CWNA: Certified Wireless Network Administrator | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CWNA: Certified Wireless Network Administrator

  • Private Class Icon
    Private Class
    • All of our private classes are customized to your organization's needs.

      Click on the button below to send us your details and you will be contacted shortly.
    5 Days

Course Details

Expand All

Learn to successfully survey, install, and administer enterprise-class Wi-Fi networks.

The CWNA certification is the foundation-level enterprise Wi-Fi certification for the CWNP Program. Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully survey, install, and administer enterprise Wi-Fi networks

In this hands-on course, you will gain a full understanding of how radio frequency affects networking so you can perform site surveys, design a high-performance network, and protect both users and sensitive data from potential intruders. Plus, you will explore advanced topics such as VoWLAN deployments, seamless mobile connectivity, and detailed wireless frame analysis. You will use enterprise-class hardware and software tools during live lab exercises, simulating a state-of-the-art production environment.

Get exam ready in this approved CWNA certification course that includes:

  • CWNA study guide
  • Practice exams
  • Exam voucher

This programme is suitable for Administrators: network, systems, infrastructure, security, and LAN/WLANs Support professionals: technical assistance and field support, Designers: network, systems, and infrastructure, Developers: wireless software and hardware products, Consultants and integrators: IT and security, Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers and CCNAs

  • TCP/IP Networking

Follow-On Courses

  • Enterprise Wi-Fi Security (CWSP)

Certification Programs and Certificate Tracks

This course is part of the following programs or tracks:

  • CWNA® - Certified Wireless Network Administrator
  • CWSP® - Certified Wireless Security Professional

This program will be conducted with interactive lectures, PowerPoint presentation, discussions and practical exercise

Upon completion of this program, participants should be able to :

  • Radio frequency properties, behaviors, and regulations, and how they affect networking
  • Wireless standards, including 802.11 extensions a, b, g, and n
  • General troubleshooting tips to common real-world 802.11n issues
  • General parameters for performing a successful site survey, along with software tools that reduce time and expense
  • Device-level Wi-Fi communications processes
  • Why 802.11n networks operate the way they do and how to apply that knowledge when faced with problems that stump most network administrators
  • Using wireless network analyzers to capture live data and pinpoint potential network issues
  • How using radio frequency makes wireless networks vulnerable
  • Most common wireless threats and how to detect and defend against them
  • Wireless security standards for keeping unauthorized users out and maintaining wireless data privacy
  • Applying WPA2 security standards, including 802.1X/EAP and AES, along with the devices used to apply them
  • Wireless intrusion detection and why it's essential for maintaining a secure network

Modules

Expand All
  • RF Fundamentals
    • Define and explain the basic concepts of RF behavior
      • Gain
      • Loss
      • Reflection
      • Refraction
      • Diffraction
      • Scattering
      • VSWR
      • Return Loss
      • Amplification
      • Attenuation
      • Absorption
      • Wave propagation
      • Free Space Path Loss
      • Delay Spread
  • RF Mathematics
    • Understand and apply the basic components of RF mathematics
      • Watt
      • Milliwatt
      • Decibel (dB)
      • dBm
      • dBi
      • dBd
      • SNR
      • RSSI
      • System Operating Margin (SOM)
      • Fade Margin
      • Link Budget
      • Intentional Radiator
      • Equivalent Isotropically Radiated Power (EIRP)
  • RF Signal and Antenna Concepts
    • Identify RF signal characteristics, the applications of basic RF antenna concepts, and the implementation of solutions that require RF antennas
      • Visual LOS
      • RF LOS
      • The Fresnel Zone
      • Beamwidths
      • Azimuth & Elevation
      • Passive Gain
      • Isotropic Radiator
      • Polarization
      • Simple Antenna Diversity
      • MIMO Diversity
      • Radio Chains
      • Spatial Multiplexing (SM)
      • Transmit Beam Forming (TxBF) (Static, Dynamic, and chip-based beamforming)
      • Maximal Ratio Combining (MRC)
      • Space-Time Block Coding (STBC)
      • Cyclic Shift Diversity (CSD)
      • Wavelength
      • Frequency
      • Amplitude
      • Phase
    • Explain the applications of physical RF antenna and antenna system types and identify their basic attributes, purpose, and function
      • Omni-directional / Dipole antennas
      • Semi-directional antennas
      • Highly-direction antennas
      • Sectorized antennas
      • MIMO antennas
      • Antenna arrays
    • Describe the proper locations and methods for installing RF antennas
      • Pole/mast mount
      • Ceiling mount
      • Wall mount
      • Outdoor/Indoor mounting considerations
  • RF Antenna Accessories
    • Identify the use of the following WLAN accessories and explain how to select and install them for optimal performance and regulatory domain compliance.
      • Amplifiers
      • Attenuators
      • Lightning Arrestors
      • Mounting Systems
      • Grounding Rods/Wires
      • Towers, safety equipment, and related concerns
      • RF Cables
      • RF Connectors
      • RF Signal Splitters


