Udemy - Online Privacy and Digital Self-Defense

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size763.7 MB
  • Uploaded Byfreecoursewb
  • Downloads54
  • Last checkedMar. 22nd '26
  • Date uploadedMar. 22nd '26
  • Seeders 21
  • Leechers9

Infohash : 6CCDAB78211ECECE9B2C6032FD357FEE90DDE246

Online Privacy & Digital Self-Defense

https://WebToolTip.com

Published 3/2026
Created by Dave Probert
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All Levels | Genre: eLearning | Language: English | Duration: 36 Lectures ( 1h 50m ) | Size: 764 MB

Online Privacy, Digital Self Defense

What you'll learn
✓ Explain how personal data is collected, tracked, and profiled online
✓ Assess personal privacy risk using threat modeling techniques
✓ Implement practical, privacy-enhancing configurations across browsers, search engines, networks, and devices
✓ Develop sustainable privacy habits and compartmentalization strategies

Requirements
● There are no specific skills required to take this course.

Files:

[ WebToolTip.com ] Udemy - Online Privacy and Digital Self-Defense
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Introduction
    • 1. Introduction.html (7.5 KB)
    • 2. About the Instructor.html (6.6 KB)
    2 - The Reality of Online Surveillance
    • 1. Section 2 Assessment (Description).html (0.7 KB)
    • 1. Section 2 Assessment.html (18.6 KB)
    • 3. Who is Collecting Your Data.html (7.6 KB)
    • 4. Common Privacy Myths.html (6.5 KB)
    • 5. Building a Privacy Mindset.html (7.8 KB)
    • 6. Has Your Data Been Compromised.html (7.3 KB)
    3 - The Threat Landscape
    • 2. Threat Assessment Quiz.html (18.0 KB)
    • 7. Threat Intelligence.html (6.9 KB)
    • 8. Lab 3.1 Network Mapping With Zenmap.mp4 (41.7 MB)
    • 8. Zenmap Download.url (0.1 KB)
    • 9. Assignment Zenmap Scan.html (6.1 KB)
    • images
      • img_1192904407.png (10.2 KB)
      4 - Passwords
      • 10. Password Strength.html (10.9 KB)
      • 11. Lab 4.1 Testing Your Password Strength.mp4 (19.8 MB)
      • 11. Password Monster.url (0.1 KB)
      • 12. Security Beyond Passwords.html (6.5 KB)
      • 13. Crackstation.url (0.0 KB)
      • 13. Lab 4.2 Password Cracking.mp4 (16.3 MB)
      • 13. MD5 Hash Generator.url (0.1 KB)
      • 14. Assignment Test and Crack a Password.html (6.1 KB)
      • 15. HaveIBeenPwned - Passwords.url (0.1 KB)
      • 15. Lab 4.3 Have Your Passwords Been Breached.mp4 (12.1 MB)
      • 3. Password Assessment (Description).html (0.7 KB)
      • 3. Password Assessment.html (20.0 KB)
      5 - Web Browser Tracking
      • 16. Browser Cookies.html (7.2 KB)
      • 17. Awesome Cookie Manager.url (0.1 KB)
      • 17. Cookie Remover.url (0.1 KB)
      • 17. Lab 5.1 Cookies.mp4 (50.0 MB)
      • 18. Browser Fingerprints.html (7.0 KB)
      • 19. Browser Leaks.url (0.1 KB)
      • 19. Canvas Fingerprint Defender.url (0.1 KB)
      • 19. Cover Your Tracks.url (0.1 KB)
      • 19. Lab 5.2 Browser Fingerprinting and Tracking.mp4 (93.7 MB)
      • 19. Privacy Badger.url (0.0 KB)
      • 19. Random User Agent.url (0.1 KB)
      • 20. Alternative Browsers.html (6.7 KB)
      • 21. Assignment Test You Browser's Security.html (5.9 KB)
      • 22. Lab 5.3 Tor Browser and The Dark Web (Description).html (0.7 KB)
      • 22. Lab 5.3 Tor Browser and The Dark Web.mp4 (84.5 MB)
      • 22. Tor Browser.url (0.1 KB)
      • 23. Lab 5.4 Browser Password Exposure.mp4 (41.4 MB)
      • 4. Web Browser Tracking Assessment (Description).html (0.7 KB)
      • 4. Web Browser Tracking Assessment.html (19.6 KB)
      6 - Social Engineering
      • 24. The Psychology of Social Engineering.html (10.7 KB)
      • 25. Demo 6.1 Anatomy of a Phishing Attack.mp4 (65.3 MB)
      • 26. Demo 6.2 Phishing Attack in Action.mp4 (60.5 MB)
      • 27. Assignment Identify Scammers.html (6.0 KB)
      • 28. Demo 6.3 IDN Homograph Attack.mp4 (42.3 MB)
      • 28. Regex 101.url (0.1 KB)
      • 5. Social Engineering Assessment (Description).html (0.7 KB)
      • 5. Social Engineering Assessment.html (20.1 KB)
      • images
        • img_795562265.png (34.4 KB)
        7 - Malware
        • 29. What is Malware.html (8.7 KB)
        • 30. Protecting Against Malware.html (7.1 KB)
        • 31. Demo 7.1 Ransomware in Action.mp4 (31.8 MB)
        • 32. Demo 7.2 Virustotal.mp4 (67.0 MB)
        • 32. EICAR Test File.url (0.1 KB)
        • 32. Virustotal.url (0.1 KB)
        • 33. Assignment Identify and Inspect Malware.html (5.9 KB)
        • 6. Malware Assessment (Description).html (0.7 KB)
        • 6. Malware Assessment.html (19.2 KB)
        • images
          • img_1346167766.png (40.6 KB)
          8 - Social Media
          • 34. Social Media Risks.html (8.1 KB)
          • 35. Staying Secure in a Social Media World.html (8.1 KB)
          • 36. Fake Name Generator.url (0.1 KB)
          • 36. Grok.url (0.0 KB)
          • 36. Lab 8.1 Social Media Deception Using AI.mp4 (137.0 MB)
          • 36. This Person Does Not Exist.url (0.1 KB)
          • 7. Social Media Assessment (Description).html (0.7 KB)
          • 7. Social Media Assessment.html (19.2 KB)
          • Bonus Resources.txt (0.1 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce