OneSource Professional Training Solutions
OneSource Professional Training Solutions, Inc. presents

Enterprise Wi-Fi Administration (CWNA) On-Site Training

This on-site training class is also available as Public Schedule Seminar.

Enterprise Wi-Fi Administration (CWNA)

Course Description/Agenda

The CWNA certification is the foundation-level enterprise Wi-Fi certification for the CWNP Program. Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully survey, install, and administer enterprise Wi-Fi networks.

In this hands-on course, you will gain a full understanding of how radio frequency affects networking so you can perform site surveys, design a high-performance network, and protect both users and sensitive data from potential intruders. Plus, you will explore advanced topics such as VoWLAN deployments, seamless mobile connectivity, and detailed wireless frame analysis. You will use enterprise-class hardware and software tools during live lab exercises, simulating a state-of-the-art production environment.

Get exam ready in this approved CWNA certification course that includes:

  • CWNA study guide
  • Practice exams
  • Exam voucher

What You'll Learn

  • Radio frequency properties, behaviors, and regulations, and how they affect networking
  • Wireless standards, including 802.11 extensions a, b, g, and n
  • General troubleshooting tips to common real-world 802.11n issues
  • General parameters for performing a successful site survey, along with software tools that reduce time and expense
  • Device-level Wi-Fi communications processes
  • Why 802.11n networks operate the way they do and how to apply that knowledge when faced with problems that stump most network administrators
  • Using wireless network analyzers to capture live data and pinpoint potential network issues
  • How using radio frequency makes wireless networks vulnerable
  • Most common wireless threats and how to detect and defend against them
  • Wireless security standards for keeping unauthorized users out and maintaining wireless data privacy
  • Applying WPA2 security standards, including 802.1X/EAP and AES, along with the devices used to apply them
  • Wireless intrusion detection and why it's essential for maintaining a secure network

Who Should Attend

  • Administrators: network, systems, infrastructure, security, and LAN/WLANs
  • Support professionals: technical assistance and field support
  • Designers: network, systems, and infrastructure
  • Developers: wireless software and hardware products
  • Consultants and integrators: IT and security
  • Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers
  • CCNAs

Course Outline

1.WLAN Infrastructure

  • The Basic Service Set
  • Access Points
    • Basic AP Operation
  • WLAN Controllers
  • Wi-Fi Stations
    • Wi-Fi Client Software
  • Independent Basic Service Set (IBSS)
    • Service Set Identifier
    • The Extended Service Set

2.WLAN Standards

  • WLAN Organizations
    • The IEEE
    • The Wi-Fi Alliance
    • IETF
  • The IEEE 802.11 Standard
    • The 802.11 Physical Layer
    • The 802.11 MAC Layer
  • 802.11 Amendments
    • 802.11a (OFDM)
    • 802.11b (HR/DSSS)
    • 802.11g (ERP)
    • 802.11n (HT)
      • 802.11n Improvements
        • Speed
        • Range
        • Power Consumption
      • MIMO Operation
  • 802.11 and Wi-Fi
    • 802.11 Amendments and Wi-Fi Certifications

3.RF Fundamentals

  • Channels and Bands
    • 2.4 GHz Channels
    • 5 GHz Channels
  • Modulation and Coding
    • DSSS
    • OFDM
  • RF Math
    • Watts and Milliwatts (mW)
    • Decibels (dB), dBi, and dBm
  • Multipath
    • Identifying Multipath
    • Solving Multipath Problems

4.Antennas and Outdoor Wireless

  • Link Budgets
    • Reading Signal Strength
    • Transmitter Power
    • Measuring Antenna Gain
    • Cables, Connectors, and Accessories
    • Signal Propagation
  • Antenna Operation
    • Baseband RF to Radio Waves
  • Antenna Types
    • Omnidirectional Antennas
    • Semidirectional Antennas
    • Highly Directional Antennas
  • Antenna Coverage Patterns
    • Antenna Beamwidth
    • Antenna Mounting

5.WPA/WPA2 Authentication

  • 802.11 Security Amendments
  • 802.11i Robust Security Networks
    • RSN Authentication Options
  • Preshared Key
    • Small Network
    • PSK Vulnerability
    • Preshared Key Design
  • 802.1X
    • Extensible Authentication Protocol
    • 802.1X/EAP Design
  • 802.1X/EAP Authentication
  • Mutual Authentication and Key Negotiation
    • Enterprise Authentication
    • EAP-TLS
    • EAP-PEAP
    • Choosing an EAP Type

6.WPA/WPA2 Encryption

  • WLAN Encryption
    • Wired Equivalent Privacy
  • WPA/WPA2 Encryption Options
  • RC4 Encryption
    • Secure Stream Cipher
  • TKIP Improvements
    • TKIP Operation
    • AES-CCMP Similarities to TKIP
    • AES-CCMP Operation
  • 802.11i Encryption Summary
    • Automatic Encryption Selection
    • Encrypting in the Real World

7.WLAN Operation

  • 802.11 Channel Access
    • A Clear Channel
  • Interframe Spacing
  • Random Backoff Time
    • The Contention Window
    • Winning Arbitration
  • Acknowledgements
    • After the Acknowledgement
  • An Arbitration Example
    • Timelines
    • IFS Timeless
    • Backoff Timelines
    • Frame Timelines
    • ACK Timelines
  • Effects of Arbitration

8.Mixed Mode Operation

  • Mixed Mode Networks
  • 802.11b/g Mixed Mode
    • Protection Mechanism
    • Enabling Protection
  • 802.11g/n Mixed Mode )
    • 802.11n Greenfield
    • 802.11 g/n Mixed Mode AP
    • Nearby 802.11g AP
  • 802.11n 2.4 GHz Problems
  • 802.11n 5 GHz
  • Mixed Mode Best Practices

9.Security Design

  • RSN Concerns
    • General Security Approach
  • Wireless Data Security
    • Eavesdropping
    • Encryption Options
  • Network Security
  • Guest Access
    • Captive portals
    • Captive portal vulnerabilities
  • RF Denial
Add to favorites Add to favorites
Email Email this page

On-Site Training
Information Request Form

Please complete the form for more information and/or a quote for this on-site class.




City and State


Number of students:
(at least 10 for consideration)

When do you want to hold the

How long would you like for the

Additional comments to trainer:

We value your privacy!