Free courses on anonymity and security

Carder

Professional
Messages
2,619
Reputation
9
Reaction score
1,719
Points
113
Paranoid II-course on anonymity and security (2020)

Paranoid II
-a logical continuation of the course on anonymity in the Paranoid network

Instructor: ghost

What the course is about: a set of measures to protect information, privacy, personal data protection, anonymity on the Internet and more ...;

Who this course is for: people who need a high degree of privacy and information protection;

We will provide: access to video and text materials, as well as personal consultations within the course;

What else: practical tasks for each lesson.

The course consists of 10 lessons:
  1. Configuring the working environment. Improved and redesigned work with virtual machines (perhaps the only analogy with the previous course);
  2. Fine work with different cryptocurrencies;
  3. Choosing, renting, managing, and protecting a VPS (70% of the course's work takes place on servers);
  4. Installing and configuring services on a VPS and working with them;
  5. Fine-grained work with Tor services;
  6. Getting the most out of the Raspberry Pi;
  7. Anonymous routers;
  8. Creating, configuring, and administering a Tor node;
  9. Working with PC hardware. Deleting hardware bookmarks;
  10. Risk minimization and ... author's developments.
?Download

Paranoid 1 - course on anonymity and security on the Internet (2018)

You won't waste a second of extra time. Course without water and extra blah-blah-blah from the word completely. How did we do it ? We cut the course in half from the original size, and removed what is usually viewed on rewind. Then they cut it in half again. There is a sufficient minimum left.

?Download

[PLASTIK] University of Cybersecurity and Anonymity 2.0 (2020)

Security


* Set up a completely anonymous and secure system

* Bypassing surveillance by the provider

* System-level disk encryption

* Creation of cryptographic containers and secure data storage outside the system

* The substitution of unique settings of system and browser to bypass fingerprint

* Encryption and obfuscation of the source

* Entering and withdrawing currency on the darknet

* Cryptocurrency bleaching

* Prevent leakage of real data

* To maintain a session, to bypass the banking checks

* Set up an anonymous virtual machines

* Protection against penetration into the main system

* Intercept traffic in the system and on the server

* Protection against zero-day attacks

* Bundles for secure and anonymous Internet access

* Double VPN and its work in conjunction with tor

* Protection against VPN drops and leaks due to network failures

* Work via a remote windows system

* Software for system configuration and cleaning

* Disable suspicious features in windows

* Bypass leaks via meta-information in files

* DNS leak protection

* Countering calculation through log analysis

* Use of left cards and SIM cards

* Money laundering and cash withdrawal schemes

?Download

[EXELAB] Video course HACKING 2019

It includes not one, but as many as 4 global areas of knowledge: hacking, program hacking, reverse engineering, and programming. There are more than 400 video tutorials in one course and this is a record! This means that by choosing any of the four main topics, you will always get a lot of video tutorials that reveal the essence. In addition, there are as many as 800 specialized tools from hacking to programming - you will definitely find the right one. And a solid surplus of 100 books published over the past three years, of course, dedicated to hacking and programming.

I want to note right away that all my video tutorials call for the ethical use of the acquired knowledge: I do not call for breaking laws, hacking other people's websites and programs, or violating the interests of other people and companies.

?Download

Password: www.sharewood.biz

[Сyberyozh] Course on anonymity and online security (2020)

A list of parts and chapters of the free course on anonymity and online security from CyberYozh security group.

?Download
 

kasper2

Carder
Messages
51
Reputation
0
Reaction score
11
Points
8
[PLASTIK] University of Cybersecurity and Anonymity 2.0 (2020)

Security


* Set up a completely anonymous and secure system

* Bypassing surveillance by the provider

* System-level disk encryption

* Creation of cryptographic containers and secure data storage outside the system

* The substitution of unique settings of system and browser to bypass fingerprint

* Encryption and obfuscation of the source

* Entering and withdrawing currency on the darknet

* Cryptocurrency bleaching

* Prevent leakage of real data

* To maintain a session, to bypass the banking checks

* Set up an anonymous virtual machines

* Protection against penetration into the main system

* Intercept traffic in the system and on the server

* Protection against zero-day attacks

* Bundles for secure and anonymous Internet access

* Double VPN and its work in conjunction with tor

* Protection against VPN drops and leaks due to network failures

* Work via a remote windows system

* Software for system configuration and cleaning

* Disable suspicious features in windows

* Bypass leaks via meta-information in files

* DNS leak protection

* Countering calculation through log analysis

* Use of left cards and SIM cards

* Money laundering and cash withdrawal schemes
Lovely post, but most of the llnks is expired. i'll appreciate if you could provide a valid link for this manual.
 
Top