I think a very useful introduction would talk about symmetric and asymmetric encryption in a non-math way, and move on to anonymity concepts. This cannot be a screencast. --Moritz