OneSource Professional Training Solutions, Inc.
presents
Enterprise Wi-Fi Administration (CWNA) On-Site Training
Enterprise Wi-Fi Administration (CWNA)
Course Description/Agenda
The CWNA certification is the foundation-level enterprise Wi-Fi certification
for the CWNP Program. Achieving it sets your wireless career on a firm
foundation, ensuring you have the skills to successfully survey, install, and
administer enterprise Wi-Fi networks.
In this hands-on course, you will gain a full understanding of how radio
frequency affects networking so you can perform site surveys, design a
high-performance network, and protect both users and sensitive data from
potential intruders. Plus, you will explore advanced topics such as VoWLAN
deployments, seamless mobile connectivity, and detailed wireless frame analysis.
You will use enterprise-class hardware and software tools during live lab
exercises, simulating a state-of-the-art production environment.
Get exam
ready in this approved CWNA certification course that includes:
- CWNA study guide
- Practice exams
- Exam voucher
What You'll Learn
- Radio frequency properties, behaviors, and regulations, and how they
affect networking
- Wireless standards, including 802.11 extensions a, b, g,
and n
- General troubleshooting tips to common real-world 802.11n issues
- General parameters for performing a successful site survey, along with
software tools that reduce time and expense
- Device-level Wi-Fi communications processes
- Why 802.11n networks operate the way they do and how to apply that
knowledge when faced with problems that stump most network administrators
- Using wireless network analyzers to capture live data and pinpoint
potential network issues
- How using radio frequency makes wireless networks vulnerable
- Most common wireless threats and how to detect and defend against
them
- Wireless security standards for keeping unauthorized users out and
maintaining wireless data privacy
- Applying WPA2 security standards, including 802.1X/EAP and AES,
along with the devices used to apply them
- Wireless intrusion detection and why it's essential for
maintaining a secure network
Who Should Attend
- Administrators: network, systems, infrastructure, security, and LAN/WLANs
- Support
professionals: technical assistance and field support
- Designers:
network, systems, and infrastructure
- Developers:
wireless software and hardware products
- Consultants and
integrators: IT and security
- Decision makers:
infrastructure managers, IT managers, security directors, chief security
officers, and chief technology officers
- CCNAs
Course Outline 1.WLAN Infrastructure
- The Basic Service Set
- Access Points
- WLAN Controllers
- Wi-Fi Stations
- Independent Basic
Service Set (IBSS)
- Service Set
Identifier
- The Extended
Service Set
2.WLAN Standards
- WLAN Organizations
- The IEEE
- The Wi-Fi Alliance
- IETF
- The IEEE 802.11
Standard
- The 802.11
Physical Layer
- The 802.11 MAC
Layer
- 802.11 Amendments
- 802.11a (OFDM)
- 802.11b (HR/DSSS)
- 802.11g (ERP)
- 802.11n (HT)
- 802.11n
Improvements
- Speed
- Range
- Power Consumption
- MIMO Operation
- 802.11 and Wi-Fi
- 802.11 Amendments
and Wi-Fi Certifications
3.RF Fundamentals
- Channels and Bands
- 2.4 GHz Channels
- 5 GHz Channels
- Modulation and Coding
- RF Math
- Watts and
Milliwatts (mW)
- Decibels (dB),
dBi, and dBm
- Multipath
- Identifying
Multipath
- Solving Multipath
Problems
4.Antennas and Outdoor Wireless
- Link Budgets
- Reading Signal
Strength
- Transmitter Power
- Measuring Antenna
Gain
- Cables,
Connectors, and Accessories
- Signal Propagation
- Antenna Operation
- Baseband RF to
Radio Waves
- Antenna Types
- Omnidirectional
Antennas
- Semidirectional
Antennas
- Highly Directional
Antennas
- Antenna Coverage
Patterns
- Antenna Beamwidth
- Antenna Mounting
5.WPA/WPA2 Authentication
- 802.11 Security
Amendments
- 802.11i Robust
Security Networks
- RSN Authentication
Options
- Preshared Key
- Small Network
- PSK Vulnerability
- Preshared Key
Design
- 802.1X
- Extensible
Authentication Protocol
- 802.1X/EAP Design
- 802.1X/EAP
Authentication
- Mutual Authentication
and Key Negotiation
- Enterprise
Authentication
- EAP-TLS
- EAP-PEAP
- Choosing an EAP
Type
6.WPA/WPA2 Encryption
- WLAN Encryption
- WPA/WPA2 Encryption
Options
- RC4 Encryption
- TKIP Improvements
- AES-CCMP
- AES-CCMP
Similarities to TKIP
- AES-CCMP Operation
- 802.11i Encryption
Summary
- Automatic
Encryption Selection
- Encrypting in the
Real World
7.WLAN Operation
- 802.11 Channel Access
- CSMA/CA
- Interframe Spacing
- Random Backoff Time
- The Contention
Window
- Winning
Arbitration
- Acknowledgements
- After the
Acknowledgement
- An Arbitration Example
- Timelines
- IFS Timeless
- Backoff Timelines
- Frame Timelines
- ACK Timelines
- Effects of Arbitration
8.Mixed Mode Operation
- Mixed Mode Networks
- 802.11b/g Mixed Mode
- Protection
Mechanism
- Enabling
Protection
- 802.11g/n Mixed Mode )
- 802.11n Greenfield
- 802.11 g/n Mixed
Mode AP
- Nearby 802.11g AP
- 802.11n 2.4 GHz
Problems
- 802.11n 5 GHz
- Mixed Mode Best
Practices
9.Security Design
- RSN Concerns
- General Security
Approach
- Wireless Data Security
- Eavesdropping
- Encryption Options
- Network Security
- Guest Access
- Captive portals
- Captive portal
vulnerabilities
- RF Denial
- Client Testing
Software
- DoS: Connection
Loss
|
Add to favorites
Email this page
|