Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Go Incognito
Section 1 - Introduction
Go Incognito Introduction (4:10)
Why Should You Care? (7:47)
Security vs Privacy (3:38)
FOSS (3:34)
Metadata (4:32)
The Convenience Line (3:07)
Section 2 - A Clean Slate
Section 2 Introduction (1:22)
Minimalism (6:59)
Erasing Your Local Identity (5:32)
Erasing Your Online Identity (10:52)
Section 2 Finale (1:03)
Section 3 - Basic Digital Protection
Section 3 Introduction (1:27)
Staying Updated (3:10)
Permissions & Settings (5:27)
Passwords (12:47)
Two-Factor Authentication (5:36)
Search Engines (3:52)
Your Browser (Pt. 1) (3:41)
Hardening Your Browser (Pt. 2) (6:25)
Your Browser Habits (Pt. 3) (4:38)
Browser Uniqueness (Pt. 4) (3:43)
Proxies & VPNs (7:36)
Antiviruses & Malware (6:25)
File Deletion (3:27)
Storage & Encryption (4:47)
Safe Communication (7:33)
Section 3 Finale (1:19)
Section 4 - Advanced Digital Protection
Section 4 Introduction (1:26)
Desktop Operating Systems (5:35)
Mobile Operating Systems (7:05)
Expendable Operating Systems (4:23)
Tor (6:25)
Cryptocurrencies (4:21)
Audits (4:12)
Section 4 Finale (1:09)
Section 5 - Physical Privacy & Security
Section 5 Introduction (1:17)
The Basics (6:54)
MAC (3:04)
Networking (4:25)
Radios (8:23)
Device Separation (3:19)
Section 5 Finale (1:31)
Section 6 - Living The Lifestyle
Section 6 Introduction (0:57)
Who Can You Trust? (5:40)
Minimizing Data Access (7:39)
Anonymization & Pseudonymization (4:14)
Shopping Safely (4:26)
Lifestyle Changes (4:50)
Pre-Configured Hardware & Software (2:50)
Downsides to Safety (2:43)
Becoming an Activist (4:36)
Section 6 Finale (0:51)
Section 7 - A New Beginning
Course Summary (2:43)
Congratulations! (1:26)
Section 2 Introduction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock