In the process of studying the course, we will teach you not only to defend yourself but also to attack: to hack and de-anonymize. And this is probably the most controversial aspect of our work, the most complex from an ethical and legal standpoint. But we have made our choice: we will teach you this, and it is part of defense, perhaps even its main part.
We are deeply convinced that if you don't get acquainted with the sword, the shield is useless. It's better for you to try to hack yourself, understand how it works, and then set up security. It's better if you de-anonymize yourself than others doing it. Many still live with the thought: 'And what's with the IP address? I'm not hiding.' Such people especially need to take their IP address, conduct an attack on their devices, gain access to their webcam or personal data, read their social media messages, track their browser activity.
We live in an era where our activities, contacts, communication, and interests all move online. Being protected there is as important today as being protected in real life. The knowledge, skills, and experience you gain will become an indispensable foundation for your online security, and the skills for anonymous work will help you wear a virtual mask. Because in the network, as in life, it is almost impossible to hit someone you can't see, whose location you don't know. You can't assess an opponent's strength without seeing them, you can't understand their goal, predict their maneuver. The mask is your right, no matter what anyone says.
You should not only be able to set up security but also verify it. Check not with a formal checklist 'done / not done', but with real attacks, such as scanning your system and Wi-Fi router for vulnerabilities with a real tool used by attackers, trying an ARP-spoofing attack against yourself.
But there is another important use for the sword. As they say, the best defense is a good offense. Many attackers feel invulnerable and unpunished in the network, as most users do not know how to defend themselves on the Internet. But you should unmask the criminal, de-anonymize them, and then arrange for them to meet with law enforcement. This is the security as we see it. You can build cool walls in the form of a protected system, a configured firewall, Double VPN with leak blocking (we will teach you this too), but what's the point of such a shield if there is no sword behind it?
The only thing we ask you is not to apply these skills when the situation does not concern your protection, do not break the law. A lot of days and nights were spent writing the course, and we really want to believe that this knowledge will only be used for good.
Perhaps some methods and tools we offer are prohibited in your country, we strongly recommend consulting with a lawyer before using them. Enjoy studying the course, I hope after studying our materials you will enter the network already with a shield, a sword, and a mask.