Back to Chartered

Chartered Network Engineer

 9,250.00

Chartered Network Engineer comprise 4 certifications at US$ 125

Chartered Network Engineer is an online certification course with a focus on hands-on skills in Network Management, Accredited by EUAS ‘USA (Euro Universal Accreditation Systems’ USA) and CSA Council, awarded jointly by Cambridge Intercontinental University and Institute of Chartered Telecom Professionals.

– Online Contents
– Online Exam
– CSA Council Accredited
– EUAS ‘USA Accredited
– Network Masters Program
– Awarded by CIU & ICTP

 

Category:
Buyer protection
Safe shopping
Easy returns and refunds
Free shipping worldwide

Chartered Network Engineer

Chartered Network Engineer is a comprehensive certification program comprising of three certifications leading to the award of Chartered Network Engineer –

  1. CIU Certified Routing & Switching Administrator
  2. CIU Certified Security Administrator
  3. CIU Certified Wireless & Web Pentester

Chartered Telecom Associate - Telecom Masters Program

Chartered Network Engineer is a comprehensive certification comprising of three examinations leading to the award of Chartered Network Engineer –

1.  CIU Certified Routing & Switching Associate

MODULE 1
=========
– What is the Cisco CCNA Exam?
– What is the CCNA Exam Format?
– The Best Way to Prepare
– How to Build a CCNA Home Lab
– CCNA Preparation Materials
– After the CCNA
– LAB – Connect to a Router

MODULE 2
=========
– Common Network Devices
– Network Cables and Connectors
– The OSI Model
– The TCP Model
– TCP/IP Protocols and Services
– LAN Technologies
– Topologies
– Network Appliances
– Inside a Cisco Router
– LAB – ARP, Telnet and PING

MODULE 3
=========
– VLANs and Trunks
– Spanning Tree Protocol
– The Cisco 2960 Switch
– LAB – VLANs
– LAB – Trunking

MODULE 4
=========
– IPv4 Addressing
– Easy Subnetting
– IPv6 Addressing
– Planning IP Addressing
– Route Summarization

MODULE 5
=========
– Routing Concepts
– Routing Protocols
– Configuring the Router
– Static Routing
– LAB – Static Routes
– LAB – Configuring RIP
– LAB – Configuring EIGRP
– LAB – Configuring OSPF

MODULE 6
=========
– Access Lists
– User Authentication
– Firewalls and DMZ
– Tunneling, Encryption, and Remote Access
– Security Appliances
– Switch Security
– LAB – Configuring Standard ACLs
– LAB – Extended ACLs
– LAB – Named ACLs

MODULE 7
=========
– Network Address Translation
– Cisco Discovery Protocol
– NTP and Logging
– Simple Network Management Protocol
– Dynamic Host Configuration Protocol
– LAB – Static NAT
– LAB – Dynamic NAT

MODULE 8
=========
– Frame Relay
– Wide Area Networks
– LAB – PPP

MODULE 9
=========
– Router and Switch Troubleshooting

 

2.  CIU Certified Security Administrator

MODULE 1: Introduction
=========
– Introduction to Network Security
– Common Security Threats
– Risk Assessment and Security documents
– Network Topologies
– Email-based threats
– Web-based threats

MODULE 2: Passwords and Privilege Levels
=========
– Security and Cisco Routers: An introduction
– Password Management
– Password Management for remote connections
– Understanding Privilege Levels
– Introduction to Cisco Configuration Professional (CCP)
– CCP: In-depth

MODULE 3: AAA
=========
– Introduction to AAA
– Configuring AAA
– Configuring AAA (Part 2)
– Cisco Secure ACS
– Zoom-in: RADIUS and TACACS+ protocols
– AAA: Authorization and Accounting
– Role-Based Access Control (RBAC) using Privilege Levels
– Role-Based Access Control (RBAC) using Parser Views
– Integration of Active Directory with AAA
– Authentication and Authorization using Cisco ISE
– 802.1X
– BYOD

