04 Privacy & Anonymity

Course Description

From bouncing your internet traffic off multiple servers across continents, to masking your identity with the TOR network, to using ultra-secure operating systems that leave no digital footprint – this course will go through the technologies that security professionals and criminal hackers use to mask their identity on the internet. Learn how to stay truly anonymous on the internet and in real life. We will look at all of the digital footprints that you leave – whether it’s via browsing the internet, using a mobile app or even just taking a walk down the street with your mobile in your pocket. 

There are many uses for cloaking your identity on the internet. Some people are just plain annoyed by the advertisements that follow them around; search for a toaster on Amazon, and you’ll find that the ads end up in your social media feeds, email, mobile, maps and just about everywhere until you actually go and buy that toaster. And then you’ll probably keep getting ads for newer toasters. We’ve all been through it. However there are many more uses for masking your digital identity online. Journalists handling sensitive information, whistleblowers and law enforcement agents all use anonymising technologies – sometimes their lives depend on it.

Cybercriminals also use such techniques to cover their tracks, or to transfer the blame of an attack on another party. Therefore as a security professional you should learn some of these techniques and how they work. We’ll be covering professional techniques such as using proxies to browse the internet, chaining strings of proxies to bounce your internet traffic off a variety of servers from around the world and using VPN, SSH and TOR to mask your digital identity. This is an exciting course with plenty of hands on information, we look forward to seeing you on the inside!

Aim of the Course:

Privacy and Anonymity are two words that have almost completely disappeared from the computing dictionary. With advanced tracking mechanisms serving global scale marketing campaigns and next level surveillance from the authorities, is it even possible to stay anonymous on the internet anymore? This course will attempt to answer this question, giving students practical techniques to mask their identity on the internet. The purpose of this course is to give the casual user a means to keep their online activities private, and to give the aspiring security professional an understanding of the techniques used by hackers to stay anonymous. 

Before you begin, please watch this video released by the internet society: 

Who is this course for?

  • Anyone who wants to reclaim their privacy on the internet
  • Cybersecurity Professionals
  • IT personnel
  • Software developers
  • Network engineers
  • Malware analysts
  • Forensic investigators
  • Police and Law enforcement
  • Journalists reporting from sensitive areas

course stats

Pre-Requisite Knowledge/Hardware: 

  • Foreword to Technical Security
  • Linux 101
  • Networking
  • Applications of Encryption

Computer with the following requirements

  • At least one of the following operating systems installed(If more than one is installed then no problem):
    • Windows
    • Linux
    • Mac OS X
  • VirtualBox with Debian Linux guest OS (Covered in Linux 101)
  • Active broadband internet connection
  • RAM : Min 4GB, Preferred 16GB
  • 50GB Free hard disk Space
  • Suggested Hardware : 2 monitors (one for your exercises, and one to keep this course window open). A single monitor will work fine just as well.
  • For SSH Dynamic Port forwarding, a cloud Virtual Private Server is required – preferably where you have root access. 
  • USB Pendrive with at least 8GB of free space

Duration:

1 month

What you will learn

  • Digital footprints
    • Network
    • Application
    • File
  • Masking your identity
  • Encryption basics
  • Proxies
  • VPNs
  • SSH Tunnels
  • Botnets
  • TOR
  • Private Email
  • Mobile device privacy measures
  • Privacy oriented operating systems
  • Disposable e-mail addresses
  • Disposable SMS numbers
  • Social Media & Anonymity

Professional prospects

This course stands as a foundation course for the following professional applications. 

  • Cybersecurity Specialist
  • Forensic Analyst
  • Dark Web Specialist
  • Privacy software architect
  • Law and order enforcement

syllabus

Syllabus

Identity Trails

  • Data points that can Identify you
    • IP Address
    • Browser Fingerprinting
    • Cookies
    • Advanced Browser Fingerprinting
  • Practical

Proxies

  • What are proxies?
  • Masking the Source
  • Proxychains
  • DNS 

TOR

  • Introduction to the TOR network
  • Architecture
  • Installing the TOR Browser
  • Torifying all your traffic
  • VPN
    • What is a VPN?
    • Using OpenVPN
  • SSH Tunnels
    • Dynamic SOCKS 5 Proxies
    • Setting up a cloud VPS for browsing
  • Virtual Machines
    • Masking all Signatures
    • Torifying your operating system
  • Bootable Disks
    • Live USB Bootable OS
    • Staying Anonymous
  • Encrypted Email
    • Introduction to Encryption
    • Public Key Cryptography
    • Using GPG
    • Popular services
  • Anonymous Contact Credentials
    • Disposable Email addresses
    • Disposable SMS numbers

This course includes :

Questions before purchasing this course?

No worries, Send us a quick message and we will be happy to answer any questions you have.