Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,480 --> 00:00:02,070
So well can the Volume 3.
2
00:00:02,140 --> 00:00:06,120
Let's talk about the goals and learning objectives for this volume.
3
00:00:06,120 --> 00:00:12,990
Volume Three takes a detailed look at how to stay anonymous online how to maintain privacy and how to
4
00:00:12,990 --> 00:00:14,600
bypass sensors.
5
00:00:14,760 --> 00:00:22,320
After this call you will have a detailed understanding of how anonymity online might be achieved against
6
00:00:22,380 --> 00:00:25,260
various types of adversaries.
7
00:00:25,260 --> 00:00:32,970
You'll learn how to apply effective OPSEC or operational security for maintaining anonymity online OPSEC
8
00:00:32,970 --> 00:00:38,510
is the actions and behaviors required in order to maintain security and anonymity.
9
00:00:38,640 --> 00:00:44,070
We look at live operating systems what they are which are the best ones and how they can be used for
10
00:00:44,070 --> 00:00:44,760
security.
11
00:00:44,760 --> 00:00:51,690
Privacy and anonymity you'll gain a complete understanding of how to use Virtual Private Networks Orsino's
12
00:00:51,870 --> 00:00:56,160
VPN for security privacy and to attempt anonymity.
13
00:00:56,460 --> 00:01:01,020
Everything from choosing a provider to preventing protocol leaks.
14
00:01:01,020 --> 00:01:08,250
We will explore the anonymising service and department known as toll alter its weaknesses what you can
15
00:01:08,250 --> 00:01:13,460
do to mitigate those witnesses to improve your anonymity and security.
16
00:01:13,470 --> 00:01:20,610
When you were using Tor including exploring the use of virtual and hardware routers and gateways you
17
00:01:20,610 --> 00:01:26,230
will learn how proxy servers are useful privacy and for hiding your IP address.
18
00:01:26,250 --> 00:01:32,400
You understand the difference between the various types of proxies what they are suitable for and importantly
19
00:01:32,670 --> 00:01:39,780
learn about them any weaknesses we cover how to use the extremely versatile S-sh protocol for optimal
20
00:01:39,780 --> 00:01:47,970
security privacy and anonymity covering local remote and dynamic port forwarding also authentication
21
00:01:48,000 --> 00:01:50,100
and hardening of S-sh.
22
00:01:50,160 --> 00:01:55,830
You'll understand the ITP dot net and how to best use it with optimal configuration to protect your
23
00:01:55,830 --> 00:01:58,260
security and anonymity.
24
00:01:58,260 --> 00:02:05,100
We look at all the privacy and anonymizing services too such as John do name bottlenecked bullet proof
25
00:02:05,100 --> 00:02:13,110
hosting and others recovering detail how censorship can be circumvented by learning how to bypass firewall
26
00:02:13,140 --> 00:02:19,120
proxies Deepak inspection technology and even Nation-State censorship.
27
00:02:19,530 --> 00:02:27,690
Then we learn the more advanced methods of anonymization by exploring nesting and chaining and NMT services
28
00:02:27,690 --> 00:02:28,470
together.
29
00:02:28,650 --> 00:02:35,370
You understand their strengths weaknesses and what each chaining method is suitable for.
30
00:02:35,580 --> 00:02:43,260
You understand how to use offsite connections such as Wi-Fi hot spots Internet cafes for privacy and
31
00:02:43,520 --> 00:02:51,720
NMT how to use them securely and anonymously even against well resourced adversaries with global influence
32
00:02:51,990 --> 00:02:53,630
such as nation states.
33
00:02:53,700 --> 00:02:57,920
MacIver how to use cellular networks for privacy and anonymity.
34
00:02:57,930 --> 00:03:06,360
You understand the weaknesses of cellular networks and how to best use those for privacy and anonymity
35
00:03:06,750 --> 00:03:07,990
for U.S. in this course.
36
00:03:08,010 --> 00:03:14,260
You will learn both the theory and how to step by step set up each method.
37
00:03:14,400 --> 00:03:19,650
If you want to know about the previous volumes and the continuation of the course through the all the
38
00:03:19,650 --> 00:03:22,050
volumes check out the bonus lectures.
39
00:03:22,080 --> 00:03:30,010
At the end to understand how all of these volumes fit together into one complete course on cybersecurity
40
00:03:30,020 --> 00:03:30,270
.
41
00:03:30,360 --> 00:03:38,780
This is volume three of four of your complete guide to security privacy and anonymity.
4718
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.