Back to Chartered

Chartered Security Associate

 9,250.00

Chartered Security Associate comprise 4 certifications at US$ 125

Chartered Security Associate is an online certification course with a focus on hands-on skills in Security Management, Accredited by EUAS ‘USA (Euro Universal Accreditation Systems’ USA) and CSA Council, awarded jointly by Cambridge Intercontinental University and Institute of Chartered Telecom Professionals.

– Online Contents
– Online Exam
– CSA Council Accredited
– EUAS ‘USA Accredited
– Security Masters Program
– Awarded by CIU & ICTP

 

Category:
Buyer protection
Safe shopping
Easy returns and refunds
Free shipping worldwide

Chartered Security Associate

Chartered Security Associate is a comprehensive certification program comprising of three certifications leading to the award of Chartered Telecom Associate –

  1. CIU Certified Routing & Switching Administrator
  2. CIU Certified Security Administrator
  3. CIU Certified Ethical Hacker

Chartered Telecom Associate - Telecom Masters Program

Chartered Security Associate is a comprehensive certification comprising of three examinations leading to the award of Chartered Security Associate –

1.  CIU Certified Routing & Switching Administrator

MODULE 1
=========
– What is the Cisco CCNA Exam?
– What is the CCNA Exam Format?
– The Best Way to Prepare
– How to Build a CCNA Home Lab
– CCNA Preparation Materials
– After the CCNA
– LAB – Connect to a Router

MODULE 2
=========
– Common Network Devices
– Network Cables and Connectors
– The OSI Model
– The TCP Model
– TCP/IP Protocols and Services
– LAN Technologies
– Topologies
– Network Appliances
– Inside a Cisco Router
– LAB – ARP, Telnet and PING

MODULE 3
=========
– VLANs and Trunks
– Spanning Tree Protocol
– The Cisco 2960 Switch
– LAB – VLANs
– LAB – Trunking

MODULE 4
=========
– IPv4 Addressing
– Easy Subnetting
– IPv6 Addressing
– Planning IP Addressing
– Route Summarization

MODULE 5
=========
– Routing Concepts
– Routing Protocols
– Configuring the Router
– Static Routing
– LAB – Static Routes
– LAB – Configuring RIP
– LAB – Configuring EIGRP
– LAB – Configuring OSPF

MODULE 6
=========
– Access Lists
– User Authentication
– Firewalls and DMZ
– Tunneling, Encryption, and Remote Access
– Security Appliances
– Switch Security
– LAB – Configuring Standard ACLs
– LAB – Extended ACLs
– LAB – Named ACLs

MODULE 7
=========
– Network Address Translation
– Cisco Discovery Protocol
– NTP and Logging
– Simple Network Management Protocol
– Dynamic Host Configuration Protocol
– LAB – Static NAT
– LAB – Dynamic NAT

MODULE 8
=========
– Frame Relay
– Wide Area Networks
– LAB – PPP

MODULE 9
=========
– Router and Switch Troubleshooting

 

2.  CIU Certified Security Administrator

MODULE 1: Introduction
=========
– Introduction to Network Security
– Common Security Threats
– Risk Assessment and Security documents
– Network Topologies
– Email-based threats
– Web-based threats

MODULE 2: Passwords and Privilege Levels
=========
– Security and Cisco Routers: An introduction
– Password Management
– Password Management for remote connections
– Understanding Privilege Levels
– Introduction to Cisco Configuration Professional (CCP)
– CCP: In-depth

MODULE 3: AAA
=========
– Introduction to AAA
– Configuring AAA
– Configuring AAA (Part 2)
– Cisco Secure ACS
– Zoom-in: RADIUS and TACACS+ protocols
– AAA: Authorization and Accounting
– Role-Based Access Control (RBAC) using Privilege Levels
– Role-Based Access Control (RBAC) using Parser Views
– Integration of Active Directory with AAA
– Authentication and Authorization using Cisco ISE
– 802.1X
– BYOD

MODULE 4: Access Lists
=========
– Introduction to ACLs
– Wildcards and Network Summarization
– Implementing ACLs
– Implementing ACLs through CCP
– Using Object groups with ACLs

MODULE 5: Network Management and Access
=========
– Implementing Password Policies
– Network Management Protocols (Part 1)
– Network Management Protocols (Part 2)
– Restricting VTY Access and SNMP Overview
– Logging, NTP and Cisco IOS Resilient Configuration

MODULE 6: Layer 2 Attacks
========
– Common Layer 2 Attacks
– Configuring switch ports and VLANs
– General Layer 2 best security practices
– Port Security (Part 1)
– Port Security (Part 2)
– STP Security
– DHCP Snooping and DAI

