Monday, May 4, 2009

Learnkey - WirelessNetworking

5 Sessions - 15 Hours of Interactive Training

The popularity of wireless networks is exploding, and with it, demand for trained wireless IT professionals. In the Wireless Networking course from LearnKey, you'll learn the fundamentals of wireless LANs from a vendor-neutral perspective. Expert instructor Michael Storm takes you through radio frequency (RF) technologies, industry standards, site surveys, wireless security issues and much more. At the conclusion of this course you'll be prepared to implement, manage, and troubleshoot wireless networks, and be prepared to pass the Certified Wireless Network Administrator (CWNA) exam.

Session 1

Section A: CWNP Introduction
· CWNP Certification Program
· Levels of Certification
· Course Overview
· Course Objectives

Section B: Wireless Application
· History
· Standards
· Roles
· Last Mile Delivery
· Mobility
· Wireless LANs
Section C: Radio Frequency Technology
· Radio Frequency
· Behaviors
· Gain/Loss
· Reflection/Refraction
· Diffraction/Scattering
· Absorption
· VSWR
· VSWR Measurements

Section D: Antennas
· Principals
· Line of Sight/Fresnel Zone
· Obstructions
· Antenna Gain
· Intentional Radiator
· EIRP

Section E: RF Mathematics
· Power Calculation
· Units of Measure
· Power Gain/Loss
· dBm
· dBi
· Sample Calculation

Section F: Spread Spectrum
· Overview
· Narrowband/High Power
· Wideband/Low Power
· Usage
· Wireless LANs
· Wireless PANs
· Wireless MANs

Session 2

Section A: Spread Spectrum Technologies
· FCC Specifications
· FHSS
· FHSS Interference
· FHSS Channel
· Timing
· DSSS
· DSSS Channels
· DSSS Interference

Section B: FHSS vs. DSSS
· Comparison Factors
· Interference/Cost
· Co-location
· Equipment
· Data Rates
· Security
· Standards Support

Section C: Wireless Access Points
· Device Types
· Access Points
· Access Modes
· Access Point Options
· Antenna Options
· Filtering/Modular Cards
· Variable Power/Wired Connectivity
· Mounting Access Points

Section D: Access Point Features
· SOHOs
· Enterprises
· Management

Section E: Client Devices
· LAN Devices
· Adaptors
· USB
· PCI & ISA Adaptors
· Configuring Devices

Section F: Infrastructure Devices
· Wireless Bridges
· Workgroup Bridges
· Common Options
· Residential Gateways
· Enterprise Wireless Gateways
· Device Management

Section G: Antenna Types
· Antenna Selection
· Dipole
· Semidirectional
· Highly Directional

Session 3

Section A: Tuning Antennas
· RF Antenna Concepts
· Polarization
· Antenna Gain/Beamwidth
· Free Space Path Loss
· Installation
· Orientation/Alignment
· Safety

Section B: Power Over Ethernet
· Usage
· Compatibility
· Voltage Pinout Standards

Section C: RF Accessories
· Accessory Types
· RF Amplifier
· RF Attenuators
· Lightning Arrestors
· RF Splitters
· RF Connectors
· RF Cables
· RF Pigtail

Section D: Organizations
· Organizational Roles
· FCC Role
· ISM vs. U-NII
· IEEE
· IEEE 802-11b
· IEEE 802.11a/IEEE 802.11g
· Other Organizations
· Competition

Section E: Locating Access Points
· 802.11 Architectures
· SSIDs
· Beacons
· Passive Scanning
· Active Scanning

Sesion4

Section A: Authentication
· Authentication Process
· Association Process
· States
· Authentication Methods
· Authentication Security
· EAP Types
· VPN Solutions

Section B: Service Sets
· Service Sets Overview
· Roaming
· Roaming Standards
· Connections
· Limitations
· Load Balancing

Section C: WAN Communication
· Frames
· Management Frames
· Collision Handling
· Fragmentation
· Fragment Bursting
· DCF & PCF
· Interframe Spacing
· Random Backoff/Slot Time

Section D: Troubleshooting
· RF Environments
· Multipath Problems
· Multipath Solutions
· Hidden Node Problem
· Hidden Node Solutions
· Near/Far Problems
· Near/Far Solution
· Co-location Problems
· Co-location Solutions

Session 5

Section A: WEP/TKIP
· Wireless Security
· WEP
· WEP Attacks
· WEP Implementation
· WEP Keys
· WEP Key Deployment
· Usage
· TKIP

Section B: Security Options
· AES
· Filtering
· SSID Filtering
· MAC Address Filtering
· Protocol Filtering

Section C:Wireless Attacks
· Attacks on Wireless LANs
· Passive Attacks
· Active Attacks
· Jamming
· Man-in-the-Middle Attacks

Section D: Corporate Security Policy
· Security Policies
· Public Wireless Networks
· Security Recommendations

Section E: Site Survey
· Specifications
· Preparation/Facility Analysis
· Networks & Network Needs
· Area Usage & Towers
· Requirements
· Available Resources
· Security Requirements

Section F: Preparation
· Preparation Checklist
· Site Survey Equipment
· Site Survey Kit Checklist
· Gathering RF Information
· Site Survey Reporting
· Additional Information

http://rapidshare.com/users/4BX7DN

Password booktraining.net

No comments:

Post a Comment