All language subtitles for 007 Goals and Learning Objectives-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,480 --> 00:00:02,070 So well can the Volume 3. 2 00:00:02,140 --> 00:00:06,120 Let's talk about the goals and learning objectives for this volume. 3 00:00:06,120 --> 00:00:12,990 Volume Three takes a detailed look at how to stay anonymous online how to maintain privacy and how to 4 00:00:12,990 --> 00:00:14,600 bypass sensors. 5 00:00:14,760 --> 00:00:22,320 After this call you will have a detailed understanding of how anonymity online might be achieved against 6 00:00:22,380 --> 00:00:25,260 various types of adversaries. 7 00:00:25,260 --> 00:00:32,970 You'll learn how to apply effective OPSEC or operational security for maintaining anonymity online OPSEC 8 00:00:32,970 --> 00:00:38,510 is the actions and behaviors required in order to maintain security and anonymity. 9 00:00:38,640 --> 00:00:44,070 We look at live operating systems what they are which are the best ones and how they can be used for 10 00:00:44,070 --> 00:00:44,760 security. 11 00:00:44,760 --> 00:00:51,690 Privacy and anonymity you'll gain a complete understanding of how to use Virtual Private Networks Orsino's 12 00:00:51,870 --> 00:00:56,160 VPN for security privacy and to attempt anonymity. 13 00:00:56,460 --> 00:01:01,020 Everything from choosing a provider to preventing protocol leaks. 14 00:01:01,020 --> 00:01:08,250 We will explore the anonymising service and department known as toll alter its weaknesses what you can 15 00:01:08,250 --> 00:01:13,460 do to mitigate those witnesses to improve your anonymity and security. 16 00:01:13,470 --> 00:01:20,610 When you were using Tor including exploring the use of virtual and hardware routers and gateways you 17 00:01:20,610 --> 00:01:26,230 will learn how proxy servers are useful privacy and for hiding your IP address. 18 00:01:26,250 --> 00:01:32,400 You understand the difference between the various types of proxies what they are suitable for and importantly 19 00:01:32,670 --> 00:01:39,780 learn about them any weaknesses we cover how to use the extremely versatile S-sh protocol for optimal 20 00:01:39,780 --> 00:01:47,970 security privacy and anonymity covering local remote and dynamic port forwarding also authentication 21 00:01:48,000 --> 00:01:50,100 and hardening of S-sh. 22 00:01:50,160 --> 00:01:55,830 You'll understand the ITP dot net and how to best use it with optimal configuration to protect your 23 00:01:55,830 --> 00:01:58,260 security and anonymity. 24 00:01:58,260 --> 00:02:05,100 We look at all the privacy and anonymizing services too such as John do name bottlenecked bullet proof 25 00:02:05,100 --> 00:02:13,110 hosting and others recovering detail how censorship can be circumvented by learning how to bypass firewall 26 00:02:13,140 --> 00:02:19,120 proxies Deepak inspection technology and even Nation-State censorship. 27 00:02:19,530 --> 00:02:27,690 Then we learn the more advanced methods of anonymization by exploring nesting and chaining and NMT services 28 00:02:27,690 --> 00:02:28,470 together. 29 00:02:28,650 --> 00:02:35,370 You understand their strengths weaknesses and what each chaining method is suitable for. 30 00:02:35,580 --> 00:02:43,260 You understand how to use offsite connections such as Wi-Fi hot spots Internet cafes for privacy and 31 00:02:43,520 --> 00:02:51,720 NMT how to use them securely and anonymously even against well resourced adversaries with global influence 32 00:02:51,990 --> 00:02:53,630 such as nation states. 33 00:02:53,700 --> 00:02:57,920 MacIver how to use cellular networks for privacy and anonymity. 34 00:02:57,930 --> 00:03:06,360 You understand the weaknesses of cellular networks and how to best use those for privacy and anonymity 35 00:03:06,750 --> 00:03:07,990 for U.S. in this course. 36 00:03:08,010 --> 00:03:14,260 You will learn both the theory and how to step by step set up each method. 37 00:03:14,400 --> 00:03:19,650 If you want to know about the previous volumes and the continuation of the course through the all the 38 00:03:19,650 --> 00:03:22,050 volumes check out the bonus lectures. 39 00:03:22,080 --> 00:03:30,010 At the end to understand how all of these volumes fit together into one complete course on cybersecurity 40 00:03:30,020 --> 00:03:30,270 . 41 00:03:30,360 --> 00:03:38,780 This is volume three of four of your complete guide to security privacy and anonymity. 4718

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.