1 00:00:00,000 --> 00:00:07,000 Now before diving into the course content, I'd like to give you a quick overview of the content of 2 00:00:07,000 --> 00:00:07,000 the course. 3 00:00:08,000 --> 00:00:14,000 So as you know, in this course, we're going to be covering four main topics anonymity, privacy, 4 00:00:14,000 --> 00:00:16,000 the dark web and security. 5 00:00:17,000 --> 00:00:20,000 So we'll start with anonymity. 6 00:00:20,000 --> 00:00:26,000 And we're going to introduce you to the Tor network, which is the anonymizing network that we're going 7 00:00:26,000 --> 00:00:28,000 to use throughout the whole course. 8 00:00:28,000 --> 00:00:35,000 You're going to learn how it works and how to connect to it, to improve our privacy, anonymity, and 9 00:00:35,000 --> 00:00:36,000 to access the dark web. 10 00:00:37,000 --> 00:00:44,000 So we'll start with the basics of the Tor browser, how to properly install it on Linux, Windows and 11 00:00:44,000 --> 00:00:52,000 OS X, configure it for maximum security and anonymity, and bypass censorship to connect to the Tor 12 00:00:52,000 --> 00:00:54,000 network even if it's blocked. 13 00:00:55,000 --> 00:01:00,000 Once done with the basics, we'll move to the next level where we're going to use an operating system 14 00:01:00,000 --> 00:01:04,000 that is designed to be more private and more anonymous. 15 00:01:05,000 --> 00:01:12,000 First, I'm going to teach you how to properly configure it and install it on a USB stick so we can 16 00:01:12,000 --> 00:01:20,000 use this USB stick to use this operating system from any computer to anonymously access both the Darknet 17 00:01:20,000 --> 00:01:26,000 and the clear net without affecting this computer and without leaving any traces on it. 18 00:01:27,000 --> 00:01:34,000 Then the course is divided into a number of subsections or modules that will teach you how to anonymously 19 00:01:34,000 --> 00:01:38,000 and privately use both the clear net and the dark net. 20 00:01:39,000 --> 00:01:46,000 You'll also learn how to carry out your normal online tasks in a more private and more anonymous manner. 21 00:01:46,000 --> 00:01:51,000 So you'll learn how to search for content on both on the clear net and on the darknet. 22 00:01:51,000 --> 00:01:57,000 How to communicate using emails, using instant messages, share files and handle files, and how to 23 00:01:57,000 --> 00:02:04,000 use your whole file system and whole computer in a more private, more secure, and more anonymous manner. 24 00:02:04,000 --> 00:02:11,000 Then we're going to have a full section on encryption where you'll learn what we mean by asymmetric, 25 00:02:11,000 --> 00:02:13,000 symmetric and end to end encryption. 26 00:02:14,000 --> 00:02:21,000 How to properly and manually encrypt data, whether it's simple text or files so that they are useless 27 00:02:21,000 --> 00:02:24,000 to anybody that intercepts this data. 28 00:02:25,000 --> 00:02:31,000 You'll also learn how to sign data so the receiver can verify that it was actually sent from you and 29 00:02:31,000 --> 00:02:35,000 how to verify the integrity of data that you receive. 30 00:02:36,000 --> 00:02:43,000 This is very, very important if you're serious about protecting your privacy and if you want to communicate 31 00:02:43,000 --> 00:02:49,000 with people on the darknet, because some people will simply refuse to communicate with you unless you 32 00:02:49,000 --> 00:02:50,000 use encryption. 33 00:02:50,000 --> 00:02:57,000 The way that I'm going to show you in this section, there is also a full section on cryptocurrency, 34 00:02:57,000 --> 00:03:03,000 because as we know, the traditional payment methods that we know use in PayPal or using credit cards 35 00:03:03,000 --> 00:03:08,000 or other clear net payment methods are simply not private and not anonymous. 36 00:03:08,000 --> 00:03:14,000 So in this section, you'll first learn how cryptocurrencies work and how to obtain crypto and handle 37 00:03:14,000 --> 00:03:16,000 it privately and anonymously. 38 00:03:17,000 --> 00:03:22,000 Throughout all of these sections, we're going to use fully patched systems, but in the last section 39 00:03:22,000 --> 00:03:29,000 of the course, I'm going to teach you how to take your security to the next level by dividing your 40 00:03:29,000 --> 00:03:33,000 computer into a number of isolated security domains. 41 00:03:33,000 --> 00:03:40,000 So even if you get hacked or if you open malware, it would be very difficult for the hacker or for 42 00:03:40,000 --> 00:03:45,000 the malware to compromise your full system and de anonymize you.