Back to Chartered

Chartered Network Associate

 9,250.00

Chartered Network Associate comprise 4 certifications at US$ 125

Chartered Network Associate is an online certification course with a focus on hands-on skills in Network Management, Accredited by EUAS ‘USA (Euro Universal Accreditation Systems’ USA) and CSA Council, awarded jointly by Cambridge Intercontinental University and Institute of Chartered Telecom Professionals.

– Online Contents
– Online Exam
– CSA Council Accredited
– EUAS ‘USA Accredited
– Network Masters Program
– Awarded by CIU & ICTP

 

Category:
Buyer protection
Safe shopping
Easy returns and refunds
Free shipping worldwide

Chartered Network Associate

Chartered Network Associate is a comprehensive certification program comprising of three certifications leading to the award of Chartered Network Associate –

  1. CIU Certified Network Administrator
  2. CIU Certified Linux Administrator
  3. CIU Certified Ethical Hacker

Chartered Telecom Associate - Telecom Masters Program

Chartered Network Associate is a comprehensive certification comprising of three examinations leading to the award of Chartered Network Associate –

1.  CIU Certified Network Administrator

Introduction

  • Intro to Network Devices (part 1)
  • Intro to Network Devices (part 2)

Network Services

  • Networking Services and Applications (part 1)
  • Networking Services and Applications (part 2)
  • DHCP in the Network
  • Introduction to the DNS Service
  • Introducing Network Address Translation

WAN Technologies

  • WAN Technologies (part 1)
  • WAN Technologies (part 2)
  • WAN Technologies (part 3)
  • WAN Technologies (part 4)

Network Cabling

  • Network Cabling (part 1)
  • Network Cabling (part 2)
  • Network Cabling (part 3)
  • Network Topologies
  • Network Infrastructure Implementations

Internet Protocol

  • Introduction to IPv4 (part 1)
  • Introduction to IPv4 (part 2)
  • Introduction to IPv6
  • Special IP Networking Concepts

Routing Concepts

  • Introduction to Routing Concepts (part 1)
  • Introduction to Routing Concepts (part 2)
  • Introduction to Routing Protocols

Network Elements

  • Basic Elements of Unified Communications
  • Virtualization Technologies
  • Storage Area Networks
  • Basic Cloud Concepts
  • Implementing a Basic Network

Network Monitoring & Management

  • Analyzing Monitoring Reports
  • Network Monitoring (part 1)
  • Network Monitoring (part 2)
  • Supporting Configuration Management (part 1)
  • Supporting Configuration Management (part 2)
  • The Importance of Network Segmentation
  • Applying Patches and Updates

Switches and Wireless LAN

  • Configuring Switches (part 1)
  • Configuring Switches (part 2)
  • Wireless LAN Infrastructure (part 1)
  • Wireless LAN Infrastructure (part 2)

Risks and Vulnerabilities

  • Risk and Security Related Concepts
  • Common Network Vulnerabilities
  • Common Network Threats (part 1)
  • Common Network Threats (part 2)

Network Hardening

  • Network Hardening Techniques (part 1)
  • Network Hardening Techniques (part 2)
  • Network Hardening Techniques (part 3)
  • Physical Network Security Control
  • Firewall Basics
  • Network Access Control

Network Troubleshooting

  • Basic Forensic Concepts
  • Network Troubleshooting Methodology
  • Troubleshooting Connectivity with Utilities
  • Troubleshooting Connectivity with Hardware
  • Troubleshooting Wireless Networks (part 1)
  • Troubleshooting Wireless Networks (part 2)
  • Troubleshooting Copper Wire Networks (part 1)
  • Troubleshooting Copper Wire Networks (part 2)
  • Troubleshooting Fiber Cable Networks
  • Network Troubleshooting Common Network Issues
  • Common Network Security Issues
  • Common WAN Components and Issues

Networking Concepts

  • The OSI Networking Reference Model
  • The Transport Layer Plus ICMP
  • Basic Network Concepts (part 1)
  • Basic Network Concepts (part 2)
  • Basic Network Concepts (part 3)

Wireless Networking Standard

  • Introduction to Wireless Network Standards
  • Introduction to Wired Network Standards

Security Policies and Safety

  • Security Policies and other Documents
  • Introduction to Safety Practices (part 1)
  • Introduction to Safety Practices (part 2)

Other Concepts

  • Rack and Power Management
  • Cable Management
  • Basics of Change Management
  • Common Networking Protocols (part 1)
  • Common Networking Protocols (part 2)

2.  CIU Certified Linux Administrator

Introduction

  • Introduction to RedHat Linux
  • Why learn RedHat Linux
  • Downloading, Installing, and Configuring VirtualBox on Windows 8

