Security Quick Win!
Target Audience
Study Recommendations
Course updates
Cyber Security and Ethical Hacking Careers
In this section we go through the goals and objectives for volume III
Goals and Learning Objectives
Learn the habits and behaviors used to enforce good security. The most underrated security control that if done poorly is the most likely to destroy your security, privacy and or anonymity.
Introduction to OPSEC
Identities, pseudonyms and aliases (Identity Strategies)
Establishing Cover
Identify Cross Contamination
10 Rules of OPSEC
Authorship Recognition and Evasion Methods
The knock
Case Studies of OPSEC Failures
Learn how to use live operating system, what are the best and how they can be used to benefit your security, privacy and anonymity.
Introduction to live operating systems
Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go
Tails
Tails Demo
The objective of this section is to gain a complete understanding on how to use VPNs (or virtual private networks) for security and privacy.
Introduction to VPNs
Which VPN protocol is best to use? and why?
VPN Weaknesses
Can you trust VPN providers?
VPNs and Domain Name System (DNS) Leaks
Setting up an OpenVPN client in Windows, Mac, iPhone and Android
Setting up an OpenVPN client on Linux
Preventing VPN Leaks - Firewalls and kill switches
Choosing the right VPN provider
Setting up an OpenVPN server Part 1 - The fast and easy way
Setting up an OpenVPN server Part 2 - Debian client
Setting up an OpenVPN server Part 3 - Home VPN
The objective of this section is fully understand the anonymising service and darknet known as tor. What are its weaknesses and what you can do to mitigate those weaknesses to improve your anonymity.
What is Tor?
The Tor Network and Browser
What should Tor be used for?
Directory Authorities and Relays
Tor Bridges
Tor Pluggable Transports and Traffic Obfuscation
Torrc Configuration File
Running other applications through Tor
Tor Weaknesses Part 1
Tor Weaknesses Part 2
Conclusions on Tor and mitigation to reduce risk
Attacking Tor: how the NSA targets users' online anonymity
Hidden services – The Tor darknet
Finding Tor hidden services
Other Tor Apps
The objective of this section is to learn how virtual and hardware routers and gateways can be used to improve security, privacy and anonymitywhen using Tor and VPNs.
Introduction to VPN and Tor Routers
Custom Router Firmware for VPN & TOR Tunneling
Off the shelf VPN and TOR Routers
DIY Hardware TOR Routers
TOR and VPN Gateway Virtual Machines
The objective of this section is understanding how proxies are used for privacy and hiding your IP address. You will understand the difference between the various types of proxies.
Proxies – HTTP, HTTPS and SOCKS Part 1
Proxies – HTTP, HTTPS and SOCKS Part 2
CGI proxies - Web proxy or web form proxy
The objective of this section is learn how to use the extremely versatile SSH protocol for optimal security, privacy and anonymity. Covering local, remote and dynamic port forwarding.
Introduction & How to Login
SSH Remote Port Forwarding
SSH Local Port Forwarding
SSH Socks5 Proxy Tunneling with Dynamic Ports
SSH Public private key authentication
SSH Hardening
The objective of this section is to understand the invisible Internet project know as I2p which is a darknet. How to use i2p and how to best use it with optimal configuration to protect you.
I2P - Introduction
I2P Installing and Secure Configuration Part 1
I2P Installing and Secure Configuration Part 2
I2P Strengths and Weaknesses
The objective of this section is understand some of the other other privacy and anonymising service that are avialble such as jondonym, botnets and bullet proof hosting services.
JonDonym - Introduction
JonDonym - Installing and Secure Configuration
Bullet Proof Hosting Services (BPHS)
Botnets and Hacked Boxes
The objective of this section is understand how censorship can be circumvented by learning how to bypass firewalls, proxies, deep packet inspection technology and nation state censorship.
Outbound Firewall Bypassing - The Fundamentals Part 1
Outbound Firewall Bypassing - The Fundamentals Part 2
Outbound Bypassing - Tunneling through HTTP proxies
Outbound Bypassing - Port Sharing and Knocking
Outbound Bypassing – Cloaking and Obfuscating
Outbound Bypassing - Remote login - VNC and RDP
Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login
The objective of this section is to understand how to use off-site connections such as Wi-Fi hotspots and Internet cafes for privacy and anonymity. How to use them securely and anonymously.