All language subtitles for 007 Goals and Learning Objectives-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,480 --> 00:00:02,070 So well can the Volume 3. 2 00:00:02,140 --> 00:00:06,120 Let's talk about the goals and learning objectives for this volume. 3 00:00:06,120 --> 00:00:12,990 Volume Three takes a detailed look at how to stay anonymous online how to maintain privacy and how to 4 00:00:12,990 --> 00:00:14,600 bypass sensors. 5 00:00:14,760 --> 00:00:22,320 After this call you will have a detailed understanding of how anonymity online might be achieved against 6 00:00:22,380 --> 00:00:25,260 various types of adversaries. 7 00:00:25,260 --> 00:00:32,970 You'll learn how to apply effective OPSEC or operational security for maintaining anonymity online OPSEC 8 00:00:32,970 --> 00:00:38,510 is the actions and behaviors required in order to maintain security and anonymity. 9 00:00:38,640 --> 00:00:44,070 We look at live operating systems what they are which are the best ones and how they can be used for 10 00:00:44,070 --> 00:00:44,760 security. 11 00:00:44,760 --> 00:00:51,690 Privacy and anonymity you'll gain a complete understanding of how to use Virtual Private Networks Orsino's 12 00:00:51,870 --> 00:00:56,160 VPN for security privacy and to attempt anonymity. 13 00:00:56,460 --> 00:01:01,020 Everything from choosing a provider to preventing protocol leaks. 14 00:01:01,020 --> 00:01:08,250 We will explore the anonymising service and department known as toll alter its weaknesses what you can 15 00:01:08,250 --> 00:01:13,460 do to mitigate those witnesses to improve your anonymity and security. 16 00:01:13,470 --> 00:01:20,610 When you were using Tor including exploring the use of virtual and hardware routers and gateways you 17 00:01:20,610 --> 00:01:26,230 will learn how proxy servers are useful privacy and for hiding your IP address. 18 00:01:26,250 --> 00:01:32,400 You understand the difference between the various types of proxies what they are suitable for and importantly 19 00:01:32,670 --> 00:01:39,780 learn about them any weaknesses we cover how to use the extremely versatile S-sh protocol for optimal 20 00:01:39,780 --> 00:01:47,970 security privacy and anonymity covering local remote and dynamic port forwarding also authentication 21 00:01:48,000 --> 00:01:50,100 and hardening of S-sh. 22 00:01:50,160 --> 00:01:55,830 You'll understand the ITP dot net and how to best use it with optimal configuration to protect your 23 00:01:55,830 --> 00:01:58,260 security and anonymity. 24 00:01:58,260 --> 00:02:05,100 We look at all the privacy and anonymizing services too such as John do name bottlenecked bullet proof 25 00:02:05,100 --> 00:02:13,110 hosting and others recovering detail how censorship can be circumvented by learning how to bypass firewall 26 00:02:13,140 --> 00:02:19,120 proxies Deepak inspection technology and even Nation-State censorship. 27 00:02:19,530 --> 00:02:27,690 Then we learn the more advanced methods of anonymization by exploring nesting and chaining and NMT services 28 00:02:27,690 --> 00:02:28,470 together. 29 00:02:28,650 --> 00:02:35,370 You understand their strengths weaknesses and what each chaining method is suitable for. 30 00:02:35,580 --> 00:02:43,260 You understand how to use offsite connections such as Wi-Fi hot spots Internet cafes for privacy and 31 00:02:43,520 --> 00:02:51,720 NMT how to use them securely and anonymously even against well resourced adversaries with global influence 32 00:02:51,990 --> 00:02:53,630 such as nation states. 33 00:02:53,700 --> 00:02:57,920 MacIver how to use cellular networks for privacy and anonymity. 34 00:02:57,930 --> 00:03:06,360 You understand the weaknesses of cellular networks and how to best use those for privacy and anonymity 35 00:03:06,750 --> 00:03:07,990 for U.S. in this course. 36 00:03:08,010 --> 00:03:14,260 You will learn both the theory and how to step by step set up each method. 37 00:03:14,400 --> 00:03:19,650 If you want to know about the previous volumes and the continuation of the course through the all the 38 00:03:19,650 --> 00:03:22,050 volumes check out the bonus lectures. 39 00:03:22,080 --> 00:03:30,010 At the end to understand how all of these volumes fit together into one complete course on cybersecurity 40 00:03:30,020 --> 00:03:30,270 . 41 00:03:30,360 --> 00:03:38,780 This is volume three of four of your complete guide to security privacy and anonymity. 4718

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.