Published 10/2022
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.84 GB | Duration: 3h 45m
Defend and Protect Yourself Against Specific Types of Threat Actors
What you’ll learn
Defend Yourself Against Online Threat Actors
Defend Yourself Against Physical World Threat Actors
Defend Yourself Against Non-Consensual Pornography (also known as “Revenge Porn”)
Extreme Medical Privacy – Protect yourself and your privacy when seeking sensitive medical services, including reproductive health services.
Protecting Minors from Abuse such as Bullying, Sexual Abuse, and Sextortion
Develop a Working Alias to Gain Anonymity in Public and from Prying Eyes
Requirements
It’s not a requirement, but the information and tactics shared in the predecessor course, Extreme Personal Privacy, would be helpful in providing broader context and information for developing a comprehensive privacy framework to protect you and those you care about.
Description
Extreme Personal Privacy 2 expands on the fundamental tactics demonstrated in Course #1, providing detailed strategies and resources to actively defend against specific types of threat actors who may seek to violate your privacy and do you harm. Important topics include:Section 1 – Extreme Privacy and Incident ResponseDefend Against Physical World Threat Actors (such as stalkers, harassers, criminals)Defend Against Online Threat Actors (such as internet trolls and online abusers)Combatting Non-Consensual Pornography (also known as “Revenge Porn”)Address Confidentiality Programs (alternative address services offered by many states to help victims of abuse)Extreme Healthcare Privacy Tactics (protecting your identity and privacy when researching or obtaining sensitive healthcare services, including reproductive healthcare services)Protecting Minors from Abuse (including in-depth discussions and recommendations on preventing bullying, sexual abuse, and sextortion of minors)Section 2 – Alias ConsiderationsUnderstand the reach of the GovernmentDeveloping a Working Alias (including developing an alternate identity, establishing an LLC and obtaining credit cards and other resources to mask your identity from prying eyes and the public).Extreme Personal Privacy 2 draws upon the book Get Lost: Personal Privacy Strategies for Extremely Busy People, written by privacy experts Daniel Farber Huang and Theresa Menders. Extreme Personal Privacy 2 will show you how to take back control of your privacy and safety. Using clear, concise language and providing step-by-step instructions, this course provides actionable tactics, techniques, and procedures that you can activate immediately.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Course Overview
Lecture 3 Action Plan Overview
Section 2: Extreme Privacy and Incident Response
Lecture 4 Defend Against Physical World Threat Actors
Lecture 5 Defend Against Physical World Threat Actors – Product Guide
Lecture 6 Defend Against Online Threat Actors
Lecture 7 Combatting Non-Consensual Pornography (also known as “Revenge Porn”)
Lecture 8 Address Confidentiality Programs
Section 3: Extreme Healthcare Privacy
Lecture 9 Extreme Healthcare Privacy
Section 4: Protecting Minors from Abuse
Lecture 10 Introduction to this Section
Lecture 11 Protecting Minors from Bullying
Lecture 12 Protecting Minors from Sexual Abuse
Lecture 13 Protecting Minors from Sextortion
Section 5: Develop a Working Alias
Lecture 14 Introduction to this Section
Lecture 15 Can’t Hide from the Government
Lecture 16 Developing a Working Alias
Anybody who feels their privacy is under threat from
HOMEPAGE
https://anonymz.com/?https://www.udemy.com/course/extreme-personal-privacy-2/
Reviews
There are no reviews yet.