Chartered Network Associate
Chartered Network Associate is a comprehensive certification program comprising of three certifications leading to the award of Chartered Network Associate –
- CIU Certified Network Administrator
- CIU Certified Linux Administrator
- CIU Certified Ethical Hacker
Chartered Network Associate is a comprehensive certification comprising of three examinations leading to the award of Chartered Network Associate –
1. CIU Certified Network Administrator
Introduction
- Intro to Network Devices (part 1)
- Intro to Network Devices (part 2)
Network Services
- Networking Services and Applications (part 1)
- Networking Services and Applications (part 2)
- DHCP in the Network
- Introduction to the DNS Service
- Introducing Network Address Translation
WAN Technologies
- WAN Technologies (part 1)
- WAN Technologies (part 2)
- WAN Technologies (part 3)
- WAN Technologies (part 4)
Network Cabling
- Network Cabling (part 1)
- Network Cabling (part 2)
- Network Cabling (part 3)
- Network Topologies
- Network Infrastructure Implementations
Internet Protocol
- Introduction to IPv4 (part 1)
- Introduction to IPv4 (part 2)
- Introduction to IPv6
- Special IP Networking Concepts
Routing Concepts
- Introduction to Routing Concepts (part 1)
- Introduction to Routing Concepts (part 2)
- Introduction to Routing Protocols
Network Elements
- Basic Elements of Unified Communications
- Virtualization Technologies
- Storage Area Networks
- Basic Cloud Concepts
- Implementing a Basic Network
Network Monitoring & Management
- Analyzing Monitoring Reports
- Network Monitoring (part 1)
- Network Monitoring (part 2)
- Supporting Configuration Management (part 1)
- Supporting Configuration Management (part 2)
- The Importance of Network Segmentation
- Applying Patches and Updates
Switches and Wireless LAN
- Configuring Switches (part 1)
- Configuring Switches (part 2)
- Wireless LAN Infrastructure (part 1)
- Wireless LAN Infrastructure (part 2)
Risks and Vulnerabilities
- Risk and Security Related Concepts
- Common Network Vulnerabilities
- Common Network Threats (part 1)
- Common Network Threats (part 2)
Network Hardening
- Network Hardening Techniques (part 1)
- Network Hardening Techniques (part 2)
- Network Hardening Techniques (part 3)
- Physical Network Security Control
- Firewall Basics
- Network Access Control
Network Troubleshooting
- Basic Forensic Concepts
- Network Troubleshooting Methodology
- Troubleshooting Connectivity with Utilities
- Troubleshooting Connectivity with Hardware
- Troubleshooting Wireless Networks (part 1)
- Troubleshooting Wireless Networks (part 2)
- Troubleshooting Copper Wire Networks (part 1)
- Troubleshooting Copper Wire Networks (part 2)
- Troubleshooting Fiber Cable Networks
- Network Troubleshooting Common Network Issues
- Common Network Security Issues
- Common WAN Components and Issues
Networking Concepts
- The OSI Networking Reference Model
- The Transport Layer Plus ICMP
- Basic Network Concepts (part 1)
- Basic Network Concepts (part 2)
- Basic Network Concepts (part 3)
Wireless Networking Standard
- Introduction to Wireless Network Standards
- Introduction to Wired Network Standards
Security Policies and Safety
- Security Policies and other Documents
- Introduction to Safety Practices (part 1)
- Introduction to Safety Practices (part 2)
Other Concepts
- Rack and Power Management
- Cable Management
- Basics of Change Management
- Common Networking Protocols (part 1)
- Common Networking Protocols (part 2)
2. CIU Certified Linux Administrator
Introduction
- Introduction to RedHat Linux
- Why learn RedHat Linux
- Downloading, Installing, and Configuring VirtualBox on Windows 8
Red Hat Virtual Machine
- Create a Red Hat Virtual Machine Part 1
- Create a Red Hat Virtual Machine Part 2
- Create a Red Hat Virtual Machine Part 3
Dual boot Red Hat and Windows 8
- How to dual boot Red Hat and Windows 8 Part 1
- How to dual boot Red Hat and Windows 8 Part 2
Linux Graphical User Interface
- Basic familiarization with Linux Graphical User Interface Part 1
- Basic familiarization with Linux Graphical User Interface Part 2
RedHat File System
- File System Navigation Commands ls, cd, pwd Part 1
- File System Navigation Commands ls, cd, pwd Part 2
- Finding files Commands find, locate, upadtedb, man
File and folder ownership and permissions
- File and folder ownership and permissions Command chown, chmod Part 1
- File and folder ownership and permissions Command chown, chmod Part 2
- Move, delete and copy files Commands mv, rm, cp
- Commands grep, pipe, echo, cat
RedHat Yum and RPM Package Manager
- YUM Package Manager Part 1
- YUM Package Manager Part 2
- RPM Package Manager
Globbing Wildcards
