Complete Ethical Hacking Series: Cyber Anonymity
3.6 (71 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
454 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Cyber Anonymity to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Cyber Anonymity

Complete Ethical Hacking Series (CEHv9): Hacking with Anonymity
3.6 (71 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
454 students enrolled
Created by Chad Russell
Last updated 3/2017
English
English [Auto-generated]
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Pass components of the Certified Ethical Hacker exam relative to anonymity and become a part of the growing Cyber Security industry.
  • Use tools such as Proxy Chains, Tor, Tortilla, Fragrouter and ICMP Tunneling to maintain anonymity on the web.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Cyber Anonymity

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   Each chapter closes with exercises putting your new learned skills into practical use immediately.   You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains. 

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Anonymizers  such as TOR (The Onion Router) enable users to search the web anonymously and protect browser traffic from global mass surveillance.  In this section I'll show you how to install and utilize the TOR browser so you can browse the web with enhanced privacy.  


  • While TOR is a great tool for anonymizing browser traffic it doesn't necessarily anonymize other traffic streams that are not HTTP based such as e-mail or other network protocols such as DNS.    Tortilla is a platform that wraps all traffic coming from your system and tunnels it through the TOR network.   In this section I'll show you how to install Tortilla and set it up to anonymize all of your traffic through the TOR network.  


  • Private VPNs are one of the better anonymity options available.   They encrypt and anonymize traffic but they are often provided as paid services.    In this lesson I'll show you how to setup VPN connections on Windows Operating Systems.  


  • Proxy chains is a lighter weight solution that many times is used to anonymize penetration testing activities.   In this section I'll show you how to utilize proxy chains as part of the Kali Linux distribution to scan target networks anonymously.  
  • Sometimes hackers will use Wi-Fi networks as launch points to establish anonymity.    In this section I'll show you how to spoof a MAC address and jump on a Wi-Fi network anonymously.   (Disclaimer:  only on authorized networks)

  • ICMP Tunneling is a technique that can sometimes be used to bypass corporate proxy servers when traversing outbound assuming ping traffic is allowed.    This is often a technique used by pen testers to exfiltrate data from corporate networks in order to bypass outbound traffic restrictions.  


  • Fragroute is a tool that is often used by Pen Testers to obfuscate traffic patterns and traffic signatures in order to evade Intrusion Detection Systems.   Fragroute does this by splitting packets into smaller fragments.   I'll show you how to install and setup Fragroute in this course


  • E-Mail is a protocol known for it's lack of privacy.   Like most of the protocols on the web it wasn't initially designed with privacy in mind.   I'll show you how to utilize technologies such as PGP in this lesson to better secure and anonymize your e-mail communications.  


  • TAILS is a read-only distribution of the Linux OS built with an emphasis on personal privacy.    Since it is a read-only distro it's not possible to leave a trace of your activities on the local host.   TAILS also includes some anonymity tools such as TOR to facilitate some degree of network anonymity.  


  • Data Privacy is a vast catalog of subject matter.   In this course I will break down Data Privacy into it's various components and share with you the current state of digital privacy.


  • Encrypting and protecting disk storage is a key component of anonymity.   Many times when people think about anonymity they first think about it from the network perspective.   Lots of personal information is stored on hard disks and in the cloud about you.    Learn how to protect that data in this section.  


  • Windows is a pervasive operating system.   In this section I will show you how to use features in Windows to natively encrypt data on your storage devices using EFS (The Encrypting File System).  


Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains.
Compare to Other Ethical Hacking Courses
Curriculum For This Course
16 Lectures
02:14:02
+
Course Introduction
1 Lecture 04:07

Learn the content and layout of the course in this section.

Preview 04:07
+
Anonymizers
4 Lectures 52:04

Anonymizers  such as TOR (The Onion Router) enable users to search the web anonymously and protect browser traffic from global mass surveillance.  In this section I'll show you how to install and utilize the TOR browser so you can browse the web with enhanced privacy.  

Tor
02:45

While TOR is a great tool for anonymizing browser traffic it doesn't necessarily anonymize other traffic streams that are not HTTP based such as e-mail or other network protocols such as DNS.    Tortilla is a platform that wraps all traffic coming from your system and tunnels it through the TOR network.   In this section I'll show you how to install Tortilla and set it up to anonymize all of your traffic through the TOR network.  

Tortilla
02:07

Private VPNs are one of the better anonymity options available.   They encrypt and anonymize traffic but they are often provided as paid services.    In this lesson I'll show you how to setup VPN connections on Windows Operating Systems.  

Private VPNs
45:00

Proxy chains is a lighter weight solution that many times is used to anonymize penetration testing activities.   In this section I'll show you how to utilize proxy chains as part of the Kali Linux distribution to scan target networks anonymously.  

Proxy Chains
02:12
+
Network Anonymity
3 Lectures 09:08

Sometimes hackers will use Wi-Fi networks as launch points to establish anonymity.    In this section I'll show you how to spoof a MAC address and jump on a Wi-Fi network anonymously.   (Disclaimer:  only on authorized networks)

ARP Poisoning
02:37

ICMP Tunneling is a technique that can sometimes be used to bypass corporate proxy servers when traversing outbound assuming ping traffic is allowed.    This is often a technique used by pen testers to exfiltrate data from corporate networks in order to bypass outbound traffic restrictions.  

ICMP Tunneling
02:27

Fragroute is a tool that is often used by Pen Testers to obfuscate traffic patterns and traffic signatures in order to evade Intrusion Detection Systems.   Fragroute does this by splitting packets into smaller fragments.   I'll show you how to install and setup Fragroute in this lesson.  

Fragrouting
04:04
+
Host and Data Privacy
8 Lectures 01:08:43

E-Mail is a protocol known for it's lack of privacy.   Like most of the protocols on the web it wasn't initially designed with privacy in mind.   I'll show you how to utilize technologies such as PGP in this lesson to better secure and anonymize your e-mail communications.  

E-Mail Privacy
11:05

TAILS is a read-only distribution of the Linux OS built with an emphasis on personal privacy.    Since it is a read-only distro it's not possible to leave a trace of your activities on the local host.   TAILS also includes some anonymity tools such as TOR to facilitate some degree of network anonymity.  

TAILS
04:23

Data Privacy is a vast catalog of subject matter.    Here I will break down Data Privacy into it's various components and share with you the current state of digital privacy.

Preview 07:24

Data Privacy - 2
06:51

Data Privacy - 3
05:56

Data Privacy - 4
05:30

Encrypting and protecting disk storage is a key component of anonymity.   Many times when people think about anonymity they first think about it from the network perspective.   Lots of personal information is stored on hard disks and in the cloud about you.    Learn how to protect that data in this section.  

Storage Encryption
19:15

Windows is a pervasive operating system.   In this section I will show you how to use features in Windows to natively encrypt data on your storage devices.  

Windows EFS
08:19
About the Instructor
Chad Russell
3.8 Average rating
1,125 Reviews
22,973 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!