Introduction
  • Welcome to Volume III
  • Introduction to the Instructor!
  • Security Quick Win!
  • Target Audience
  • Study Recommendations
  • Course updates
  • Cyber Security and Ethical Hacking Careers
Goals and Objectives for Volume III
  • Goals and Learning Objectives
OPSEC (Operational Security)
  • Goals and Learning Objectives
  • Introduction to OPSEC
  • Identities, pseudonyms and aliases (Identity Strategies)
  • Establishing Cover
  • Identify Cross Contamination
  • 10 Rules of OPSEC
  • Authorship Recognition and Evasion Methods
  • The knock
  • Case Studies of OPSEC Failures
Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu
  • Goals and Learning Objectives
  • Introduction to live operating systems
  • Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go
  • Tails
  • Tails Demo
Virtual Private Networks (VPNs)
  • Goals and Learning Objectives
  • Introduction to VPNs
  • Which VPN protocol is best to use? and why?
  • VPN Weaknesses
  • Can you trust VPN providers?
  • VPNs and Domain Name System (DNS) Leaks
  • Setting up an OpenVPN client in Windows, Mac, iPhone and Android
  • Setting up an OpenVPN client on Linux
  • Preventing VPN Leaks - Firewalls and kill switches
  • Choosing the right VPN provider
  • Setting up an OpenVPN server Part 1 - The fast and easy way
  • Setting up an OpenVPN server Part 2 - Debian client
  • Setting up an OpenVPN server Part 3 - Home VPN
Tor
  • Goals and Learning Objectives
  • What is Tor?
  • The Tor Network and Browser
  • What should Tor be used for?
  • Directory Authorities and Relays
  • Tor Bridges
  • Tor Pluggable Transports and Traffic Obfuscation
  • Torrc Configuration File
  • Running other applications through Tor
  • Tor Weaknesses Part 1
  • Tor Weaknesses Part 2
  • Conclusions on Tor and mitigation to reduce risk
  • Attacking Tor: how the NSA targets users' online anonymity
  • Hidden services – The Tor darknet
  • Finding Tor hidden services
  • Other Tor Apps
VPN and Tor Routers
  • Goals and Learning Objectives
  • Introduction to VPN and Tor Routers
  • Custom Router Firmware for VPN & TOR Tunneling
  • Off the shelf VPN and TOR Routers
  • DIY Hardware TOR Routers
  • TOR and VPN Gateway Virtual Machines
Proxies – HTTP, HTTPS, SOCKs and Web
  • Goals and Learning Objectives
  • Proxies – HTTP, HTTPS and SOCKS Part 1
  • Proxies – HTTP, HTTPS and SOCKS Part 2
  • CGI proxies - Web proxy or web form proxy
SSH Secure Shell
  • Goals and Learning Objectives
  • Introduction & How to Login
  • SSH Remote Port Forwarding
  • SSH Local Port Forwarding
  • SSH Socks5 Proxy Tunneling with Dynamic Ports
  • SSH Public private key authentication
  • SSH Hardening
I2P - The Invisible Internet Project
  • Goals and Learning Objectives
  • I2P - Introduction
  • I2P Installing and Secure Configuration Part 1
  • I2P Installing and Secure Configuration Part 2
  • I2P Strengths and Weaknesses
Other Privacy and Anonymising Services
  • Goals and Learning Objectives
  • JonDonym - Introduction
  • JonDonym - Installing and Secure Configuration
  • Bullet Proof Hosting Services (BPHS)
  • Botnets and Hacked Boxes
Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection
  • Goals and Learning Objectives
  • Outbound Firewall Bypassing - The Fundamentals Part 1
  • Outbound Firewall Bypassing - The Fundamentals Part 2
  • Outbound Bypassing - Tunneling through HTTP proxies
  • Outbound Bypassing - Port Sharing and Knocking
  • Outbound Bypassing – Cloaking and Obfuscating
  • Outbound Bypassing - Remote login - VNC and RDP
  • Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login
Chaining/Nesting Privacy and Anonymising Services
  • Goals and Learning Objectives