Red Hat Virtual Machine

  • Create a Red Hat Virtual Machine Part 1
  • Create a Red Hat Virtual Machine Part 2
  • Create a Red Hat Virtual Machine Part 3

Dual boot Red Hat and Windows 8

  • How to dual boot Red Hat and Windows 8 Part 1
  • How to dual boot Red Hat and Windows 8 Part 2

Linux Graphical User Interface

  • Basic familiarization with Linux Graphical User Interface Part 1
  • Basic familiarization with Linux Graphical User Interface Part 2

RedHat File System

  • File System Navigation Commands ls, cd, pwd Part 1
  • File System Navigation Commands ls, cd, pwd Part 2
  • Finding files Commands find, locate, upadtedb, man

File and folder ownership and permissions

  • File and folder ownership and permissions Command chown, chmod Part 1
  • File and folder ownership and permissions Command chown, chmod Part 2
  • Move, delete and copy files Commands mv, rm, cp
  • Commands grep, pipe, echo, cat

RedHat Yum and RPM Package Manager

  • YUM Package Manager Part 1
  • YUM Package Manager Part 2
  • RPM Package Manager

Globbing Wildcards

  • Globbing Wildcards Part 1
  • Globbing Wildcards Part 2

IO Redirection

  • IO Redirection Part 1
  • IO Redirection Part 2
  • IO Redirection Part 3

Vim Text Editor

  • Vim Text Editor Part 1
  • Vim Text Editor Part 2
  • Vim Text Editor Part 3
  • Vim Text Editor Part 4
  • Vim Text Editor Part 5

 

3.  CIU Certified Ethical Hacker

Introduction

– Virtual Box install tutorial
– Kali Linux Installation
– Going Full Screen with Kali Linux

Command Line with Kali Linux

– Kali Linux Command Line Part 1
– Kali Linux Command Line Part 2
– Kali Linux Command Line Part 3

Preparing your Lab

– Changing IP Address and Setting up Wireless Adapter in Kali Linux
– Creating Bootable USB Kali Linux on Stick
– Important Networking Terms in Kali Linux to help doing Penetration Testing
– Important Hacking Terms in Kali Linux to help doing Penetration Testing
– Important Steps to Do after Installing Kali Linux to help doing Penetration Testing
– Changing MAC Address using Macchanger to help doing Penetration Testing

Footprinting

– Google Hacking using Kali Linux to help doing Penetration Testing
– Nikto Basics using Kali Linux to help doing Penetration Testing
– Using Whois Tool Kali Linux to help doing Penetration Testing
– Email Harvesting using Kali Linux to help doing Penetration Testing
– Footprinting with Shodan in Kali Linux to help doing Penetration Testing
– Zone Transfer with Dig in Kali Linux to help doing Penetration Testing

Scanning

– Installing Metasploitable in Kali Linux
– Scanning with NMap in Kali Linux for Ethical Hacking Part 1
– Scanning with NMap in Kali Linux for Ethical Hacking Part 2
– Scanning with NMap in Kali Linux for Ethical Hacking Part 3
– Scanning with Zenmap in Kali Linux for Ethical Hacking
– Scanning with TCP Scans in Kali Linux to Learn Ethical Hacking
– NMap Bypassing Defences in Kali Linux for Ethical Hacking
– NMap Scripting in Kali Linux for Ethical Hacking Part 1
– NMap Scripting in Kali Linux for Ethical Hacking Part 2

WPA2 Cracking

– WPA2 Cracking Wireless Attack Theory in Kali Linux for Ethical Hacking
– WPA2 Cracking Putting network card in monitor mode in Kali Linux for Ethical Hacking
– WPA2 Capturing handshake with Airodump in Kali Linux for Ethical Hacking
– WPA2 Capturing RockYou.txt in Kali Linux for Ethical Hacking
– WPA2 Capturing Cracking with Hashcat in Kali Linux for Ethical Hacking
– WPA2 Cracking Making Password Lists WIth Crunch
– WPA2 Capturing Making password lists with Cupp in Kali Linux for Ethical Hacking
– WPA2 Capturing Rainbow Tables in Kali Linux for Ethical Hacking Part 1
– WPA2 Capturing Rainbow Tables in Kali Linux for Ethical Hacking Part 2
– WPA2 Capturing Installing Fluxion in Kali Linux for Ethical Hacking
– WPA2 Capturing Finding and Cracking Hidden Network in Kali Linux for Ethical Hacking
– WPA2 Capturing Preventing Wireless Attacks in Kali Linux for Ethical Hacking

