“CIU CNA Course Modules
Section 1: Wireshark Introduction (Free Preview)
-- Lecture 1 : Introduction to Wireshark
-- Lecture 2 : Basic Networking Terms and Concepts
-- Lecture 3 : OSI Model
Section 2: Getting Started with Wireshark (Free Preview)
-- Lecture 4 : Wireshark Installation and Setup
-- Lecture 5 : Wireshark Interfaces
-- Lecture 6 : Wireshark Interfaces Advance
Section 3: Key functions for use within Wireshark
-- Lecture 7 : Protocol Filters
-- Lecture 8 : IP and Port Filters
-- Lecture 9 : HTTP Packet Analysis
-- Lecture 10 : Extracting Credentials
Section 4: Firewalls and Unauthorized Traffic with Wireshark
-- Lecture 11 : Wireshark and Linux Firewall, Interaction
-- Lecture 12 : Demonstration Detecting Unauthorized Traffic
Section 5: Introduction to Wireshark Command Line Interface and Tshark
-- Lecture 13 : Introduction to Wireshark Commandline Interface
-- Lecture 14 : First Usage of Wireshark CLI
-- Lecture 15 : Tshark File Output
-- Lecture 16 : Tshark Timer Limits
-- Lecture 17 : Tshark Splitting Output Files
-- Lecture 18 : Display and Capture Filters (Diffrences)
-- Lecture 19 : Field Separation in Tshark
Section 6:Network card modes - motioning and remote capture
-- Lecture 20 : Networkcard Modes
-- Lecture 21 : How to Enable Monitor Mode Part 1
-- Lecture 22 : How to Enable Monitor Mode Part 2
-- Lecture 23 : Capture Remote Traffic
-- Lecture 24 : Decrypting Wireless Traffic
Section 7: Tshark output formatting
-- Lecture 25 : Formating Output to a CSV File
-- Lecture 26 : Exporting Packet Contents
Section 8: Wireshark and nmap interaction
-- Lecture 27 : Wireshark and Nmap Part 1
-- Lecture 28 : Wireshark and Nmap Part 2
Section 9: Tunneling Wireshark traffic online
-- Lecture 29 : SSH Tunneling to Wireshark Part 1
-- Lecture 30 : SSH Tunneling to Wireshark Part 2
-- Lecture 31 : SSH Tunneling to Wireshark Part 3
-- Lecture 32 : SSH Tunneling to Wireshark Part 4
Section 10: TCPDump Network Sniffer & Linux Traceroute
-- Lecture 33 : Introduction to the TCPDump Network Sniffer
-- Lecture 34 : TCPDump with Wireshark
-- Lecture 35 : Detailed Introduction to Linux Traceroute
-- Lecture 36 : Using Scapy to Manually Create a SYN Port Scan
Section 11: Packet Anaysis & Capture with Network Miner
-- Lecture 37 : Network Miner Packet Analysis Tool in Windows 10
-- Lecture 38 : Network Miner Network Packet Capture Parser
Section 12: Nitroba University Harassment Case Study
-- Lecture 39 : Harassment Case Study Slides
-- Lecture 40 : Network PCAP for Case Analysis
-- Lecture 41 : Case Study using Wireshark and NetworkMiner
-- Lecture 42 : Harassment case Investigation with Network Miner
-- Lecture 43 : Nitroba Harassment Lab Scenarios
-- Lecture 44 : Case Assessment
-- Lecture 1 : Introduction to Wireshark
-- Lecture 2 : Basic Networking Terms and Concepts
-- Lecture 3 : OSI Model
Section 2: Getting Started with Wireshark (Free Preview)
-- Lecture 4 : Wireshark Installation and Setup
-- Lecture 5 : Wireshark Interfaces
-- Lecture 6 : Wireshark Interfaces Advance
Section 3: Key functions for use within Wireshark
-- Lecture 7 : Protocol Filters
-- Lecture 8 : IP and Port Filters
-- Lecture 9 : HTTP Packet Analysis
-- Lecture 10 : Extracting Credentials
Section 4: Firewalls and Unauthorized Traffic with Wireshark
-- Lecture 11 : Wireshark and Linux Firewall, Interaction
-- Lecture 12 : Demonstration Detecting Unauthorized Traffic
Section 5: Introduction to Wireshark Command Line Interface and Tshark
-- Lecture 13 : Introduction to Wireshark Commandline Interface
-- Lecture 14 : First Usage of Wireshark CLI
-- Lecture 15 : Tshark File Output
-- Lecture 16 : Tshark Timer Limits
-- Lecture 17 : Tshark Splitting Output Files
-- Lecture 18 : Display and Capture Filters (Diffrences)
-- Lecture 19 : Field Separation in Tshark
Section 6:Network card modes - motioning and remote capture
-- Lecture 20 : Networkcard Modes
-- Lecture 21 : How to Enable Monitor Mode Part 1
-- Lecture 22 : How to Enable Monitor Mode Part 2
-- Lecture 23 : Capture Remote Traffic
-- Lecture 24 : Decrypting Wireless Traffic
Section 7: Tshark output formatting
-- Lecture 25 : Formating Output to a CSV File
-- Lecture 26 : Exporting Packet Contents
Section 8: Wireshark and nmap interaction
-- Lecture 27 : Wireshark and Nmap Part 1
-- Lecture 28 : Wireshark and Nmap Part 2
Section 9: Tunneling Wireshark traffic online
-- Lecture 29 : SSH Tunneling to Wireshark Part 1
-- Lecture 30 : SSH Tunneling to Wireshark Part 2
-- Lecture 31 : SSH Tunneling to Wireshark Part 3
-- Lecture 32 : SSH Tunneling to Wireshark Part 4
Section 10: TCPDump Network Sniffer & Linux Traceroute
-- Lecture 33 : Introduction to the TCPDump Network Sniffer
-- Lecture 34 : TCPDump with Wireshark
-- Lecture 35 : Detailed Introduction to Linux Traceroute
-- Lecture 36 : Using Scapy to Manually Create a SYN Port Scan
Section 11: Packet Anaysis & Capture with Network Miner
-- Lecture 37 : Network Miner Packet Analysis Tool in Windows 10
-- Lecture 38 : Network Miner Network Packet Capture Parser
Section 12: Nitroba University Harassment Case Study
-- Lecture 39 : Harassment Case Study Slides
-- Lecture 40 : Network PCAP for Case Analysis
-- Lecture 41 : Case Study using Wireshark and NetworkMiner
-- Lecture 42 : Harassment case Investigation with Network Miner
-- Lecture 43 : Nitroba Harassment Lab Scenarios
-- Lecture 44 : Case Assessment
“Benefits after successful completion
“Why Hands-on Assessment
Job Oriented CIU Certifications
CIU Certified
CIU Certified
CIU Certified
** Network Pentester
** Web Pentester
** Linux Security Professional