Internet privacy and security course
The list of parts and chapters of the free Internet privacy and security course from CyberYozh security group.
- Introduction
- What do I learn from this course?
- The importance of donations
- How to stay up to date with our latest publications.
- The shield, the mask and the sword: why we are teaching you to attack
- Test your online privacy and security.
- Help and answers to your questions
- Pieces of advice how to work with the course
- The most important advice of the course
- Threats
- Cyber-warfare, cyber diversions and cyber terrorism
- Digital data loss
- Planting digital evidence
- Digital identity theft
- Peeping information on the screen
- Deanonymization and unicalization
- Privacy violation and tracking
- Physical access and computer forensics
- Mass surveillance systems
- Data leakage
- Cyber spying
- Mass hacking of devices
- Telemetry
- Internet censorship
- Dangerous search
- How hackers get caught
- Common misconceptions
- Virtual operating systems
- Creating a virtual machine
- Snapshots and virtual machine cloning
- Why you shouldn’t use shared folders, shared clipboard and Drag’n’Drop
- Encrypting Virtual Machine Data in VirtualBox
- The information VirtualBox stores about users
- Virtual machines’ vulnerabilities. How hackers go beyond the virtual environment.
- Virtual machine and virtual operating system
- Password
- Creating a secure password
- The secrets of a strong password
- A huge mistake or how exactly you should not keep passwords
- Secure ways to store passwords
- Password Managers or Ross Ulbricht's Fatal Mistake
- MiniKeePass is a password manager for iOS (iPhone / iPad)
- KeePassXС. Setting up a password manager for macOS.
- Emergency erasure of saved passwords
- Operating systems
- Encryption
- History of encryption. Rivalry between encryption and special agencies.
- Encrypted file-hosted volumes
- A brief history of TrueCrypt. Unprovability of encrypted file-hosted volumes.
- Your TrueCrypt is spying on you
- Installing and setting up basic security in TrueCrypt
- How to install and set up basic security in VeraCrypt
- VeraCrypt. VeraCrypt vs TrueCrypt
- Creating and using a secure encrypted file-hosted volume with TrueCrypt / VeraCrypt
- Encryption of external data storage devices with TrueCrypt and VeraCrypt
- Secrets of working safely with encrypted file-hosted volumes TrueCrypt and VeraCrypt
- AES Crypt. A straightforward, cross-platform solution for file encryption.
- Encrypting files with AES Crypt on Windows and macOS
- Emergency destruction of encrypted file-hosted volumes
- The methods of breaking encrypted file-hosted volumes and how to protect yourself from them
- Encryption of operating system
- Social media
- Tails and Whonix
- Mass surveillance systems
- Deanonymization
- Cross-device tracking. Deanonymization of users of Tor, VPN, proxy using sound beacons
- Timing attack. How the special services deanonymize the users of messengers
- How the FBI obtains authentic IP addresses of criminals using Tor, VPN or proxy
- Deanonymization of VPN and proxy users through the User agent and browser fingerprints
- Deanonymization of Tor users through bait files
- How to get a Telegram-linked mobile number
- De-anonymization of users of messengers using P2P-connection
- What you can find out based on the photos on the network.
- Browser
- Cloud Storage
- Cyber spying
- Cyber spying through mobile phone
- How to check if you are not being spied on your mobile phone
- Cyber spying through computer repair centers
- Cyber spying through wireless keyboards and mice. “MouseJack” attack.
- Tapping premises using speakers and acoustic systems
- Cyber espionage through smart TVs
- Cyber espionage through monitor emanation analysis
- Universal method of deleting programs for cyber espionage
- Hacking, erasure and cyber espionage via USB cables.
- Account hacking
- External media devices
- Data theft
- IP address
- Instant messengers
- Disrupting the continuity of correspondence. One-time-use note services.
- XMPP (Jabber). How do they communicate in darknet?
- Bitmessage. The most anonymous messenger.
- A trap for hackers: checking if someone is reading your correspondence.
- Encrypting your correspondence in a browser.
- Link substitution in messengers
- Four secrets of safe communication for hackers
- General principles of secure communication in the network
- Steganography and concealed data storage
- MAC address
- Software
- Data leaks
- Personal Information
- Tor
- PGP
- Malicious software
- Identity theft
- Forensics
- Search engines
- Anti-computer forensics
- Images
- VPN
- SMS
- Wiping data
- Information for readers