  • Spread Spectrum Technologies
    • Identify some of the uses for spread spectrum technologies
      • Wireless LANs
      • Wireless PANs
      • Wireless MANs
      • Wireless WANs
    • Comprehend the differences between, and explain the different types of spread spectrum technologies and how they relate to the IEEE 802.11-2007 standard’s (as amended and including 802.11n) PHY clauses
      • DSSS
      • HR-DSSS
      • ERP
      • OFDM
      • HT
    • Identify the underlying concepts of how spread spectrum technology works
      • Modulation
      • Coding
    • Identify and apply the concepts that make up the functionality of spread spectrum technology
      • Co-location
      • Channel Centers and Widths (all PHYs)
      • Primary and Secondary Channels
      • Adjacent Overlapping and Non-Overlapping Channels
      • Carrier Frequencies
      • Throughput vs. Data Rate
      • Bandwidth
      • Communication Resilience
      • Physical Carrier Sense (CSMA/CA)
      • Virtual Carrier Sense (NAV)
  • IEEE 802.11-2007 Standard (as amended and including 802.11k, 802.11r, 802.11n, 802.11y, 802.11w, and 802.11u))
    • Identify, explain, and apply the basic frame types and frame exchange sequences covered by the IEEE 802.11-2007 standard
    • Identify and apply regulatory domain requirements
      • Dynamic Frequency Selection (DFS)
      • Transmit Power Control (TPC)
      • Available Channels
      • Output Power
    • Understand the OSI model layers affected by the 802.11-2007 standard and amendments
    • Use of ISM, UNII, and licensed bands in Wi-Fi networks
    • Supported data rates for each IEEE 802.11-2007 (as amended to include 802.11n) PHY
    • Understand the IEEE standard creation and ratification process and identify IEEE standard naming conventions
      • Drafts
      • Ratified Amendments
      • Supplements
      • Recommended Practices
      • Standards
  • Industry Organizations and Their Roles
    • Define the roles of the following organizations in providing direction, cohesion, and accountability within the WLAN industry
      • Regulatory Domain Governing Bodies
      • IEEE
      • Wi-Fi Alliance
      • IETF


  • IEEE 802.11 Protocol Architecture
    • Summarize the processes involved in authentication and association
      • The IEEE 802.11 State Machine
      • Open System Authentication, Shared Key Authentication, and Deauthentication
      • Association, Reassociation, and Disassociation
    • Define, describe, and apply the following concepts associated with WLAN service sets
      • Stations and BSSs
      • Basic Service Area (BSA)
      • Starting and Joining a BSS
      • BSSID and SSID
      • Ad Hoc Mode and IBSS
      • Infrastructure Mode and ESS
      • Distribution System (DS)
      • Distribution System Media
      • Layer 2 and Layer 3 Roaming
    • Explain and apply the following power management features of WLANs
      • Active Mode
      • Power Save Mode
      • Unscheduled Automatic Power Save Delivery (U-APSD)
      • WMM Power-Save (WMM-PS)
      • Power Save Multi-Poll (PSMP)
      • Spatial Multiplexing Power Save (SMPS)
      • TIM/DTIM/ATIM
  • IEEE 802.11 MAC & PHY Layer Technologies
    • Describe and apply the following concepts surrounding WLAN frames
      • IEEE 802.11 Frame Format vs. IEEE 802.3 Frame Format
      • Layer 3 Protocol Support by IEEE 802.11 Frames
      • Terminology Review: Frames, Packets, and Datagrams
      • Terminology Review: Bits, Bytes, and Octets
      • Terminology: MAC & PHY
        • Guard Interval (GI)
        • PSDU
        • PPDU
        • PPDU Formats
        • MSDU
        • MPDU
        • A-MPDU
        • A-MSDU
        • 802.11 Frame Format
        • 802.11 Frame Types
        • Interframe Spaces (RIFS, SIFS, PIFS, DIFS, AIFS, EIFS)
        • Block Acknowledgements
      • Jumbo frame support (Layer 2)
      • MTU discovery and functionality (Layer 3)
    • Identify methods described in the IEEE 802.11-2007 standard for locating, joining, and maintaining connectivity with an IEEE 802.11 WLAN
      • Active Scanning (Probes)
      • Passive Scanning (Beacons)
      • Dynamic Rate Switching
    • Define, describe, and apply IEEE 802.11 coordination functions and channel access methods and features available for optimizing data flow across the RF medium
      • DCF and HCF coordination functions
      • EDCA channel access method
      • RTS/CTS and CTS-to-Self protocols
      • HT Dual-CTS Protection
      • HT L-SIG Protection
      • HT Channel Width Operation (20 MHz, 20/40 MHz)
      • HT Operation Modes (0, 1, 2, 3)
      • Fragmentation
      • AirTime Fairness
      • Band Steering
  • WLAN Infrastructure and Client Devices
    • Identify the purpose of the following WLAN infrastructure devices and describe how to install, configure, secure, and manage them
        • Autonomous Access Points
        • Controller-based Access Points
        • Mesh Access Points / Routers
        • Enterprise WLAN Controllers
        • Distributed WLAN architectures
        • Remote Office WLAN Controllers and/or APs
        • PoE Injectors (single and multi-port) and PoE-enabled Ethernet Switches
        • WLAN Bridges
        • Home WLAN Router
    • Describe the purpose of the following WLAN client adapters and explain how to install, configure, secure, and manage them
      • PC Cards (ExpressCard, CardBus, and PCMCIA)
      • USB2, CF, and SD Devices
      • PCI, Mini-PCI, Mini-PCIe, and Half Mini PCIe Cards
      • Workgroup Bridges