Man in the Middle Attack

– Man in the middle attack ARP protocol basics in Kali Linux for Ethical Hacking
– Man in the middle MITM Attack Theory in Kali Linux for Ethical Hacking
– Man in the middle Installing MITMf in Kali Linux for Ethical Hacking
– Man in the middle attack Manual Arpspoofing in Kali Linux for Ethical Hacking
– Man in the middle attack Problems while installing MITMf in Kali Linux for Ethical Hacking
– Man in the middle attack HTTP traffic sniffing in Kali Linux for Ethical Hacking
– Man in the middle attack DNS Spoofing & HTTPS Password Sniffing in Kali Linux for Ethical Hacking
– Man in the middle attack Hooking browsers with BEEF in Kali Linux for Ethical Hacking
– Man in the middle attack Screenshotting targets browser in Kali Linux for Ethical Hacking
– Man in the middle attack Ettercap basics in Kali Linux for Ethical Hacking

System Hacking

– System Hacking MSFconsole Enviroment
– System Hacking Metasploit Modules Explained
– System Hacking Bruteforcing SSH with Metasploit
– System Hacking Attacking Tomcat With Metasploit
– System Hacking Getting Meterpreter With Command Injection
– System Hacking PHP Code Injection
– System Hacking 2 Metasploitable Exploits
– System Hacking Wine installation
– System Hacking Crafting Windows Payloads With Msfvenom
– System Hacking Encoders & Hexeditor
– System Hacking Windows 10 Meterpreter Shell
– System Hacking Meterpreter Enviroment
– System Hacking Windows 10 Privilege Escalation
– System Hacking Preventing Privilege Escalation
– System Hacking Post Exploitation Modules
– System Hacking Getting Meterpreter Over Internet With Port Forwarding
– System Hacking Eternalblue Exploit
– System Hacking Persistence Module
– System Hacking Hacking Over Internet With Ngrok
– System Hacking Android Device Attack With Venom
– System Hacking Real Hacking Begins Now!

Shipping and delivery

We are proud to offer international shipping services that currently operate in over 200 countries and islands worldwide. Nothing means more to us than bringing our customers great value and service. We will continue to grow to meet the needs of all our customers, delivering a service beyond all expectation anywhere in the world.

How do you ship packages?

Packages from our warehouse in China will be shipped by ePacket or EMS depending on the weight and size of the product. Packages shipped from our US warehouse are shipped through USPS.

Do you ship worldwide?

Yes. We provide free shipping to over 200 countries around the world. However, there are some locations we are unable to ship to. If you happen to be located in one of those countries we will contact you.

What about customs?

We are not responsible for any custom fees once the items have shipped. By purchasing our products, you consent that one or more packages may be shipped to you and may get custom fees when they arrive to your country.

How long does shipping take?

Shipping time varies by location. These are our estimates:

Location *Estimated Shipping Time
United States 10-30 Business days
Canada, Europe 10-30 Business days
Australia, New Zealand 10-30 Business days
Central & South America 15-30 Business days
Asia 10-20 Business days
Africa 15-45 Business days
*This doesn’t include our 2-5 day processing time.

Do you provide tracking information?

Yes, you will receive an email once your order ships that contains your tracking information. If you haven’t received tracking info within 5 days, please contact us.

My tracking says "no information available at the moment".

For some shipping companies, it takes 2-5 business days for the tracking information to update on the system. If your order was placed more than 5 business days ago and there is still no information on your tracking number, please contact us.

Will my items be sent in one package?

For logistical reasons, items in the same purchase will sometimes be sent in separate packages, even if you have specified combined shipping.

If you have any other questions, please contact us and we will do our best to help you out.

Refunds & returns policy

Order cancellation

All orders can be cancelled until they are shipped. If your order has been paid and you need to make a change or cancel an order, you must contact us within 12 hours. Once the packaging and shipping process has started, it can no longer be cancelled.

Refunds

Your satisfaction is our #1 priority. Therefore, you can request a refund or reshipment for ordered products if:

  • You do not receive them within the guaranteed time (45 days not including 2-5 day processing)
  • You receive the wrong item
  • You do not want the product you have received (but you must return the item at your expense and the item must be unused)

We do not issue the refund if:

  • Your order does not arrive due to factors within your control (e.g. providing the wrong shipping address)
  • Your order does not arrive due to exceptional circumstances outside our control (e.g. not cleared by customs, delayed by a natural disaster)
  • Other exceptional circumstances outside the control of ictpi.org/enrol

*You can submit refund requests within 15 days after the guaranteed period for delivery (45 days) has expired. You can do it by sending a message on page.

If you are approved for a refund, then your refund will be processed, and a credit will automatically be applied to your credit card or original method of payment, within 14 days.

Exchanges

If for any reason you would like to exchange your product, perhaps for a different size in clothing. You must contact us first and we will guide you through the steps.

Please do not send your purchase back to us unless we authorise you to do so.

Shopping cart

×

No products in the cart.