GroundRod Level 2

Course Overview

Content

    • GroundRod level one refresher

    • IOT & vehicle concerns

    • BIOS, UEFI and bootloaders

    • Encryption update

    • Post Quantum encryption

    • Elliptic Curves

    • Routers and access points

    • Setup and hardening of APs

    • Pluggable transports/bridges and VPNs

    • Decentralized VPNs

    • Invisible internet project / I2P

    • Cloud services

    • Search engines, meta and crawlers

    • Metadata discovery, removal and manipulation

    • Browser hardening

    • Email security and alternatives

    • Web Based tools lab

    • Crypto currency and privacy coins

    • Phones

    • SIGINT/ELINT as it relates to vehicles and GPS

    • OSINT tools

    • OTP lab

    • SOI development and hacking exercise

Locations and Dates

Cost: $480

Course Length: 2 days (16-20 hours classroom, lab setting


Location: TBD

Date: TBD

Description

Intermediate level course that builds on the foundation of digital tradecraft skills learned in GR 1. GR 2 focuses on follow on and advanced skills as well as implementing solutions in a real world setting. The course studies the overlapping and complimentary concepts of security, privacy and anonymity.

This course was born out of the intelligence community and has been taught to personnel from USG units such as: NSA, CIA, JSOC, USASOC and various LEO agencies.

This is the only course of it’s kind currently available to US citizens.

Course Objectives:

By the end of this course students will be able to demonstrate the following:

- Current and developing threats to privacy and security.

- Describe and utilize I2P and decentralized networks.

- Harden web browsers.

- Describe and utilize ECC ciphers and other future proof schemes.

- Identify blockchain technology with utility for privacy & security.

- Modify systems to use alternative DNS servers.

- Study new VPN systems.

- Secure the firmware of routers and access points.

- Demonstrate how to hide TOR usage from advanced adversaries.

- Setup secure wireless system.

- Properly employ phone based security measures.

- Describe and utilize non-smtp email alternatives.

- Utilize OTP (one time pads) for encryption/decryption.

- Defend against real-time hacking attempts.

- Develop Signal Operating Instructions

Gear Packing Checklist

Course Checklist

  1. Personal laptop (or unit issued)

  2. Four USB drives

  3. 8-16GB in capacity,

  4. Spare extension cord,

  5. Note-taking materials.

Course Book Coming Soon…

Recommended Gear

SEPIO Secure Laptop  (Version 4)

  • 14 or 15.6 Full HD Touchscreen

  • Durable Chassis

  • AMD Ryzen CPU (Gen 5 +)

  • 8GB Crucial DDR4 3200 RAM (up to 32GB)

  • 256GB Crucial SSD Storage (up to 2TB)

  • Wireless & Bluetooth

  • USB 3.0, USB-C, HDMI, MIC and SD Card ports

  • Sepio Secure Operating System (built on Debian Linux)

  • Webcam blocker


Verus 7 Privacy Phone

  • Uses Nano SIM or ESIM card

  • Verus secure operating system (Built on CalyxOS and GrapheneOS)

  • Extensive privacy and security suite

  • Microphone and camera control 


Graybox Secure Router

  • Graybox runs opensource, Linux based firmware and has extensive hardening against attacks. VPN support is built in and easy to use, allowing you to shield your traffic from prying eyes. 

  • Once your VPN is activated, all devices that connect via the Graybox will enjoy the protection of the robust firewall, secure DNS and VPN connection.


Meet the Instructor

K

K is a combat veteran, OGA veteran, INFOSEC professional, and firearms & tactics instructor. Creator of the GroundRod tradecraft courses.