  • IEEE 802.11 Network Design, Implementation, and Management
    • Identify technology roles for which WLAN technology is appropriate and describe implementation of WLAN technology in those roles
      • Corporate data access and end-user mobility
      • Network extension to remote areas
      • Building-to-building connectivity - Bridging
      • Last-mile data delivery – Wireless ISP
      • Small Office / Home Office (SOHO) use
      • Mobile office networking
      • Educational / Classroom use
      • Industrial – Warehousing and Manufacturing
      • Healthcare – Hospitals and Offices
      • Hotspots – Public Network Access
      • Transportation Networks (trains, planes, automobiles)
      • Law Enforcement Networks
  • IEEE 802.11 Network Troubleshooting
    • Identify and explain how to solve the following WLAN implementation challenges using features available in enterprise class WLAN equipment.
      • System throughput
      • Co-channel and adjacent-channel interference
      • RF Noise and noise floor
      • Narrowband and wideband RF interference
      • Multipath (in SISO and MIMO environments)
      • Hidden nodes
      • Near/Far
      • Weather
  • Power over Ethernet (PoE)
    • IEEE 802.3-2005, Clause 33 (formerly IEEE 802.3af)
    • Powering HT (802.11n) devices
      • Proprietary midspan & endpoint PSEs
      • IEEE 802.3at midspan & endpoint PSEs
  • WLAN Architectures
    • Define, describe, and implement autonomous APs
      • Network connectivity
      • Common feature sets
      • Configuration, installation, and management
      • Advantages and limitations
    • Define, describe, and implement WLAN controllers that use centralized and/or distributed forwarding
      • Network connectivity
      • Common feature setsCore, Distribution, and Access layer forwarding
      • Controller-based, mesh, and portal APs
      • Scalability
      • Intra- and Inter-controller station handoffs
      • Configuration, installation, and management
      • Advantages and limitations
      • Tunneling, QoS, and VLANs
    • Define, describe, and implement distributed WLAN architectures
      • Network connectivity
      • Common feature sets
      • Configuration, installation, and management
      • Scalability
      • Inter-AP handoffs
      • Advantages and limitations
      • Tunneling, QoS, and VLANs
    • Define, describe, and implement a WNMS that manages APs and WLAN controllers
      • Network connectivity
      • Common feature sets
      • Configuration, installation, and management
      • Advantages and limitations
    • Define, describe, and implement a multiple channel architecture (MCA) network model
      • BSSID / ESSID configuration
      • Site surveying methodology
      • Network throughput capacity
      • Co-channel and adjacent channel interference
      • Cell sizing (including micro-cell)
    • Define, describe, and implement a single channel architecture (SCA) network model
      • BSSID / ESSID configuration (including Virtual BSSIDs)
      • Site surveying methodology
      • Network throughput capacity
      • Co-channel and adjacent channel interference
      • Cell sizing
      • Transmission coordination
      • Channel stacking
    • Define and describe alternative WLAN architectures
      • WLAN Arrays
      • Mesh Networks
      • Cloud Management
  • WLAN Deployment Types
    • Understand WLAN design and deployment considerations for commonly supported WLAN applications and devices
      • Data
      • Voice
      • Video
      • Real-Time Location Services (RTLS)
      • Mobile devices (tablets and smartphones)
      • High density


