Enterprise Wi-Fi Fundamentals (CWTS)

2 Day | Instructor Led

In this Wi-Fi fundamentals course, you will gain the knowledge needed to enter into or advance within the wireless networking industry. From basic RF theory and regulatory requirements to implementation of WLAN devices, you will get up-to-speed on the latest in 802.11 technologies in a practical way.

Inquire About:
Enterprise Wi-Fi Fundamentals (CWTS)

Ideal Candidates for Enterprise Wi-Fi Fundamentals (CWTS) Class

Wi-Fi sales professionals, project managers, and networkers new to Wi-Fi

Enterprise Wi-Fi Fundamentals (CWTS) Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in Enterprise Wi-Fi Fundamentals (CWTS)

What You'll Learn in Enterprise Wi-Fi Fundamentals (CWTS)

Networking basics
Wi-Fi organizations and standards
Basic wireless 802.11 technologies functionality and terms
Lightweight and autonomous access points
Antenna types and uses
Wi-Fi operational concepts and applications
Wi-Fi security, compliance, and site surveying
Wi-Fi support and troubleshooting
RF fundamentals and antenna concepts
Spread spectrum concepts

Enterprise Wi-Fi Fundamentals (CWTS) Certification

Certified Wireless Technology Specialist (CWTS) Certification

Enterprise Wi-Fi Fundamentals (CWTS) Outline

1. Introduction to Networking

  • Network Types
    • Local Area Networks
    • Wide Area Networks
    • Other Area Networks
  • Network Topologies
    • Point-to-Point
    • Star
    • Mesh
  • OSI Model
    • Physical Layer (L1)
    • Data Link Layer (L2)
    • Network Layer (L3)
    • Transport Layer (L4)
    • L5 and L6
    • Applications (L7)
  • Peer Communication
  • Encapsulation
  • Device Addressing
    • Physical Addressing
    • Locating a MAC Address
    • Logical Addressing (IPv4)
    • Locating an IPv4 Address

2. Introduction to Wi-Fi

  • Where Wi-Fi is used
    • Small Office/Home Office
    • Extending the Wired LAN
    • Replacing the Wired LAN
    • Public Hotspots
    • Mobile and Temp Facilities
    • Outdoor Applications
    • Transportation Networks
  • Organizations Governing Wi-FI
    • IEEE, Wi-Fi Alliance, and CWNP
    • Regulatory Bodies
  • IEEE Standards
    • Standards, Amendments, and Drafts
    • 802.11 Standard
    • 802.11 PHY Amendments
    • 802.11 Amendments

3. Wi-Fi Infrastructure and Client Devices

  • Access Points (APIs)
    • Autonomous Aps
    • Controller-based Aps
    • Mesh Aps
  • WLAN Controllers
    • Single Channel Architecture (SCA)
  • Wireless Bridges
  • Wireless Repeaters
  • Power over Ethernet (PoE)
    • PD versus PSE
  • Client Devices
    • Client Software
  • Workgroup Bridge (WGB)

4. Wi-Fi Terminology and Operation

  • Wi-Fi Modes of Operation
    • BSS, IBSS
    • BSS, BSA, and BSSID
    • ESS and SSID
  • Client Association Process
    • Discovery / Scanning
    • Open Authentication
    • Association
  • Reassociation / Roaming
    • Disassociation and Deauthentication
  • Power Save Fundamentals
    • Legacy Power Save
    • WMM-PS
  • Data Rates
    • Data Rate versus Throughput
    • Dynamic Rate Switching

5. Radio Frequency Fundamentals

  • RF Wave Fundamentals
    • Wavelength, Amplitude, Phase
  • Frequency Fundamentals
    • RF Characteristics
  • Scattering, Absorption, Diffraction, Reflection
    • RF Interference
  • Multipath
  • Power Measurements
    • Absolute Power Measurement (mW, dBm)
    • Relative Power Measurement (dB, dBi)
  • Rule of 10s and 3s
    • Device Receive Sensitivity
  • Wi-Fi Channels
    • 2.4 GHz Channels used in Wi-Fi
    • 5 GHz Channels used in Wi-Fi

6. Antennas and Accessories

  • Antenna Function
    • Antenna Gain
  • Types of Antennas
    • Omni-directional Antenna
    • Semi-directional Antenna
    • Highly-directional Antenna
  • Line of Sight
    • Visual versus RF LOS
  • Antenna Polarilzation
  • Antenna Diversity
  • Antenna Accessories
    • RF Cables and Connectors
    • RF Amplifiers
    • Lightning Arrestors

7. Wi-Fi Under the Hood

  • Medium Access
    • Collision Avoidance
    • CSMA/CA Basics
  • Modulation
    • HR/DSSS, OFDM, HT-OFDM
  • Mixed Mode Environments
    • Protection Mechanisms
  • Sources of Interference
    • Modulated Interference
    • Unmodulated Interference

8. RF Site Surveys

  • Purposes of an RF Site Survey
  • Site Survey Procedures
    • Gather Stakeholder Requirements
    • RF Site Survey Documentation
    • Perform a Spectrum Analysis
    • Perform Protocol Analysis
    • Perform Coverage Analysis
  • Site Survey Type-Manual
  • Site Survey Type-Predictive

9. Wi-Fi Security

  • Legacy Security Methods
    • WEP, SSID Hiding
  • Wi-Fi Protected Setup (WPS)
  • Security Terminology Chart
  • Authentication Types
    • WPA2-Personal
    • WPA2-Enterprise
  • Encryption
    • CCMP/AES
    • TKIP/RC4
  • Fast / Secure Roaming
  • Virtual Private Networks (VPN)
  • Role Based Access Control
  • Compliance Concerns
    • HIPPA, GLBA, SOX
    • Wireless Intrusion Prevention Systems
  • Security Best Practices
    • SOHO
    • SMB
    • SME / Enterprise

10. Wi-Fi Troubleshooting

  • Troubleshooting Tools
    • Spectrum Analyzer
    • Protocol Analyzer
  • Site Survey Tool
  • Common Wi-Fi Problems
    • Poor Coverage
  • Causes and Solutions for Low Signal Strength
    • Intermittent or No Connectivity
  • Typical Causes and Solutions
    • Slow Performance
  • Typical Causes and Solutions

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

In this course, you will acquire the skills needed to customize and administer the implementation and support of Avaya Aura Messaging (AAM). The course provides you with the opportunity to practice configuring Avaya Aura Messaging.

In this course, you will acquire the skills needed to customize and administer the implementation and support of Avaya Aura Messaging (AAM). The course provides you with the opportunity to practice configuring Avaya Aura Messaging.

In this course, you will learn to perform Communication Manager (CM) administration tasks. You will cover basic features and functions, creating a dial plan, setting up class of service (COS) and class of restrictions (COR), administering endpoints, performing system maintenance, and generating system reports. This course addresses CM release R5.2x through R6.3.

In this course, you will learn to perform Communication Manager (CM) administration tasks. You will cover basic features and functions, creating a dial plan, setting up class of service (COS) and class of restrictions (COR), administering endpoints, performing system maintenance, and generating system reports. This course addresses CM release R5.2x through R6.3.

This course combines the Avaya Aura Communication Manager Administration and the Avaya Aura Call Center Elite Implementation and Configuration courses. It is offered as a condensed, five-day fast track version of those two courses.

This course combines the Avaya Aura Communication Manager Administration and the Avaya Aura Call Center Elite Implementation and Configuration courses. It is offered as a condensed, five-day fast track version of those two courses.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W