MODULE 7: Firewalls and NAT
=========
– Introduction to Firewalls
– Introduction to NAT
– Introduction to Cisco IOS Zone-based Firewall (ZFW)
– Configuring Cisco IOS Zone-based Firewall via CLI (Part 1)
– Configuring Cisco IOS Zone-based Firewall via CLI (Part 2)
– Configuring Cisco IOS Zone-based Firewall via CCP
– Configuring Cisco IOS NAT (Part 1)
– Configuring Cisco IOS NAT (Part 2)
– Intro to Cisco ASA: modes, HA, contexts, FW services
– Configuring the Cisco ASA via CLI (Part 1)
– Configuring the Cisco ASA via CLI (Part 2)
– Configuring the Cisco ASA via ASDM
– NAT on the ASA
– Network Object NAT
– Twice NAT

MODULE 8: Intrusion Prevention and Detection Systems (IPS/IDS)
=========
– Introduction to Cryptography (Part 1)
– Cisco IPS Solutions

MODULE 9: Cryptography and VPN
=========
– Introduction to Cryptography (Part 1)
– Introduction to Cryptography (Part 2)
– Introduction to Virtual Private Networks (VPN)
– IPSec VPN (Part 1)
– IPSec VPN (Part 2)
– Configuring IOS IPSec Site-to-Site VPN
– Verifying IOS IPSec Site-to-Site VPN
– IPSec site-to-site VPN with PSK on ASA
– Verifying IPSec L2L VPN on the ASA
– SSL VPN
– Configuring Clientless SSL VPN on ASA
– Configuring AnyConnect SSL VPN on ASA
– Identify Endpoint Posture Assessment
– Hairpinning, Split Tunneling, Always-on, NAT Traversal

 

3.  CIU Certified Ethical Hacker

Introduction

– Virtual Box install tutorial
– Kali Linux Installation
– Going Full Screen with Kali Linux

Command Line with Kali Linux

– Kali Linux Command Line Part 1
– Kali Linux Command Line Part 2
– Kali Linux Command Line Part 3

Preparing your Lab

– Changing IP Address and Setting up Wireless Adapter in Kali Linux
– Creating Bootable USB Kali Linux on Stick
– Important Networking Terms in Kali Linux to help doing Penetration Testing
– Important Hacking Terms in Kali Linux to help doing Penetration Testing
– Important Steps to Do after Installing Kali Linux to help doing Penetration Testing
– Changing MAC Address using Macchanger to help doing Penetration Testing

Footprinting

– Google Hacking using Kali Linux to help doing Penetration Testing
– Nikto Basics using Kali Linux to help doing Penetration Testing
– Using Whois Tool Kali Linux to help doing Penetration Testing
– Email Harvesting using Kali Linux to help doing Penetration Testing
– Footprinting with Shodan in Kali Linux to help doing Penetration Testing
– Zone Transfer with Dig in Kali Linux to help doing Penetration Testing

Scanning

– Installing Metasploitable in Kali Linux
– Scanning with NMap in Kali Linux for Ethical Hacking Part 1
– Scanning with NMap in Kali Linux for Ethical Hacking Part 2
– Scanning with NMap in Kali Linux for Ethical Hacking Part 3
– Scanning with Zenmap in Kali Linux for Ethical Hacking
– Scanning with TCP Scans in Kali Linux to Learn Ethical Hacking
– NMap Bypassing Defences in Kali Linux for Ethical Hacking
– NMap Scripting in Kali Linux for Ethical Hacking Part 1
– NMap Scripting in Kali Linux for Ethical Hacking Part 2

WPA2 Cracking

– WPA2 Cracking Wireless Attack Theory in Kali Linux for Ethical Hacking
– WPA2 Cracking Putting network card in monitor mode in Kali Linux for Ethical Hacking
– WPA2 Capturing handshake with Airodump in Kali Linux for Ethical Hacking
– WPA2 Capturing RockYou.txt in Kali Linux for Ethical Hacking
– WPA2 Capturing Cracking with Hashcat in Kali Linux for Ethical Hacking
– WPA2 Cracking Making Password Lists WIth Crunch
– WPA2 Capturing Making password lists with Cupp in Kali Linux for Ethical Hacking
– WPA2 Capturing Rainbow Tables in Kali Linux for Ethical Hacking Part 1
– WPA2 Capturing Rainbow Tables in Kali Linux for Ethical Hacking Part 2
– WPA2 Capturing Installing Fluxion in Kali Linux for Ethical Hacking
– WPA2 Capturing Finding and Cracking Hidden Network in Kali Linux for Ethical Hacking
– WPA2 Capturing Preventing Wireless Attacks in Kali Linux for Ethical Hacking

