This is the Third volume of the four-volume course and if you haven’t already you can read my review of volume 1 and 2 over here:-
- VOLUME 1: HACKER’S EXPOSED
- VOLUME 2: NETWORK SECURITY
- VOLUME 3: ANONYMOUS BROWSING
- VOLUME 4: ENDPOINT PROTECTION
I have to start by saying how much I am enjoying these courses by Nathan, they are well structured, very well taught with excellent content.
In volume 3:-
Description
Welcome to Volume 3 of 4 of the Complete Cyber Security Course!
This course covers in detail all the best anonymising and privacy methods including:
Tor
VPNs – Virtual Private Networks
Proxy servers – HTTP, HTTPS, SOCKs and Web
SSH Secure Shell
Live Operating Systems – Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
OPSEC – Operation Security
I2P – The Invisible Internet Project
JonDoNym
Off-site connections – Hotspots and Cafes
Mobile, Cell Phones & Cellular Networks
Bulletproof hosting
and more…
For each of these anonymizing methods the course analyzes in detail their strengths and weaknesses, the techniques used to attack these anonymity services and what you can do to mitigate those de-anonymization attacks.
Advanced anonymity: The course also explores chaining and nesting anonymizing services together to provide layers of obfuscation for maximum anonymity against even the most well-resourced adversaries.
It covers bypassing censors, firewalls, and proxies . You will learn how to bypass the trickiest of censoring devices including DPI (deep packet inspection).
The course covers both the theory and practically how to setup everything we discuss.
Want to Learn Every Possible Detail about Internet Anonymity?
This course is the best comprehensive guide to private and anonymous internet access and “OPSEC” that i have seen out there and this is a very technical walkthrough and I can’t underplay how much I learnt from it.
The course curriculum is the following:-
And of course, there are subsections in each of these like the following.
The course itself starts with the Introduction sections where we learn more about our teacher, the target audience and some study recommendations.
Section two we have the objectives part.
This next section is where we talk about OPSEC (operational Security) with subjects like what is OPSEC, rules of OPSEC, case studies of OPSEC failures and more.
In section four we have a very interesting chat around live operating systems like Tails, Puppy Linux, Jondo etc, I now carry a Tails USB with me around?
Section five is around VPN’s with discussion on whether you can trust VPN providers, VPN protocol’s, how to set up a VPN and more.
Six is around TOR which was a good section, everyone is aware of TOR but a lot maybe not so sure how it actually works as well as the benefits and weaknesses of using one.
Section seven is on VPN and TOR routers, we learn what they are and more on custom router firmware for VPN and TOR tunnelling as well as using TOR and VPN Gateway virtual machines.
In section eight we get to learn about proxies in HTTP, HTTPS, SOCKs and Web.
This section, section nine is BRILLIANT, as someone who is into ethical hacking we were taught about SSH (secure shell) and remote port forwarding, proxy tunnelling and more.
In Ten, we learn about L2P which I had no clue about but basically, I2P is a project to build, deploy, and maintain a network supporting secure and anonymous communication. People using I2P are in control of the tradeoffs between anonymity, reliability, bandwidth usage, and latency.
Section eleven is around other privacy and anonymising services like JonDonym and bulletproof hosting.
In section twelve we learn about censorship circumvention like bypassing firewalls and deep packet inspection.
Section thirteen is around chaining/nesting privacy and anonymous services like nested VPN’s, Proxy Chains and nested services in general.
Fourteen is on the subjects of working off-site like in hotspots and cafes.
This section was fascinating, we learn about mobile, cell phones and cellular network with subjects on
ISMI catchers, SS7 and more.
Section sixteen is the bonus section sith bonus lectures.
Go to the website and have a look at the courses, they are fantastic value for money.
Check them out at the following:-
- Station X website = https://www.stationx.net/
- Station X Facebook = https://www.facebook.com/gotostationx/
- Station X Twitter = https://twitter.com/gotostationx/
- Station X LinkedIn = https://www.linkedin.com/company/stationx/
- Station X YouTube = https://www.youtube.com/channel/UC-vWmE-BHcUrYW5zwDijL1g/videos
- Nathan Twitter = https://twitter.com/GotoNathan
1 thought on “The Complete Cyber Security Course! Volume 3 by Nathan House (Review)”