Schedule a review
Free tier · No card required85 of 85 modules live

Internet security,
taught the way it should be.

A practical curriculum. Nine sequential tracks — networking fundamentals through anonymity engineering and into operational deployment. Built from real engagements, taught in plain English by working engineers.

Already past basics? Schedule a network review →

LESSON 03 / 1222 min read · INTRODUCTORY

IPv4 addressing and subnetting deep dive

IPv4 from first principles: CIDR, prefix math, route aggregation, RFC 1918, VLSM, and the subnetting mistakes operators keep repeating.

Read the lesson22 min read · TRANSCRIPT INCLUDED
PRACTICALVENDOR-NEUTRALCHECKLIST INCLUDED
Curriculum sourced from NIST SP 800-53 CIS Controls v8 CISA hardening guides 240+ field engagements
Curriculum

Nine tracks. One coherent picture.

Each track is sequenced. Tracks 1–6 are the theory curriculum; tracks 7–9 are practical playbooks. Free to read end-to-end — create an account if you want progress tracking.

TRACK 01 · NETWORKING FUNDAMENTALS

Networking Fundamentals

From bits and signals to TCP, DNS, TLS 1.3, QUIC, and NAT — read packet captures, debug routing, write transports from scratch.

12 LESSONS12 LIVE
Open track
TRACK 02 · CRYPTOGRAPHY FOUNDATIONS

Cryptography Foundations

AES, ChaCha20, AEAD, Curve25519, Ed25519, Noise, HKDF, post-quantum hybrid — the math you need to read RFC 8446 without flinching.

8 LESSONS8 LIVE
Open track
TRACK 03 · ENCRYPTED TRANSPORT

Encrypted Transport

IPsec, OpenVPN, WireGuard, Tor, sing-box / Xray, Tailscale mesh, mTLS / zero-trust — protocol designer's view, not user's.

7 LESSONS7 LIVE
Open track
TRACK 04 · ANONYMITY ENGINEERING

Anonymity Engineering

Threat models, traffic analysis, padding, mix networks, browser fingerprinting, OS / TCP fingerprints, steganographic channels.

7 LESSONS7 LIVE
Open track
TRACK 05 · DETECTION

Detection

How adversaries actually classify traffic — DPI, active probing, TLS fingerprinting, ML classification, side channels, BGP-level analysis.

6 LESSONS6 LIVE
Open track
TRACK 06 · EVASION

Evasion

The countermeasure side. obfs lineage, domain fronting, Reality / Hysteria, decoy routing, traffic shaping for camouflage. Cat and mouse.

7 LESSONS7 LIVE
Open track
TRACK 07 · SELF-HOST BUILD PATH

Self-Host Build Path

End-to-end build playbook for your own privacy infrastructure. Endpoint hardening, firewalls, leak prevention, OPSEC sign-off — every step after the VPS is provisioned.

12 LESSONS12 LIVE
Open track
TRACK 08 · MULTI-NODE & TEAM PRIVACY

Multi-Node & Team Privacy

Mesh networks, identity-aware access, and self-hosted control planes for distributed teams. The architecture once your privacy stack outgrows one endpoint.

12 LESSONS12 LIVE
Open track
TRACK 09 · FIELD TACTICS & BUYING GUIDES

Field Tactics & Buying Guides

Tactical field guides and head-to-head buying decisions. VPS routing, protocol selection, browser hardening, residential egress, and the trade-offs behind each.

14 LESSONS14 LIVE
Open track

Apply it · Walkthrough

Try the posture model on your own network.

An 8-control walkthrough lifted from the curriculum. Educational only — your network isn't being scanned. A real assessment requires credentialed access.

Baseline controls

CIS · NIST SP 800-53 (aligned)
01Default admin credentials changedROUTER
02Firmware version current (within 90 days)ROUTER
03WPA3 / WPA2-AES enforced on Wi-FiWIRELESS
04Guest network isolated from LANWIRELESS
05Remote management disabled on WANROUTER
06UPnP disabledROUTER
07DNS-level filtering configuredNETWORK
08Inbound port forwards reviewedNETWORK

Why this curriculum

Written by engineers who still do the work.

We're a small consulting firm first, a publisher second. Every lesson is drawn from a real engagement, anonymized, and reviewed by the engineer who solved it.

01 / GROUNDED

From real engagements

Every example is a redacted version of something we found in the field. No invented threat models, no marketing fiction.

02 / SHORT

Six minutes, on average

Long enough to teach one idea well. Short enough that your team will actually finish the track instead of bookmarking it.

03 / HONEST

No fearmongering

We won't tell you the sky is falling to sell a course. The risks are real enough; the goal is competence, not anxiety.


Beyond the curriculum

When you need engineers, not lessons.

If you'd rather have us do the hardening with your IT lead, we run four-week engagements alongside the curriculum — same methodology, applied to your network.

Engagement Flow
FIG. 02
DETECT01BASELINE02HARDEN03MONITOR04