Course curriculum

  • 1

    Overview Of Security

    • 1.1- Overview of Section 1

    • 1.2- Intro to Tails

    • 1.3- Tails Deep Dive

    • 1.4- Tails on USB Setup

    • 1.5- Tails Alternatives

    • 1.6- Virtual Box Intro

    • 1.7

    • 1.8 Cryptography 101

    • 1.9- Disk Encryption

    • 1.10- File Shredding

    • 1.11- File Shredding Lab

    • 1.12- Cold Boot Attacks

    • 1.13

  • 2

    Tor, Tails and Encryption

    • 2.1- Overview of Section 2mp4

    • 2.2- Intro to Tor

    • 2.3- Tor Deep Dive

    • 2.4- Tor Deep Dive 2

    • 2.5- Installing Tor

    • 2.6- Tor Vulnerabilities

    • 2.7- Tor and VPN

    • 2.8- Tor Bridges

    • 2.9- PGP

    • 2.10- PGP on Tails

    • 2.11- Review

  • 3

    Additional Security Information

    • 3.1- Introduction

    • 3.2- Passwords

    • 3.3- Onlin Interactions

    • 3.4-Cookies

    • 3.6-Bad OPSEC

    • 3.5-Cyrpto

    • 3.7- Anonymous Email

  • 4

    Course Wrap Up

    • 4.1- Introduction

    • 4.2- How Far_

    • 4.3- Common arrest causes

    • 4.4- Scare Tactics

    • 4.5-Final Words