Launching Soon
Privacy • Beginner

Crypto Foundations

Privacy Techniques, Wallets & Tracing

Last updated 10/2025 English English [Auto]

Get Ready for Launch!

This cutting-edge course is being crafted by our experts. Be among the first to access exclusive content when it drops!

  • Preview course structure and curriculum
  • Be first to access when launched
1 students enrolled
3.5 hours of content
Last updated Oct 2025
Subscription Required

Access all courses at Dark Web Academy with a subscription

View Pricing Plans →
0.0 rating
1 students

What You'll Learn

Explain core crypto concepts: keys, seeds, addresses, UTXO vs. account models, confirmations, fees, and consensus (PoW vs. PoS).
Compare privacy properties of Bitcoin, Monero, and Zcash; identify when each is appropriate.
Set up and secure hot and hardware (cold) wallets; back up and recover with BIP-39 safely.
Operate Electrum/Sparrow (BTC) and Monero GUI/CLI (XMR); configure watch-only and air-gapped workflows.
Execute end-to-end transactions with OpSec: address hygiene, change handling, avoiding address reuse, output labeling, and seed isolation.
Understand CoinJoin at a technical level (anonymity sets, coordinator models, linkage risks) and where it does/doesn’t help.
Understand Monero privacy primitives: stealth addresses, ring signatures, RingCT, decoys, and network-layer considerations.
Understand Zcash shielding (t-/z-addresses) and practical limitations.
Use Tor/Tails to reduce network-level leakage when interacting with wallets, explorers, and services.
Evaluate “mixing/tumbling” services critically: how they work, failure modes, red flags, and legal/AML risk.
Perform basic blockchain analysis: read transactions on explorers, trace flows at a high level, recognize common heuristics (peeling chains, change detection).
Swap or bridge assets with minimal leakage; understand the privacy and custody risks of exchanges, ATMs, and P2P.
Detect and respond to cryptojacking and ransomware patterns at a conceptual level.
Apply a legal/ethical decision framework (jurisdiction, AML/KYC, reporting obligations) and document a compliant, privacy-respecting workflow.

Tools & Technologies You'll Use

Privacy & OS
Tor Browser, Tails OS (live, amnesic environment)
Bitcoin (BTC)
Electrum or Sparrow (desktop wallet)
JoinMarket or Wasabi (CoinJoin implementations) — conceptual and controlled lab use
mempool.space / Blockstream Explorer (block explorers)
Monero (XMR)
Monero GUI/CLI (wallet + node/RPC, as feasible in labs)
Community Monero explorers (for read-only checks)
Zcash (ZEC)
Zecwallet Lite (or another wallet supporting shielding)
Hardware wallets (optional)
Trezor / Ledger for seed isolation and cold storage workflows
P2P / Exchange (discussion & controlled demos)
Centralized exchanges (KYC implications), P2P marketplaces (e.g., Bisq) — risk, compliance, and privacy trade-offs
Security utilities
KeePassXC (or other password manager) for seed/passphrase management
File checksum/hash utilities for wallet/ISO verification
Analysis (intro level)
OXT (heuristics overview), basic graphing via explorers; emphasis on limitations and false positives
asdf
Instructor
asdf
Founder of Dark Web Academy
OSCP | CISSP | M.S. Cybersecurity
Crypto Foundations
Login for Early Access
This course includes:
  • Lifetime access
  • Access on all devices

Course Curriculum

Student Reviews

No reviews yet

Be the first to share your experience with this course!