Easter Egg Hunt - Save up to 15%
watching now
1 Students

Course Details



Skill Level




RESERVE - Only minutes left for your FREE certificate!

What You Will Learn?

  • An advanced practical skill-set in how to stay anonymous online, how to maintain privacy and how to bypass firewalls and proxies.
  • Become a cybersecurity specialist.
  • You will learn how to apply effective OPSEC or operational security to maintain anonymity online. OPSEC is the actions and behaviors required to maintain security and anonymity.
  • You will gain a complete understanding of how to use virtual private networks (or VPNs) for security, privacy and to attempt anonymity. Everything from choosing a provider to preventing protocol leaks.
  • And much more what you need...



  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
  • I recommend you watch volume 1 and 2 of this complete course before watching this volume (3) although it is not required.
  • Most items referenced in this course are free. But you may elect to purchase additional software, hardware, and services discussed in the course. Although It is absolutely not necessary to buy anything to understand and follow the course.
  • Please note this is Volume 3 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.


Section 2: Goals and Objectives for Volume III 03:39
Section 3: OPSEC Operational Security 55:54
Section 4: Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linux 47:41
Section 5: Virtual Private Networks VPNs 2:05:58
Section 6: "Tor" 2:04:19
Section 7: VPN and Tor Routers 28:31
Section 8: Proxies HTTP HTTPS SOCKs and Web 21:16
Section 9: SSH Secure Shell 42:22
Section 10: I2P - The Invisible Internet Project 44:18
Section 11: Other Privacy and Anonymising Services 20:14
Section 12: Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection 1:05:34
Section 13: ChainingNesting Privacy and Anonymising Services 1:31:57
Section 14: Off-site Internet Connections - Hotspots and Cafes 43:54
Section 15: Mobile Cell Phones Cellular Networks 39:33
Section 16: Wrap Up 32:48

About the Instructor

Reviews 1
Students 977
Courses 5

Nathan has over 24 years experience in cyber security where I have advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is the CEO of Station X a cyber security consultancy. More recently he acted as the lead security consultant on a number of the UKs mobile banking and payment solutions helping secure to date over £71Bn in transactions.

BitDegree platform reviews

Our students say Excellent
9.5 out of 10