MODULE 4: Access Lists
=========
– Introduction to ACLs
– Wildcards and Network Summarization
– Implementing ACLs
– Implementing ACLs through CCP
– Using Object groups with ACLs

MODULE 5: Network Management and Access
=========
– Implementing Password Policies
– Network Management Protocols (Part 1)
– Network Management Protocols (Part 2)
– Restricting VTY Access and SNMP Overview
– Logging, NTP and Cisco IOS Resilient Configuration

MODULE 6: Layer 2 Attacks
========
– Common Layer 2 Attacks
– Configuring switch ports and VLANs
– General Layer 2 best security practices
– Port Security (Part 1)
– Port Security (Part 2)
– STP Security
– DHCP Snooping and DAI

MODULE 7: Firewalls and NAT
=========
– Introduction to Firewalls
– Introduction to NAT
– Introduction to Cisco IOS Zone-based Firewall (ZFW)
– Configuring Cisco IOS Zone-based Firewall via CLI (Part 1)
– Configuring Cisco IOS Zone-based Firewall via CLI (Part 2)
– Configuring Cisco IOS Zone-based Firewall via CCP
– Configuring Cisco IOS NAT (Part 1)
– Configuring Cisco IOS NAT (Part 2)
– Intro to Cisco ASA: modes, HA, contexts, FW services
– Configuring the Cisco ASA via CLI (Part 1)
– Configuring the Cisco ASA via CLI (Part 2)
– Configuring the Cisco ASA via ASDM
– NAT on the ASA
– Network Object NAT
– Twice NAT

MODULE 8: Intrusion Prevention and Detection Systems (IPS/IDS)
=========
– Introduction to Cryptography (Part 1)
– Cisco IPS Solutions

MODULE 9: Cryptography and VPN
=========
– Introduction to Cryptography (Part 1)
– Introduction to Cryptography (Part 2)
– Introduction to Virtual Private Networks (VPN)
– IPSec VPN (Part 1)
– IPSec VPN (Part 2)
– Configuring IOS IPSec Site-to-Site VPN
– Verifying IOS IPSec Site-to-Site VPN
– IPSec site-to-site VPN with PSK on ASA
– Verifying IPSec L2L VPN on the ASA
– SSL VPN
– Configuring Clientless SSL VPN on ASA
– Configuring AnyConnect SSL VPN on ASA
– Identify Endpoint Posture Assessment
– Hairpinning, Split Tunneling, Always-on, NAT Traversal

 

3.  CIU Certified Wireless & Web Pentester

Introduction

– Introduction to Ethical Hacking
– Prerequisites
– Basic terminology Part 1
– Basic terminology Part 2

Wireless and Web Pentesting Lab Setup

– Creating the virtual environment
– Installing VirtualBox method 1
– Installing VirtualBox method 2
– Installing VirtualBox Guest Additions
– Installing VirtualBox in a Windows 8 1 enviroment
– Kali Linux installation
– Kali Linux installation Part 2

Kali Linux Command Line Interface CLI

– Introduction to the Linux terminal
– Linux CLI basics Part 1
– Linux CLI basics Part 2

Kali Linux TOR Project

– Wireless & Web Pentesting TOR Part 1
– Wireless & Web Pentesting TOR Part 2

Wireless and Web Pentesting Proxychains

– Wireless and Web Pentesting Proxychains Part 1
– Wireless and Web Pentesting Proxychains Part 2
– Wireless and Web Pentesting Proxychains Part 3

Virtual Private Networking – VPN

– Virtual Private Networking Part 1
– Virtual Private Networking Part 2

Media Access Control – MAC

– Media Access Control Part 1
– Media Access Control Part 2

Network Mapper – NMap

– Network Mapper Part 1
– Network Mapper Part 2
– Nmap External Resources

Pentesting with Aircrack NG

– Aircrack+reaver Installation
– Installing aircack ng on Windows + Crunch on Linux
– Introduction to Cracking WPA⁄WPA2

Aircrack ng crunch usage

– Aircrack ng crunch usage example 1
– Aircrack ng crunch usage example 2
– Aircrack ng crunch usage example 3