- Globbing Wildcards Part 1
- Globbing Wildcards Part 2
IO Redirection
- IO Redirection Part 1
- IO Redirection Part 2
- IO Redirection Part 3
Vim Text Editor
- Vim Text Editor Part 1
- Vim Text Editor Part 2
- Vim Text Editor Part 3
- Vim Text Editor Part 4
- Vim Text Editor Part 5
3. CIU Certified Ethical Hacker
Introduction
– Virtual Box install tutorial
– Kali Linux Installation
– Going Full Screen with Kali Linux
Command Line with Kali Linux
– Kali Linux Command Line Part 1
– Kali Linux Command Line Part 2
– Kali Linux Command Line Part 3
Preparing your Lab
– Changing IP Address and Setting up Wireless Adapter in Kali Linux
– Creating Bootable USB Kali Linux on Stick
– Important Networking Terms in Kali Linux to help doing Penetration Testing
– Important Hacking Terms in Kali Linux to help doing Penetration Testing
– Important Steps to Do after Installing Kali Linux to help doing Penetration Testing
– Changing MAC Address using Macchanger to help doing Penetration Testing
Footprinting
– Google Hacking using Kali Linux to help doing Penetration Testing
– Nikto Basics using Kali Linux to help doing Penetration Testing
– Using Whois Tool Kali Linux to help doing Penetration Testing
– Email Harvesting using Kali Linux to help doing Penetration Testing
– Footprinting with Shodan in Kali Linux to help doing Penetration Testing
– Zone Transfer with Dig in Kali Linux to help doing Penetration Testing
Scanning
– Installing Metasploitable in Kali Linux
– Scanning with NMap in Kali Linux for Ethical Hacking Part 1
– Scanning with NMap in Kali Linux for Ethical Hacking Part 2
– Scanning with NMap in Kali Linux for Ethical Hacking Part 3
– Scanning with Zenmap in Kali Linux for Ethical Hacking
– Scanning with TCP Scans in Kali Linux to Learn Ethical Hacking
– NMap Bypassing Defences in Kali Linux for Ethical Hacking
– NMap Scripting in Kali Linux for Ethical Hacking Part 1
– NMap Scripting in Kali Linux for Ethical Hacking Part 2
WPA2 Cracking
– WPA2 Cracking Wireless Attack Theory in Kali Linux for Ethical Hacking
– WPA2 Cracking Putting network card in monitor mode in Kali Linux for Ethical Hacking
– WPA2 Capturing handshake with Airodump in Kali Linux for Ethical Hacking
– WPA2 Capturing RockYou.txt in Kali Linux for Ethical Hacking
– WPA2 Capturing Cracking with Hashcat in Kali Linux for Ethical Hacking
– WPA2 Cracking Making Password Lists WIth Crunch
– WPA2 Capturing Making password lists with Cupp in Kali Linux for Ethical Hacking
– WPA2 Capturing Rainbow Tables in Kali Linux for Ethical Hacking Part 1
– WPA2 Capturing Rainbow Tables in Kali Linux for Ethical Hacking Part 2
– WPA2 Capturing Installing Fluxion in Kali Linux for Ethical Hacking
– WPA2 Capturing Finding and Cracking Hidden Network in Kali Linux for Ethical Hacking
– WPA2 Capturing Preventing Wireless Attacks in Kali Linux for Ethical Hacking
Man in the Middle Attack
– Man in the middle attack ARP protocol basics in Kali Linux for Ethical Hacking
– Man in the middle MITM Attack Theory in Kali Linux for Ethical Hacking
– Man in the middle Installing MITMf in Kali Linux for Ethical Hacking
– Man in the middle attack Manual Arpspoofing in Kali Linux for Ethical Hacking
– Man in the middle attack Problems while installing MITMf in Kali Linux for Ethical Hacking
– Man in the middle attack HTTP traffic sniffing in Kali Linux for Ethical Hacking
– Man in the middle attack DNS Spoofing & HTTPS Password Sniffing in Kali Linux for Ethical Hacking
– Man in the middle attack Hooking browsers with BEEF in Kali Linux for Ethical Hacking
– Man in the middle attack Screenshotting targets browser in Kali Linux for Ethical Hacking
– Man in the middle attack Ettercap basics in Kali Linux for Ethical Hacking
System Hacking
– System Hacking MSFconsole Enviroment
– System Hacking Metasploit Modules Explained
– System Hacking Bruteforcing SSH with Metasploit
– System Hacking Attacking Tomcat With Metasploit
– System Hacking Getting Meterpreter With Command Injection
– System Hacking PHP Code Injection
– System Hacking 2 Metasploitable Exploits
– System Hacking Wine installation
– System Hacking Crafting Windows Payloads With Msfvenom
– System Hacking Encoders & Hexeditor
– System Hacking Windows 10 Meterpreter Shell
– System Hacking Meterpreter Enviroment
– System Hacking Windows 10 Privilege Escalation
– System Hacking Preventing Privilege Escalation
– System Hacking Post Exploitation Modules
– System Hacking Getting Meterpreter Over Internet With Port Forwarding
– System Hacking Eternalblue Exploit
– System Hacking Persistence Module
– System Hacking Hacking Over Internet With Ngrok
– System Hacking Android Device Attack With Venom
– System Hacking Real Hacking Begins Now!