  • IEEE 802.11 Network Security Architecture
    • Identify and describe the strengths, weaknesses, appropriate uses, and implementation of the following IEEE 802.11 security-related items:
      • Legacy Security Mechanisms
        • WEP Cipher Suite
        • Open System Authentication
        • Shared Key Authentication
        • MAC Filtering
        • SSID Hiding
      • Modern Security Mechanisms
        • WPA- / WPA2-Enterprise
        • WPA- / WPA2-Personal
        • TKIP and CCMP Cipher Suites
        • 802.1X / EAP Framework
        • Preshared Key (PSK) / Passphrase Authentication
        • Per-user Preshared Keys (PPSK)
        • Wi-Fi Protected Setup (WPS)
      • Additional Mechanisms
        • Secure Device Management Protocols (HTTPS, SNMPv3, SSH2)
        • Role Based Access Control (RBAC)
        • Captive Portals and Guest Networks
        • Protected Management Frames (802.11w)
        • Fast Secure Roaming Methods
  • IEEE 802.11 Network Security Analysis, Performance Analysis, and Troubleshooting
    • Describe, explain, and illustrate the appropriate applications for the following wireless security solutions
      • Wireless Intrusion Protection System (WIPS)
        • Security Monitoring, Containment, and Reporting
        • Performance Monitoring and Reporting
        • Troubleshooting and Analysis
        • Protocol and Spectrum Analyzers
        • Security and Performance Monitoring
        • Troubleshooting and Analysis
        • Integrated and standalone
  • IEEE 802.11 Network Security Policy Basics
    • Describe the following General Security Policy elements
      • Applicable Audience
      • Risk Assessment
      • Impact Analysis
      • Security Auditing
      • Policy Enforcement
      • Monitoring, Response, and Reporting
      • Asset Management
      • Describe the following Functional Security Policy elements
      • Design and Implementation Best Practices
      • Small Office / Home Office (SOHO)
      • Small & Medium Business (SMB)
      • Enterprise
      • Password Policy
      • Acceptable Use & Abuse Policy
      • Training Requirements
      • Physical Security
      • Social Engineering


  • IEEE 802.11 Network Site Survey Fundamentals
    • Explain the importance of and the processes involved in information collection for manual and predictive RF site surveys. (These happen in preparation for an RF site survey)
      • Gathering business requirements
      • Interviewing managers and users
      • Defining physical and data security requirements
      • Gathering site-specific documentation
      • Documenting existing network characteristics
      • Gathering permits and zoning requirements
      • Indoor- or Outdoor-specific information
      • Identifying infrastructure connectivity and power requirements
      • Understanding RF coverage requirements
      • Understanding data capacity and client density requirements
      • VoWiFi considerations for delay and jitter
      • Client connectivity requirements
      • Antenna use considerations
      • Aesthetics requirements
      • Tracking system considerations
      • WIPS sensor considerations
    • Explain the technical aspects involved in performing manual and predictive RF site surveys. (These happen as part of the RF site survey)
      • Locating and identifying RF interference sources
      • Defining AP and antenna types to be used
      • Defining AP and antenna placement locations
      • Defining AP output power and channel assignments
      • Defining co-channel and adjacent-channel interference
      • Testing applications for proper operation
      • Measuring performance metrics according to design requirements
    • Describe site survey reporting and follow-up procedures for manual and predictive RF site surveys. (These happen after the RF site survey)
      • Reporting methodology
      • Customer reporting requirements
      • Hardware recommendations and bills of material
      • Application analysis for capacity and coverage verification
  • IEEE 802.11 Network Site Survey Systems and Devices
    • Identify the equipment, applications, and system features involved in performing predictive site surveys
      • Predictive analysis / simulation applications (also called RF planning and management tools)
      • Integrated predictive site survey features of WLAN controllers or WNMS
      • Site survey verification tools and/or applications
      • Indoor site surveys versus outdoor site surveys
    • Identify the equipment, applications, and methodologies involved in performing manual site surveys
      • Site survey hardware kits
      • Spectrum analyzers
      • Protocol analyzers
      • Active site survey tools and/or applications
      • Passive site survey tools and/or applications
      • VoWiFi site survey best practices (dB boundaries, antenna use, balanced links)
      • Manufacturer’s client utilities
    • Identify the equipment, applications, and methodologies involved in self-managing RF technologies
      • Automated RF resource management


Trainers

Reviews

0
based on 0 ratings reviews