All language subtitles for 2. Course Breakdown

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,690 --> 00:00:07,230 Now before diving into the course content I'd like to give you a quick overview of the content of the 2 00:00:07,230 --> 00:00:07,760 course. 3 00:00:08,280 --> 00:00:15,360 So as you know in this course we're going to be covering four main topics anonymity privacy the dark 4 00:00:15,360 --> 00:00:20,350 web and security so we'll start with anonymity. 5 00:00:20,430 --> 00:00:25,800 And we're going to introduce you to the tour network which is the anonymous rising network there that 6 00:00:25,800 --> 00:00:31,560 we're going to use throughout the whole course you're going to learn how it works and how to connect 7 00:00:31,560 --> 00:00:37,530 to it to improve our privacy and anonymity and to access the dark web. 8 00:00:37,560 --> 00:00:44,790 So we'll start with the basics of the Tor Browser how to properly install it on Linux Windows and OS 9 00:00:44,820 --> 00:00:53,190 X configure it for maximum security and anonymity and bypass censorship to connect to the terror network 10 00:00:53,400 --> 00:00:59,580 even if it's blocked once done with the basics will move to the next level where we're going to use 11 00:00:59,580 --> 00:01:05,650 an operating system that is designed to be more private and more anonymous. 12 00:01:05,850 --> 00:01:12,420 First I'm going to teach you how to properly configure it and install it on a USB stick so we can use 13 00:01:12,420 --> 00:01:20,850 this USB stick to use this operating system from any computer to anonymously access both the darknet 14 00:01:20,940 --> 00:01:24,360 and the clear net without affecting this computer. 15 00:01:24,360 --> 00:01:32,430 And without leaving any traces on it then the course is divided into a number of subsections or modules 16 00:01:32,700 --> 00:01:39,650 that'll teach you how to anonymously and privately use both the clear net and the darknet. 17 00:01:39,690 --> 00:01:46,140 You'll also learn how to carry out your normal online tasks in a more private and more anonymous manner 18 00:01:46,470 --> 00:01:52,290 so you'll learn how to search for content on both on the clear net and on the darknet how to communicate 19 00:01:52,290 --> 00:01:59,190 using emails using instant messages share files and handle files and how to use your whole file system 20 00:01:59,250 --> 00:02:05,080 and hold computer in a more private more secure and more anonymous manner. 21 00:02:05,070 --> 00:02:11,550 Then we're going to have a full section on encryption where you'll learn what we mean by asymmetric 22 00:02:11,550 --> 00:02:19,050 symmetric an end to end encryption how to properly and manually encrypt data whether it's simple text 23 00:02:19,290 --> 00:02:25,680 or files so that they are useless to anybody that intercepts this data. 24 00:02:25,680 --> 00:02:31,890 You'll also learn how to sign data so the receiver can verify that it was actually sent from you and 25 00:02:31,890 --> 00:02:36,370 how to verify the integrity of data that you receive. 26 00:02:36,390 --> 00:02:38,160 This is very very important. 27 00:02:38,190 --> 00:02:45,060 If you're serious about protecting your privacy and if you want to communicate with people on the darknet 28 00:02:45,390 --> 00:02:51,390 because some people will simply refuse to communicate with you unless you use encryption the way that 29 00:02:51,390 --> 00:02:58,650 I'm going to show you in the section there is also a full section on cryptocurrency because as we know 30 00:02:58,710 --> 00:03:04,590 the traditional payment methods that we know use in PayPal or using credit cards or other clear net 31 00:03:04,590 --> 00:03:08,490 payment methods are simply not private and not anonymous. 32 00:03:08,490 --> 00:03:14,130 So in the section you'll first learn how crypto currencies work and how to obtain crypto and handle 33 00:03:14,130 --> 00:03:21,030 it privately and anonymously throughout all of these sections we're going to use fully priced systems 34 00:03:21,360 --> 00:03:27,750 but in the last section of the course I'm going to teach you how to take your security to the next level 35 00:03:27,990 --> 00:03:33,880 by dividing your computer into a number of isolated security domains. 36 00:03:33,900 --> 00:03:40,350 So even if you get hacked or if you open malware it would be very difficult for the hacker or for the 37 00:03:40,350 --> 00:03:44,940 malware to compromise your default system and the anonymize you. 4617

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.