CIU CNA Course Modules
Section 1: Wireshark Introduction
— Lecture 1 : Introduction to Wireshark
— Lecture 2 : Basic Networking Terms and Concepts
— Lecture 3 : OSI Model
Section 2: Getting Started with Wireshark
— Lecture 4 : Wireshark Installation and Setup
— Lecture 5 : Wireshark Interfaces
— Lecture 6 : Wireshark Interfaces Advance
Section 3: Key functions for use within Wireshark
— Lecture 7 : Protocol Filters
— Lecture 8 : IP and Port Filters
— Lecture 9 : HTTP Packet Analysis
— Lecture 10 : Extracting Credentials
Section 4: Firewalls and Unauthorized Traffic with Wireshark
— Lecture 11 : Wireshark and Linux Firewall, Interaction
— Lecture 12 : Demonstration Detecting Unauthorized Traffic
Section 5: Introduction to Wireshark Command Line Interface and Tshark
— Lecture 13 : Introduction to Wireshark Commandline Interface
— Lecture 14 : First Usage of Wireshark CLI
— Lecture 15 : Tshark File Output
— Lecture 16 : Tshark Timer Limits
— Lecture 17 : Tshark Splitting Output Files
— Lecture 18 : Display and Capture Filters (Diffrences)
— Lecture 19 : Field Separation in Tshark
Section 6:Network card modes – motioning and remote capture
— Lecture 20 : Network card Modes
— Lecture 21 : How to Enable Monitor Mode Part 1
— Lecture 22 : How to Enable Monitor Mode Part 2
— Lecture 23 : Capture Remote Traffic
— Lecture 24 : Decrypting Wireless Traffic
Section 7: Tshark output formatting
— Lecture 25 : Formating Output to a CSV File
— Lecture 26 : Exporting Packet Contents
Section 8: Wireshark and nmap interaction
— Lecture 27 : Wireshark and Nmap Part 1
— Lecture 28 : Wireshark and Nmap Part 2
Section 9: Tunneling Wireshark traffic online
— Lecture 29 : SSH Tunneling to Wireshark Part 1
— Lecture 30 : SSH Tunneling to Wireshark Part 2
— Lecture 31 : SSH Tunneling to Wireshark Part 3
— Lecture 32 : SSH Tunneling to Wireshark Part 4
Section 10: TCPDump Network Sniffer & Linux Traceroute
— Lecture 33 : Introduction to the TCPDump Network Sniffer
— Lecture 34 : TCPDump with Wireshark
— Lecture 35 : Detailed Introduction to Linux Traceroute
— Lecture 36 : Using Scapy to Manually Create a SYN Port Scan
Section 11: Packet Anaysis & Capture with Network Miner
— Lecture 37 : Network Miner Packet Analysis Tool in Windows 10
— Lecture 38 : Network Miner Network Packet Capture Parser
Section 12: Nitroba University Harassment Case Study
— Lecture 39 : Harassment Case Study Slides
— Lecture 40 : Network PCAP for Case Analysis
— Lecture 41 : Case Study using Wireshark and NetworkMiner
— Lecture 42 : Harassment case Investigation with Network Miner
— Lecture 43 : Nitroba Harassment Lab Scenarios
— Lecture 44 : Case Assessment
“CIU CNA Assessment
“Why Hands-on Assessment
Real customer reviews