Why Choose Us?

  • Best Seller

  • Online Courses

  • 24/7 Support

  • Lifetime Access

  • Get Certificate

Course curriculum

    1. 1 - Introduction to Privacy Anonymity Security

    2. 2 - Course Breakdown

    3. 3 - Introduction to TOR

    4. 4 - Introduction to Hidden Services Onion Services

    5. 5 - Connecting to TOR

    1. 6 - Section Intro Breakdown

    2. 7 - What is The TOR Browser

    3. 8 - Verifying Installing TOR Browser on Windows

    4. 9 - Verifying Installing TOR Browser on Mac OS X

    5. 10 - Verifying Installing TOR Browser on Linux

    6. 11 - TOR Bridges Pluggable Transports

    7. 12 - Bypassing TOR Censorship

    8. 13 - Intro to Virtual Private Networks VPN How to Use it with TOR

    9. 14 - Configuring TOR Browser For Maximum Security Anonymity

    10. 15 - TOR Browser Security Settings Intro to Information Theory

    1. 16 - Disadvantages of Using The TOR Browser on Windows OS X or Linux

    2. 17 - What is TAILS

    3. 18 - TAILS Installation Options

    4. 19 - Installing TAILS From All Operating Systems

    5. 20 - Starting TAILS on All Operating Systems

    6. 21 - TAILS Basics Part 1

    7. 22 - TAILS Basics Part 2

    8. 23 - What is Persistence Why We Need it

    9. 24 - Enabling Encrypted Persistence

    10. 25 - Bypassing Censorship Using Bridges Plugable Transports

    11. 26 - Using The TOR Browser on Tails

    12. 27 - Connecting to Captive Portals

    13. 28 - Connecting to VPN From TAILS Method 1

    14. 29 - Connecting to VPN From TAILS Method 2

    1. 30 - Introduction Breakdown of Next Sections

    2. 31 - Discovering Hidden Services Using Darknet Search Engines

    3. 32 - Discovering Hidden Services Using Listings Onion Services

    1. 33 - Creating a Fake Anonymous Identity

    2. 34 - Using Temporary Email Accounts

    3. 35 - Using Privacy Focused Email Providers

    4. 36 - Using DarkNet Email Providers

    5. 37 - Picking The Right Email Service

    1. 38 - Introduction to Jabber XMPP

    2. 39 - Setting up XMPP with Pidgin

    3. 40 - Enabling Endtoend Encryption in Pidgin

    4. 41 - Verifying Contacts

About this course

  • $59.00
  • 85 lessons
  • 10.5 hours of video content

Discover your potential, starting today

Hurry! This Exclusive Deal Ends In

Don’t miss out on this opportunity to upskill with Learn Ezy!

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds

Get In Touch

Add your email to the mailing list to get the latest updates.

Thank You