CWNA Certified Wireless Network Administrator

5 Day | Instructor Led

The CWNA certification is the foundation-level enterprise Wi-Fi certification for the CWNP Program. Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully survey, install, and administer enterprise Wi-Fi networks. In this hands-on course, you will gain a full understanding of how radio frequency affects networking so you can perform site surveys, design a high-performance network, and protect both users and sensitive data from potential intruders. Plus, you will explore advanced topics such as VoWLAN deployments, seamless mobile connectivity, and detailed wireless frame analysis. You will use enterprise-class hardware and software tools during live lab exercises, simulating a state-of-the-art production environment.

Inquire About
CWNA Certified Wireless Network Administrator

Ideal Candidates for Certified Wireless Network Administrator Class

Administrators: network, systems, infrastructure, security, and LAN/WLANs
Support professionals: technical assistance and field support
Designers: network, systems, and infrastructure
Developers: wireless software and hardware products
Consultants and integrators: IT and security
Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers
CCNAs

CWNA Certified Wireless Network Administrator Prerequisites

TCP/IP Networking

What You'll Get in CWNA Certified Wireless Network Administrator

What You'll Learn in CWNA Certified Wireless Network Administrator

Radio frequency properties, behaviors, and regulations, and how they affect networking
Wireless standards, including 802.11 extensions a, b, g, and n
General troubleshooting tips to common real-world 802.11n issues
General parameters for performing a successful site survey, along with software tools that reduce time and expense
Device-level Wi-Fi communications processes
Why 802.11n networks operate the way they do and how to apply that knowledge when faced with problems that stump most network administrators
Using wireless network analyzers to capture live data and pinpoint potential network issues
How using radio frequency makes wireless networks vulnerable
Most common wireless threats and how to detect and defend against them
Wireless security standards for keeping unauthorized users out and maintaining wireless data privacy
Applying WPA2 security standards, including 802.1X/EAP and AES, along with the devices used to apply them
Wireless intrusion detection and why it's essential for maintaining a secure network

CWNA Certified Wireless Network Administrator Certification

Certified Wireless Network Administrator (CWNA) Certification

Certified Wireless Network Administrator Outline

1. WLAN Infrastructure

  • The Basic Service Set
  • Access Points
  • WLAN Controllers
  • Wi-Fi Stations
  • Independent Basic Service Set (IBSS)

2. WLAN Standards

  • WLAN Organizations
  • The IEEE 802.11 Standard
  • 802.11 Amendments
  • 802.11 and Wi-Fi

3. RF Fundamentals

  • Channels and Bands
  • Modulation and Coding
  • RF Math
  • Multipath

4. Antennas and Outdoor Wireless

  • Link Budgets
  • Antenna Operation
  • Antenna Types
  • Antenna Coverage Patterns

5. WPA/WPA2 Authentication

  • 802.11 Security Amendments
  • 802.11i Robust Security Networks
  • Preshared Key
  • 802.1X
  • 802.1X/EAP Authentication
  • Mutual Authentication and Key Negotiation

6. WPA/WPA2 Encryption

  • WLAN Encryption
  • WPA/WPA2 Encryption Options
  • RC4 Encryption
  • TKIP Improvements
  • AES-CCMP
  • 802.11i Encryption Summary

7. WLAN Operation

  • 802.11 Channel Access
  • CSMA/CA
  • Interframe Spacing
  • Random Backoff Time
  • Acknowledgements
  • An Arbitration Example
  • Effects of Arbitration

8. Mixed Mode Operation

  • Mixed Mode Networks
  • 802.11b/g Mixed Mode
  • 802.11g/n Mixed Mode
  • 802.11n 2.4 GHz Problems
  • 802.11n 5 GHz
  • Mixed Mode Best Practices

9. Security Design

  • RSN Concerns
  • Wireless Data Security
  • Network Security
  • Guest Access
  • RF Denial
  • MAC Address Spoofing
  • Endpoint Security
  • Enterprise WIDS
  • Security Design Best Practices

10. Troubleshooting Station Connections

  • Common Station Problems
  • Radio On/Off Switches
  • Wi-Fi Client Utilities
  • Power Management Protocols

11. WLAN Analysis

  • Packet Capture
  • Protocol Analysis Software
  • The Wi-Fi Connection
  • Discovery Analysis
  • Authentication and Association
  • Roaming
  • Secure Connections
  • Connection Loss

12. WLAN Channel Analysis

  • Analyzing the Channel
  • Using the Protocol Analyzers
  • Basic 802.11 Overhead
  • Channel Efficiency
  • Performance Degradation
  • Spectrum Analyzers

13. Enterprise Infrastructure Design

  • Basic AP Configuration
  • Enterprise WLAN Needs
  • Wireless Network Management Systems
  • Wireless VLANs
  • Power over Ethernet
  • Picocells
  • Client Isolation
  • RTS/CTS
  • AP Optimization Best Practices

14. Station Optimization

  • Station Configuration
  • Additional Station Settings
  • Station Optimization Best Practices

15. QoS Configuration

  • Legacy WLANs
  • QBSS Load
  • Enhanced Distributed Channel Access
  • Priority Settings
  • QoS Configuration Best Practices

16. Channel Optimization

  • RF Difficulties
  • Roaming
  • Common WLAN Types
  • Alternative technologies
  • Channel Optimization Best Practices

17. Site Surveys

  • Radio Frequency Problems
  • Site Surveys
  • Kit Preparation
  • WLAN Simulation Software
  • Post-Installation Surveying
  • Live Survey Software
  • Site Survey Best Practices

18. Next-Generation WLANs

  • Next-Generation Improvements
  • Automatic RF management
  • Wi-Fi Direct
  • Secure Roaming
  • Mesh Networks
  • Home Media Streaming
  • Wi-Fi Cellular Calling

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

In this Wi-Fi fundamentals course, you will gain the knowledge needed to enter into or advance within the wireless networking industry. From basic RF theory and regulatory requirements to implementation of WLAN devices, you will get up-to-speed on the latest in 802.11 technologies in a practical way.



Using the latest enterprise wireless LAN security and auditing equipment in this hands-on course, you will learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market, from wireless intrusion prevention systems to wireless network management systems.



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W