Man in the Middle Attack

– Man in the middle attack ARP protocol basics in Kali Linux for Ethical Hacking
– Man in the middle MITM Attack Theory in Kali Linux for Ethical Hacking
– Man in the middle Installing MITMf in Kali Linux for Ethical Hacking
– Man in the middle attack Manual Arpspoofing in Kali Linux for Ethical Hacking
– Man in the middle attack Problems while installing MITMf in Kali Linux for Ethical Hacking
– Man in the middle attack HTTP traffic sniffing in Kali Linux for Ethical Hacking
– Man in the middle attack DNS Spoofing & HTTPS Password Sniffing in Kali Linux for Ethical Hacking
– Man in the middle attack Hooking browsers with BEEF in Kali Linux for Ethical Hacking
– Man in the middle attack Screenshotting targets browser in Kali Linux for Ethical Hacking
– Man in the middle attack Ettercap basics in Kali Linux for Ethical Hacking

System Hacking

– System Hacking MSFconsole Enviroment
– System Hacking Metasploit Modules Explained
– System Hacking Bruteforcing SSH with Metasploit
– System Hacking Attacking Tomcat With Metasploit
– System Hacking Getting Meterpreter With Command Injection
– System Hacking PHP Code Injection
– System Hacking 2 Metasploitable Exploits
– System Hacking Wine installation
– System Hacking Crafting Windows Payloads With Msfvenom
– System Hacking Encoders & Hexeditor
– System Hacking Windows 10 Meterpreter Shell
– System Hacking Meterpreter Enviroment
– System Hacking Windows 10 Privilege Escalation
– System Hacking Preventing Privilege Escalation
– System Hacking Post Exploitation Modules
– System Hacking Getting Meterpreter Over Internet With Port Forwarding
– System Hacking Eternalblue Exploit
– System Hacking Persistence Module
– System Hacking Hacking Over Internet With Ngrok
– System Hacking Android Device Attack With Venom
– System Hacking Real Hacking Begins Now!

Shipping and delivery

We are proud to offer international shipping services that currently operate in over 200 countries and islands worldwide. Nothing means more to us than bringing our customers great value and service. We will continue to grow to meet the needs of all our customers, delivering a service beyond all expectation anywhere in the world.

How do you ship packages?

Packages from our warehouse in China will be shipped by ePacket or EMS depending on the weight and size of the product. Packages shipped from our US warehouse are shipped through USPS.

Do you ship worldwide?

Yes. We provide free shipping to over 200 countries around the world. However, there are some locations we are unable to ship to. If you happen to be located in one of those countries we will contact you.

What about customs?

We are not responsible for any custom fees once the items have shipped. By purchasing our products, you consent that one or more packages may be shipped to you and may get custom fees when they arrive to your country.

How long does shipping take?

Shipping time varies by location. These are our estimates:

Location *Estimated Shipping Time
United States 10-30 Business days
Canada, Europe 10-30 Business days
Australia, New Zealand 10-30 Business days
Central & South America 15-30 Business days
Asia 10-20 Business days
Africa 15-45 Business days
*This doesn’t include our 2-5 day processing time.

Do you provide tracking information?

Yes, you will receive an email once your order ships that contains your tracking information. If you haven’t received tracking info within 5 days, please contact us.

My tracking says "no information available at the moment".

For some shipping companies, it takes 2-5 business days for the tracking information to update on the system. If your order was placed more than 5 business days ago and there is still no information on your tracking number, please contact us.

Will my items be sent in one package?

For logistical reasons, items in the same purchase will sometimes be sent in separate packages, even if you have specified combined shipping.

If you have any other questions, please contact us and we will do our best to help you out.

Refunds & returns policy

Order cancellation

All orders can be cancelled until they are shipped. If your order has been paid and you need to make a change or cancel an order, you must contact us within 12 hours. Once the packaging and shipping process has started, it can no longer be cancelled.

Refunds

Your satisfaction is our #1 priority. Therefore, you can request a refund or reshipment for ordered products if:

  • You do not receive them within the guaranteed time (45 days not including 2-5 day processing)
  • You receive the wrong item
  • You do not want the product you have received (but you must return the item at your expense and the item must be unused)

We do not issue the refund if:

  • Your order does not arrive due to factors within your control (e.g. providing the wrong shipping address)
  • Your order does not arrive due to exceptional circumstances outside our control (e.g. not cleared by customs, delayed by a natural disaster)
  • Other exceptional circumstances outside the control of ictpi.org/enrol

*You can submit refund requests within 15 days after the guaranteed period for delivery (45 days) has expired. You can do it by sending a message on page.

If you are approved for a refund, then your refund will be processed, and a credit will automatically be applied to your credit card or original method of payment, within 14 days.

Exchanges

If for any reason you would like to exchange your product, perhaps for a different size in clothing. You must contact us first and we will guide you through the steps.

Please do not send your purchase back to us unless we authorise you to do so.

Shopping cart

×

No products in the cart.