Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
Deep Web Security Guide- Become a Ghost Online
Computer Security & Local Threat
What we will cover in Section 1 (1:58)
Introduction to the Tails Operating System (5:00)
Let's get a better understanding of Tails (2:55)
Setting up Tails OS on a USB (8:08)
Alternatives to the Tails OS (2:11)
What is Virtual Box? (5:31)
Let's setup Virtual Box with Tails OS (8:34)
Cryptography 101 (6:22)
Disk Encryption (2:30)
File Shredding (2:40)
File Shredding Lab (2:20)
Cold Boot and RAM Attacks (4:06)
Local Threat Review (3:46)
Network Communication
Overview of Section 2 (1:44)
Intro to Tor (6:03)
Tor Deep Dive (6:57)
Tor Deep Dive 2 (1:49)
Installing Tor (5:19)
Tor Vulnerabilities (9:07)
Tor and VPN (2:51)
Tor Bridges (12:59)
PGP (4:18)
PGP on Tails (6:18)
Review (1:26)
Online Operations
What Section 3 will cover. (0:59)
Passwords (1:52)
Online Interaction (2:31)
Cookies-Flash-HTML5 (4:39)
Cryptocurrency Basics (1:31)
Bad OPSEC (4:35)
Anonymous Email (2:24)
Law Enforcement
Section 4 Overview (1:04)
How far will law enforcement go? (1:54)
Most common errors that can lead to arrest. (2:42)
Scare Tactics (1:22)
Final Words (1:46)
PGP on Tails
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock