5 Sessions - 15 Hours of Interactive Training
The popularity of wireless networks is exploding, and with it, demand for trained wireless IT professionals. In the Wireless Networking course from LearnKey, you'll learn the fundamentals of wireless LANs from a vendor-neutral perspective. Expert instructor Michael Storm takes you through radio frequency (RF) technologies, industry standards, site surveys, wireless security issues and much more. At the conclusion of this course you'll be prepared to implement, manage, and troubleshoot wireless networks, and be prepared to pass the Certified Wireless Network Administrator (CWNA) exam.
Session 1
Section A: CWNP Introduction
· CWNP Certification Program
· Levels of Certification
· Course Overview
· Course Objectives
Section B: Wireless Application
· History
· Standards
· Roles
· Last Mile Delivery
· Mobility
· Wireless LANs
Section C: Radio Frequency Technology
· Radio Frequency
· Behaviors
· Gain/Loss
· Reflection/Refraction
· Diffraction/Scattering
· Absorption
· VSWR
· VSWR Measurements
Section D: Antennas
· Principals
· Line of Sight/Fresnel Zone
· Obstructions
· Antenna Gain
· Intentional Radiator
· EIRP
Section E: RF Mathematics
· Power Calculation
· Units of Measure
· Power Gain/Loss
· dBm
· dBi
· Sample Calculation
Section F: Spread Spectrum
· Overview
· Narrowband/High Power
· Wideband/Low Power
· Usage
· Wireless LANs
· Wireless PANs
· Wireless MANs
Session 2
Section A: Spread Spectrum Technologies
· FCC Specifications
· FHSS
· FHSS Interference
· FHSS Channel
· Timing
· DSSS
· DSSS Channels
· DSSS Interference
Section B: FHSS vs. DSSS
· Comparison Factors
· Interference/Cost
· Co-location
· Equipment
· Data Rates
· Security
· Standards Support
Section C: Wireless Access Points
· Device Types
· Access Points
· Access Modes
· Access Point Options
· Antenna Options
· Filtering/Modular Cards
· Variable Power/Wired Connectivity
· Mounting Access Points
Section D: Access Point Features
· SOHOs
· Enterprises
· Management
Section E: Client Devices
· LAN Devices
· Adaptors
· USB
· PCI & ISA Adaptors
· Configuring Devices
Section F: Infrastructure Devices
· Wireless Bridges
· Workgroup Bridges
· Common Options
· Residential Gateways
· Enterprise Wireless Gateways
· Device Management
Section G: Antenna Types
· Antenna Selection
· Dipole
· Semidirectional
· Highly Directional
Session 3
Section A: Tuning Antennas
· RF Antenna Concepts
· Polarization
· Antenna Gain/Beamwidth
· Free Space Path Loss
· Installation
· Orientation/Alignment
· Safety
Section B: Power Over Ethernet
· Usage
· Compatibility
· Voltage Pinout Standards
Section C: RF Accessories
· Accessory Types
· RF Amplifier
· RF Attenuators
· Lightning Arrestors
· RF Splitters
· RF Connectors
· RF Cables
· RF Pigtail
Section D: Organizations
· Organizational Roles
· FCC Role
· ISM vs. U-NII
· IEEE
· IEEE 802-11b
· IEEE 802.11a/IEEE 802.11g
· Other Organizations
· Competition
Section E: Locating Access Points
· 802.11 Architectures
· SSIDs
· Beacons
· Passive Scanning
· Active Scanning
Sesion4
Section A: Authentication
· Authentication Process
· Association Process
· States
· Authentication Methods
· Authentication Security
· EAP Types
· VPN Solutions
Section B: Service Sets
· Service Sets Overview
· Roaming
· Roaming Standards
· Connections
· Limitations
· Load Balancing
Section C: WAN Communication
· Frames
· Management Frames
· Collision Handling
· Fragmentation
· Fragment Bursting
· DCF & PCF
· Interframe Spacing
· Random Backoff/Slot Time
Section D: Troubleshooting
· RF Environments
· Multipath Problems
· Multipath Solutions
· Hidden Node Problem
· Hidden Node Solutions
· Near/Far Problems
· Near/Far Solution
· Co-location Problems
· Co-location Solutions
Session 5
Section A: WEP/TKIP
· Wireless Security
· WEP
· WEP Attacks
· WEP Implementation
· WEP Keys
· WEP Key Deployment
· Usage
· TKIP
Section B: Security Options
· AES
· Filtering
· SSID Filtering
· MAC Address Filtering
· Protocol Filtering
Section C:Wireless Attacks
· Attacks on Wireless LANs
· Passive Attacks
· Active Attacks
· Jamming
· Man-in-the-Middle Attacks
Section D: Corporate Security Policy
· Security Policies
· Public Wireless Networks
· Security Recommendations
Section E: Site Survey
· Specifications
· Preparation/Facility Analysis
· Networks & Network Needs
· Area Usage & Towers
· Requirements
· Available Resources
· Security Requirements
Section F: Preparation
· Preparation Checklist
· Site Survey Equipment
· Site Survey Kit Checklist
· Gathering RF Information
· Site Survey Reporting
· Additional Information
http://rapidshare.com/users/4BX7DN
Password booktraining.net
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment