contacts 06 min
      • File Management & File Sharing 5

        • Lecture7.1
          Introduction 01 min
        • Lecture7.2
          Clearing Metadata & Basic File Sharing 11 min
        • Lecture7.3
          Sharing Files Privately & Anonymously 07 min
        • Lecture7.4
          Securely Removing Files 06 min
        • Lecture7.5
          Securely Wiping & Encrypting Storage Devices 06 min
      • Encryption 9

        • Lecture8.1
          What is Encryption & Why Its Important? 02 min
        • Lecture8.2
          Symmetric VS Asymmetric encryption 09 min
        • Lecture8.3
          Generating a PGP Key Pair 07 min
        • Lecture8.4
          Importing & Exporting Keys 11 min
        • Lecture8.5
          Encrypting & Decrypting Text 08 min
        • Lecture8.6
          Introduction to Digital Signatures 06 min
        • Lecture8.7
          Signing Messages & Verifying Signatures 06 min
        • Lecture8.8
          Encrypting, Signing, Verifying & Decrypting Files 11 min
        • Lecture8.9
          Using Key Servers 09 min
      • Cryptocurrencies 2

        • Lecture9.1
          Introduction – Why Use Cryptocurrency? 03 min
        • Lecture9.2
          What is Cryptocurrency & How It works 08 min
      • Cryptocurrencies - Bitcoin 8

        • Lecture10.1
          Installing a Bitcoin Wallet 09 min
        • Lecture10.2
          Creating a Bitcoin Wallet 07 min
        • Lecture10.3
          4 Ways to Anonymously Get Biotcoins 09 min
        • Lecture10.4
          Using Bitcoin ATMs 08 min
        • Lecture10.5
          Using P2P Services 13 min
        • Lecture10.6
          Sending & Receiving Bitcoins 05 min
        • Lecture10.7
          Introduction to Mixers / Tumblers 07 min
        • Lecture10.8
          Improve Bitcoin Anonymity Using Mixers 06 min
      • Cryptocurrencies - Monero 7

        • Lecture11.1
          What is Monero 08 min
        • Lecture11.2
          Creating a Monero Wallet 07 min
        • Lecture11.3
          Restoring Wallet on TAILS 04 min
        • Lecture11.4
          4 ways to Anonymously Get Monero 09 min
        • Lecture11.5
          Crypt-exchanges – Converting One Cryptocurrency to Another 05 min
        • Lecture11.6
          Using a Crypto Exchanges to Increase Anonymity 08 min
        • Lecture11.7
          Conclusion 03 min
      • Qubes OS 13

        • Lecture12.1
          What is Qubes & Why Use it? 09 min
        • Lecture12.2
          Installation Options & Verifying Qubes 12 min
        • Lecture12.3
          Flashing Qubes to USB 03 min
        • Lecture12.4
          Preparing Computer For Qubes 07 min
        • Lecture12.5
          Installing Qubes 10 min
        • Lecture12.6
          Qubes Basics 11 min
        • Lecture12.7
          Overview of The Security Domains in Qubes 07 min
        • Lecture12.8
          Working With Multiple Security Domains Simultaneously 10 min
        • Lecture12.9
          Handling Files & Text Across The Different Security Domains 10 min
        • Lecture12.10
          Installing Software to Specific Domains 12 min
        • Lecture12.11
          Handling Malware/Viruses & Suspicious Files Securely 11 min
        • Lecture12.12
          Connecting to TOR From Qubes Using Whonix Gateway 10 min
        • Lecture12.13
          Installing Software on Whonix 10 min
      • Bonus Section 1

        • Lecture13.1
          Bonus Lecture – What’s Next?

        What is Monero

        https://zsecurity.org/wp-content/uploads/2019/10/Crypto-Monero-Intro-And-Downloading-Wallet-1.mp4

        Monero is a cryptocurrency that is designed to be untraceable, its much more private and anonymous than Bitcoin, this lecture will introduce you to this amazing cryptocurrency and teach you how to download and verify a Monero wallet.

        Prev Improve Bitcoin Anonymity Using Mixers
        Next Creating a Monero Wallet

        “Everything related to ethical hacking

        & cyber security in one place.”

        Quick Links

        • Home
        • About Us
        • Hacking & Security
        • Contact
        • FAQ

        Services

        • Penetration Testing
        • Consulting
        • Code Review
        • One on one training
        • VPN
        • VIP Membership

        Company

        • About Us
        • Contact

        Support

        • FAQ
        • Forums

        Copyright © 2021 zSecurity Ltd. All rights reserved.

        • Privacy
        • Terms

        Contribute

        Share your knowledge with the world

        SUBMIT AN ARTICLE

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account

        Are you a member? Login now

        Modal title

        Message modal