YoVDO

Exploring Hacker Operating Systems - Whonix

Offered By: SecurityFWD via YouTube

Tags

Operating Systems Courses Cybersecurity Courses VPN Courses Virtual Machines Courses Online Privacy Courses

Course Description

Overview

Explore the privacy-focused operating system Whonix in this 45-minute video featuring Kody and special guest James. Dive into the world of hacker operating systems, learning about C3, the Sugar Girl story, and the fundamentals of Whonix. Discover how to get started with Whonix, set up a virtual box, and understand the relationship between VPNs and Tor. Examine the process of tracking Whonix, how it protects your IP, and the intricacies of routing apps over Tor. Investigate potential vulnerabilities, including fingerprinting and tracking Tor nodes. Compare Whonix with Qubes OS and gain insights on next steps after installation. Conclude with closing thoughts and a brief discussion of a catastrophic event, providing a comprehensive overview of this privacy-enhancing technology.

Syllabus

Countdown
Intro
What is C3?
Sugar Girl Story
What is Whonix?
Getting Started with Whonix
Whonix Virtual Box
VPNs with Tor
Virtual Machine Up and Running
Trying to Track Whonix
How it Protects Your IP
Routing Apps over Tor
Tor Exit Nodes being Blocked
How Could you get Caught/Fingerprinted?
Tracking the Tor Node
Next Steps after Install
Qubes vs. Whonix
A Catastrophe
Closing Thoughts
Endscreen


Taught by

SecurityFWD

Related Courses

Emerging Technologies Capstone
Yonsei University via Coursera
Microsoft Azure Virtual Machines
Microsoft via edX
Introduction to Microsoft Azure
Microsoft via edX
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Build a Modern Computer from First Principles: Nand to Tetris Part II (project-centered course)
Hebrew University of Jerusalem via Coursera