• Academy
  • Proxy Shop
  • SMS Activation
  • Academy
  • Proxy Shop
  • SMS Activation
  • Theme
Telegramsupport@cyberyozh.com
AcademyProxy ShopSMS Activation
Telegramsupport@cyberyozh.com

Privacy PolicyCookie Policy

©2025 WebGears Services d.o.o. All rights reserved.

Internet privacy and security course

Contents

  • Introduction (8)
  • Threats (14)
  • How hackers get caught (2)
  • Common misconceptions (1)
  • Virtual operating systems (7)
  • Password (8)
  • Operating systems (4)
  • Encryption (14)
  • Encryption of operating system (1)
  • Social media (2)
  • Tails and Whonix (1)
  • Mass surveillance systems (1)
  • Email (4)
  • Deanonymization (8)
  • Browser (2)
  • Cloud Storage (1)
  • Cyber spying (9)
  • Account hacking (2)
  • External media devices (3)
  • Data theft (2)
  • IP address (2)
  • Instant messengers (8)
  • Steganography and concealed data storage (4)
  • MAC address (1)
  • Software (2)
  • Data leaks (1)
  • Personal Information (1)
  • Tor (1)
  • PGP (1)
  • Malicious software (3)
  • Identity theft (3)
  • Forensics (2)
  • Search engines (1)
  • Anti-computer forensics (2)
  • Images (2)
  • VPN (4)
  • SMS (3)
  • Wiping data (3)
  • Information for readers (2)
Introduction
Course Interaction TipsShield, Mask, and Sword. Why We Teach Attacking.How to Follow the Publication of New MaterialsThe most important advice of the courseTest your online privacy and security.Help and answers to your questionsWhat do I learn from this course?The importance of donations
Threats
Cyber spyingDangerous searchTelemetryData leakagePrivacy violation and trackingMass surveillance systemsPhysical access and computer forensicsPeeping information on the screenMass hacking of devicesDigital data lossCyber-warfare, cyber diversions and cyber terrorismPlanting digital evidenceDeanonymization and unicalizationDigital identity theft
How hackers get caught
How hackers get caught sdafasdfsaedfThe fatal mistakes of cybercriminals
Common misconceptions
Why should I need privacy and security on the Internet?
Virtual operating systems
Virtual machine and virtual operating systemCreating a virtual machineSnapshots and virtual machine cloningWhy you shouldn’t use shared folders, shared clipboard and Drag’n’DropEncryption of virtual data on virtual machine VirtualBoxThe information VirtualBox stores about usersVirtual machines’ vulnerabilities. How hackers go beyond the virtual environment.
Password
Creating a secure passwordThe secrets of a strong passwordA huge mistake or how exactly you should not keep passwordsSecure ways to store passwordsPassword Managers or Ross Ulbricht's Fatal MistakeMiniKeePass is a password manager for iOS (iPhone / iPad)KeePassXС. Setting up a password manager for macOS.Emergency erasure of saved passwords
Operating systems
Operating Systems. Choosing your path.iOS. First steps to protect your iPhone and iPad.The myth about the incredible security of macOSQubes OS. System for those who have something to protect.
Encryption
History of encryption. Rivalry between encryption and special agencies.Encrypted file-hosted volumesA brief history of TrueCrypt. Unprovability of encrypted file-hosted volumes.Your TrueCrypt is spying on youInstalling and setting up basic security in TrueCryptHow to install and set up basic security in VeraCryptVeraCrypt. VeraCrypt vs TrueCrypt.Creating and using a secure encrypted file-hosted volume with TrueCrypt / VeraCryptEncryption of external data storage devices with TrueCrypt and VeraCryptSecrets of working safely with encrypted file-hosted volumes TrueCrypt and VeraCryptAES Crypt. A straightforward, cross-platform solution for file encryption.Encrypting files with AES Crypt on Windows and macOSEmergency destruction of encrypted file-hosted volumes
Encryption of operating system
Comprehensive encryption of operating system or hard disk drive
Social media
Forensic analysis of activities on social networksGaffes in social media that turned fatal for the careers of their authors
Tails and Whonix
Tails. A few tips before you start using this operating system.
Mass surveillance systems
Total surveillance: good or evil?
Email
Test: check email for hacking resistanceDeanonimization of email ownerSending Anonymous EmailsProtect data from leakage at the email recipient level
