Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
CWNA AND CWSP COMBINATION
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training

Overview

In today’s network environment the implementation of wireless technologies is a serious undertaking. Improper planning can lead to an inadequate return on investment. Insufficient understanding of the security implications of wireless can lead to catastrophic results. This course enables an individual to plan, select, and implement the appropriate wireless hardware and deploy the correct security controls to support a typical environment. A focus on RF (radio frequency) technologies in a vendor neutral environment, with hands-on laboratories to reinforce concepts, allows participants the broadest exposure to key concepts. This course is committed to be the most current in the industry, with professionally developed laboratory exercises and real world hardware. This course combines the materials covered on Planet3 Wireless CWNA and CWSP examinations and will ultimately be the official curriculum to prepare candidates for Mile2’s Wireless Administration and Security examination. Upon completion, students will be able to confidently undertake the Planet3 Wireless CWNA and CWSP examinations conducted at Thompson Prometric testing centers. Students will benefit from an in-depth course that is continuously updated to maintain and incorporate the rapidly changing wireless networking and security environment. Please note that the CWNA and CWSP Combination course labs were designed to use additional VM images that can only be distributed to Authorized Mile2 Partners (AMP) and/or Instructors (AMI) due to licensing requirements. See document link on the Security product page.

Audience:

Individuals interested in pursuing the Planet3 Wireless CWNA and XWSP examinations.

Prerequisites

Knowledge of TCP/IP, 12 months experience in networking technologies, computer hardware knowledge, and typical operating system experience.