Cracking WPS pins with reaver

– Cracking WPS pins with reaver Part 1
– Cracking WPS pins with reaver Part 2
– Cracking WPS pins with reaver Part 3

Denial of Service on Wireless Networks

– Performing denial of service on wireless networks part 1
– Performing denial of service on wireless networks part 2

SSL Strip

– SSL strip part 1
– SSL strip part 2
– SSL strip part 3

Funny Things To DO

– Funny things part 1
– Funny things part 2
– Funny things part 3

Evil Twin

– Evil twin part 1
– Evil twin part 2
– Evil twin part 3

Using Known Vulnerabilities

– Using known vulnerabilities part 1
– Using known vulnerabilities part 2
– Using known vulnerabilities part 3

Post Authentication Exploitation DNS

– Post authentication exploitation DNS part 1
– Post authentication exploitation DNS part 2
– Post authentication exploitation DNS part 3

SQL Injection

– SQL Injection part 1
– SQL Injection part 2
– SQL Injection part 3
– SQL Injection part 4
– SQL Injection part 5

Shipping and delivery

We are proud to offer international shipping services that currently operate in over 200 countries and islands worldwide. Nothing means more to us than bringing our customers great value and service. We will continue to grow to meet the needs of all our customers, delivering a service beyond all expectation anywhere in the world.

How do you ship packages?

Packages from our warehouse in China will be shipped by ePacket or EMS depending on the weight and size of the product. Packages shipped from our US warehouse are shipped through USPS.

Do you ship worldwide?

Yes. We provide free shipping to over 200 countries around the world. However, there are some locations we are unable to ship to. If you happen to be located in one of those countries we will contact you.

What about customs?

We are not responsible for any custom fees once the items have shipped. By purchasing our products, you consent that one or more packages may be shipped to you and may get custom fees when they arrive to your country.

How long does shipping take?

Shipping time varies by location. These are our estimates:

Location *Estimated Shipping Time
United States 10-30 Business days
Canada, Europe 10-30 Business days
Australia, New Zealand 10-30 Business days
Central & South America 15-30 Business days
Asia 10-20 Business days
Africa 15-45 Business days
*This doesn’t include our 2-5 day processing time.

Do you provide tracking information?

Yes, you will receive an email once your order ships that contains your tracking information. If you haven’t received tracking info within 5 days, please contact us.

My tracking says "no information available at the moment".

For some shipping companies, it takes 2-5 business days for the tracking information to update on the system. If your order was placed more than 5 business days ago and there is still no information on your tracking number, please contact us.

Will my items be sent in one package?

For logistical reasons, items in the same purchase will sometimes be sent in separate packages, even if you have specified combined shipping.

If you have any other questions, please contact us and we will do our best to help you out.

Refunds & returns policy

Order cancellation

All orders can be cancelled until they are shipped. If your order has been paid and you need to make a change or cancel an order, you must contact us within 12 hours. Once the packaging and shipping process has started, it can no longer be cancelled.

Refunds

Your satisfaction is our #1 priority. Therefore, you can request a refund or reshipment for ordered products if:

  • You do not receive them within the guaranteed time (45 days not including 2-5 day processing)
  • You receive the wrong item
  • You do not want the product you have received (but you must return the item at your expense and the item must be unused)

We do not issue the refund if:

  • Your order does not arrive due to factors within your control (e.g. providing the wrong shipping address)
  • Your order does not arrive due to exceptional circumstances outside our control (e.g. not cleared by customs, delayed by a natural disaster)
  • Other exceptional circumstances outside the control of ictpi.org/enrol

*You can submit refund requests within 15 days after the guaranteed period for delivery (45 days) has expired. You can do it by sending a message on page.

If you are approved for a refund, then your refund will be processed, and a credit will automatically be applied to your credit card or original method of payment, within 14 days.

Exchanges

If for any reason you would like to exchange your product, perhaps for a different size in clothing. You must contact us first and we will guide you through the steps.

Please do not send your purchase back to us unless we authorise you to do so.

Shopping cart

×

No products in the cart.