Deanonymization
Cross-device tracking. Deanonymization of users of Tor, VPN, proxy using sound beaconsWhat you can find out based on the photos on the network.Timing attack. How the special services deanonymize the users of messengersHow the FBI obtains authentic IP addresses of criminals using Tor, VPN or proxyDeanonymization of VPN and proxy users through the User agent and browser fingerprintsDeanonymization of Tor users through bait filesHow to get a Telegram-linked mobile numberDe-anonymization of users of messengers using P2P-connection
Browser
Browser history through the eyes of an IT security professionalSecurity professional’s point of view about browser cache
Cloud Storage
Cloud Storage Threats
Cyber spying
How to check if you are not being spied on your mobile phoneCyber spying through computer repair centersCyber spying through wireless keyboards and mice. “MouseJack” attack.Tapping premises using speakers and acoustic systemsCyber espionage through smart TVsCyber espionage through monitor emanation analysisUniversal method of deleting programs for cyber espionageHacking, erasure and cyber espionage via USB cables.Cyber spying through mobile phone
Account hacking
The secret to a secure loginTwo-factor authentication
External media devices
BadUSB. The deadliest threat there is no defense for.Hacking the computer via hotkeys / shortcut keysDangerous flash drives. What can USB connection lead to?
Data theft
Data theft with an attack “web cache deception”The danger of capital letters or forever working phishing scheme
IP address
How do they figure you out by IP addressWhat blacklists are for and the consequences of having your IP address on a blacklist
Instant messengers
General principles of secure communication in the networkDisrupting the continuity of correspondence. One-time-use note services.XMPP (Jabber). How do they communicate in darknet?Bitmessage. The most anonymous messenger.A trap for hackers: checking if someone is reading your correspondence.Encrypting your correspondence in a browser.Link substitution in messengersFour secrets of safe communication for hackers
Steganography and concealed data storage
The secrets of keeping your data concealedDisguise cryptocontainersThe 3 mistakes of Russel Knaggs, or 20 years of imprisonment for a “deleted“ email.Creation of double-bottom cryptocontainers
MAC address
What is MAC address and how is it related to your anonymity?
Software
Open and closed source codes. Errors and situational bugs.Audit of a list of installed programs and applications
Data leaks
Checking data leaks
Personal Information
Data collection by software
Tor
DeepWeb or the hidden internet of Tor
PGP
Intro to PGP
Malicious software
Here’s how you will go through the training course on detecting and removing malicious softwareSafe opening of short linksAttack drive-by download, or secret download.
Identity theft
Preventive measures in order to preclude identity theftHow to check if your identity has not been stolenHow to delete your personal data posted on the network
Forensics
Firewire attackPractical examples of using forensic analysis of photos and videos
Search engines
Anonymous DuckDuckGo Search Engine
Anti-computer forensics
Counter forensics (anti-computer forensics)Secret threat or files from messengers
Images
Hiding data on imagesView, edit and delete image metadata at macOS
VPN
Choose a protocol for VPN. Compare OpenVPN, PPTP, L2TP/IPsec and IPsec IKEv2Choose a reliable VPN: TLS authentication, connection port and session keyChoose a secure VPN: encryption algorithm, key length and data authenticationHow hackers and security services hack VPN
SMS
The security problems of SMS messagesSMS messages that self-destruct. How to check if your SMS are being read.Sending anonymous SMS
Wiping data
Electromagnetic systems for wiping data on hard drivesEmergency data erasure of the computer. How hackers cheat forensics.Emergency erasure of mobile phone and tablet
Information for readers
Collaboration with technical writersUser Agreement

Read and Watch

CyberYozh

  • Telegram
  • YouTube
The methods of breaking encrypted file-hosted volumes and how to protect yourself from them