Course duration

5 days

Course outline

Overview of Wireless Standards and Organizations

  • International Telecommunications Union Radio-Communication Sector
  • RF Regulatory Bodies
  • Federal Communications Commission
  • FCC Regulations
  • Institute of Electrical and Electronics Engineers (IEEE)
  • IEEE Standards
  • Wi-Fi Alliance
  • International Standards Organization
  • Communication Basic
  • Modulation Classes
  • Amplitude Modulation
  • Wavelength
  • Frequency
  • Phase
  • Modulation / De-Modulation with Keying
  • Amplitude Shift Keying
  • Frequency Shift Keying
  • Phase Shift Keying
Radio Frequency Fundamentals
  • Radio Frequency
  • FR Characteristics
  • Polarity
  • Wavelength
  • Frequency
  • Amplitude
  • Phase
  • RF Behavior
  • Wave Propagation
  • Absorption
  • Reflection
  • Scattering
  • Refraction
  • Diffraction
  • Attenuation (Loss)
  • Free Space Loss
  • Multi Path
  • Gain
Radio Frequency Components, Measurements and Mathematics
  • RF Components
  • Transmitter
  • Antenna
  • Receiver
  • Intentional Radiator
  • Equivalent Isotropically Radiated Power (EIRP)
  • Units of Power Comparison Watt
  • Milliwatt
  • Decibel
  • dBi
  • dBd
  • dBm
  • Free Space Loss
  • 6 dB Rule
  • Rule of 10’s and 3’s
  • RF Mathematics without Logarithms
  • Practicing the Rule of 10’s and 3’s
  • Received Signal Strength Indicator (RSSI)
  • System Operating Margin (SOM)
  • SOM Calculator
  • Link Budget
  • Fade Margin
  • Inverse Square Law
Radio and Frequency Signal and Antenna Concepts
  • Azimuth and Elevation Chart
  • Azimuth Chart Example
  • Beamwidth
  • Degree of Beamwidth Table
  • Antenna Types
  • Omni-Directional Antennas
  • Semi-Directional Antenna
  • Highly-Directional Antenna
  • Phased Array Antenna
  • Sector Antenna
  • Visual Line of Sight
  • RF Line of Sight
  • Fresnel Zone
  • 802.11 Calculators
  • Earth Buldge
  • Antenna Polarization
  • Antenna Diversity
  • Multiple-Input-Multiple-Output (MIMO)
  • Antenna Connection and Installation
  • Voltage Standing Wave Ratio (VSWR)
  • Antenna Mounting
  • Antenna Cables
  • Connectors
  • Splitters
  • Amplifiers
  • Attenuators
  • Lightning Arrestors
  • Grounding Rods and Wires
IEEE 802.11 Standards
  • IEEE 802.11 – 1997 Standards including Infrared
  • 802.11x – Overview of Protocols
  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n
  • 802.11 Standards and Amendments
Wireless Networks and Spread Spectrum Technologies
  • Terminology
  • Spread Spectrum
  • Industrial, Scientific and Medical Bands (ISM)
  • Unlicensed National Information Infrastructure Bands (UNII)
  • UNII 1,2 and 3
  • Narrowband and Spread Spectrum
  • Delay Spread
  • Frequency Hopping and Spread Spectrum
  • Dwell and Hop Time
  • Modulation
  • Gaussian Frequency Shift Keying
  • 802.11 b/g Channels
  • Channel Overlap
  • Direct Sequence Spread Spectrum (DSSS)
  • DSSS Frequency Channel Plan
  • Encoding and Modulation
  • Packet Binary Convolutional Code
  • Orthogonal Frequency Division Multiplexing (OFDM)
  • Convolution Coding
  • 802.11a Channels
Wireless LAN Topologies
  • Wireless Networking Topologies
  • Access Point – Client Stations
  • Distribution Systems (DS)
  • Wireless Distribution System (WDS)
  • Service Set Identifier (SSID)
  • Basic Service Set (BSS)
  • Basic Service Set Identifier (BSSID)
  • Basic Service Area (BSA)
  • Extended Service Set (ESS)
  • ESS Nomadic
  • ESS Co-Location
  • Independent Basic Service Set (IBIS)
  • Configuration Modes
  • Infrastructure
Medium Access
  • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
  • CSMA/CA vs CSMA/CD
  • Distributed Coordination Function (DCF)
  • Interframe Space (IFS)
  • Four Types of IFS
  • Collision Detection
  • Duration/ID Field
  • Carrier Sense Methods
  • Virtual Carrier Sense
  • Physical Carrier Sense
  • Random Backoff Time
  • Example Flow of 802.11
  • Point Coordination Function
  • 802.11 Frame Format vs 802.3
  • MAC Address Format
  • Frame Types 281
  • 802.11 Management Frames
  • Control Frames
  • Data Frames
  • Layer 3 Integration
  • Beacon Management Frame
  • Beacon Frame Example
  • Passive Scanning
  • Active Scanning
  • Authentication
  • Open System Authentication
  • Open System Process
  • Shared Key Authentication
  • Association
  • Roaming
  • Reassociation
  • Disassociation and Deauthentication
MAC Architecture
  • ACK Frame
  • Fragmentation
  • 802.11g Protection Mechanism
  • Request to Send/Clear to Send
  • RTS/CTS Examples
  • CTS to Self
  • Power Management
  • Power Save Mode
  • Traffic Indication Map (TIM)
  • Delivery Traffic Indication Message (DITM)
  • Announcement Traffic Indication Message (ATIM)
  • Wireless Multimedia (WMM)
  • Power Save Certification WMM
Wireless Devices
  • Wireless LAN Client Devices
  • Radio Card Formats
  • Radio Card Chipsets
  • Client Utilities
  • Progression of WLAN Architecture
  • Access Point Features
  • Wireless Network Management System
  • Capabilities of WNMS
  • Centralized WLAN Architecture
  • WLAN Switch Features
  • Centralized WLAN Architecture
  • Remote Office WLAN Switch
  • Distributed WLAN Architecture
  • Unified WLAN Architechture
  • Wireless Workgroup Bridge
  • Wireless LAN Bridges
  • Point to Point and Point to Multi-Point
  • Other Features of WLAN Bridges
  • Deployment Considerations
  • Point to Point Links
  • Point to Multi-Point Links
  • Enterprise Wireless Gateway (EWG)
  • EWG Design
  • Residential Wireless Gateway (RWG)
  • Other Wireless Routers
  • Enterprise Encryption Gateway (EEG)
  • Power over Ethernet (PoE)
  • PoE Devices
  • PoE Responsibilities
  • PoE Features
Network Design, Implementation and Management
  • Core, Distribution and Access
  • Capacity vs Storage
  • Co-Location
  • Corporate Data Access and the End User
  • Network Extension to Remote Areas
  • Bridging Building to Building
  • Wireless ISP
  • Small Office, Home Office (SOHO)
  • Hot Spots
WLAN Trouble Shooting
  • Spectrum Analyzer: Wi-Spy
  • Wi-Spy Add-On Channelyzer
  • 802.11 Coverage Considerations
  • Dynamic Rate Switching
  • Roaming
  • Layer 3 Roaming
  • Co-Channel Interference
  • Hidden Node
  • Hidden Node Solutions
  • Near / Far Issues
  • Near / Far Solutions
  • Interference
  • Performance
  • Weather Issues
Network Security Architecture
  • 802.11 Security Basics
  • Encryption
  • Segmentation
  • MAC Filtering
  • SSID Cloaking
  • Authentication and Authorization
  • Wired Equivalent Privacy (WEP)
  • Weak IV Packets
  • Wi-Fi Protected Access (WPA)
  • WPA Improvements over WEP
  • Temporal Key Integrity Protocol (TKIP)
  • 802.1X: Extensible Authentication Protocol (EAP) Types
  • EAP Advantages and Disadvantages
  • 802.1x EAP/TLS Framework
  • Dynamic Encryption Key Generation
  • Cryptographic Features of WPA2
  • WPA2 Encryption Process
  • Robust Security Network (RSN)
  • 802.11i and WPA/WPA2
Wireless Attacks and Monitoring
  • Rogue Access Point
  • Countermeasure to the Rogue Access Point
  • Peer to Peer Attacks
  • Eavesdropping
  • Breaking Encryption - Aircrack
  • Deauth / Disassociate Attack
  • MAC Spoofing
  • Denial of Service
  • ARP Injection
  • Intrusion Detection Monitoring
  • Wireless Security Policy
Radio Frequency Site Survey
  • WLAN Site Survey Interview
  • Customer Briefing
  • Business Requirements
  • Capacity and Coverage Requirements
  • Infrastructure Connectivity
  • Security Expectations
  • Documentation and Reports
  • Forms and Customer Documentation
  • Deliverables
  • Site Survey Defined
  • Mandatory Spectrum Analysis
  • Mandatory Coverage Analysis
  • Indoor Site Survey Tools
  • Outdoor Site Survey Tools
  • Coverage Analysis: Manual
  • Coverage Analysis: Assisted
  • Coverage Analysis: Predictive
Wireless LAN Auditing Tools
  • Netstumbler and War Driving
  • Exporting Netstumbler Results
  • War Driving with KNSGEM
  • Kismet
  • Microsoft Wireless Zero Configuration (WZC)
  • Wi-Fi Finders
  • Antennas
  • Cain and Abel
  • OmniPeek Personal
  • Auditor Uses
  • Manufacturer Defaults
  • OS Fingerprinting and Port Scanning
  • Port Scan Tips
  • Tools
  • NMAP
  • Services and Ports Used
  • Vanilla Port Scan (TCP Connect Port Scan)
  • NMAP TCP Connect Scan
  • LookatLan
  • OS Fingerprinting
  • Share Enumerators
  • RF Jamming Tools
  • Hijacking Tools
  • Assessment Types
Gathering Information
  • Methods of Obtaining Information
  • Physical Access
  • Social Access
  • Digital Access

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved