Enterprise Wi-Fi Administration (CWNA) Certified Wireless Network Administrator Learn to successfully survey, install, and administer enterprise-class Wi-Fi networks. Schedule Venue Time Investment April 22-26, 2013 GK Shaw 9am-5pm Regular Fee: P125,000 + VAT May 27-31, 2013 GK Shaw 9am-5pm PROMO FEE: P95,000+ VAT August 12-16, 2013 GK Shaw 9am-5pm BUNDLED WITH EXAM September 23-27, 2013 GK Shaw 9am-5pm The CWNA certification is the foundation-level enterprise Wi-Fi certification for the CWNP Program. Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully survey, install, and administer enterprise Wi-Fi networks. In this hands-on course, you will gain a full understanding of how radio frequency affects networking so you can perform site surveys, design a high-performance network, and protect both users and sensitive data from potential intruders. Plus, you will explore advanced topics such as VoWLAN deployments, seamless mobile connectivity, and detailed wireless frame analysis. You will use enterprise-class hardware and software tools during live lab exercises, simulating a state-of-the-art production environment. Get exam ready in this approved CWNA certification course that includes: CWNA study guide Practice exams Exam voucher What You'll Learn Radio frequency properties, behaviors, and regulations, and how they affect networking Wireless standards, including 802.11 extensions a, b, g, and n General troubleshooting tips to common real-world 802.11n issues General parameters for performing a successful site survey, along with software tools that reduce time and expense Device-level Wi-Fi communications processes Why 802.11n networks operate the way they do and how to apply that knowledge when faced with problems that stump most network administrators Using wireless network analyzers to capture live data and pinpoint potential network issues How using radio frequency makes wireless networks vulnerable Most common wireless threats and how to detect and defend against them Wireless security standards for keeping unauthorized users out and maintaining wireless data privacy Applying WPA2 security standards, including 802.1X/EAP and AES, along with the devices used to apply them Wireless intrusion detection and why it's essential for maintaining a secure network Who Needs to Attend Administrators: network, systems, infrastructure, security, and LAN/WLANs
Support professionals: technical assistance and field support Designers: network, systems, and infrastructure Developers: wireless software and hardware products Consultants and integrators: IT and security Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers CCNA s Prerequisites TCP/IP Networking Course Outline 1. WLAN Infrastructure The Basic Service Set Access Points o Basic AP Operation WLAN Controllers Wi-Fi Stations o Wi-Fi Client Software Independent Basic Service Set (IBSS) o Service Set Identifier o The Extended Service Set 2. WLAN Standards WLAN Organizations o The IEEE o The Wi-Fi Alliance o IETF The IEEE 802.11 Standard o The 802.11 Physical Layer o The 802.11 MAC Layer 802.11 Amendments o 802.11a (OFDM) o 802.11b (HR/DSSS) o 802.11g (ERP) o 802.11n (HT) 802.11n Improvements Speed Range Power Consumption MIMO Operation 802.11 and Wi-Fi o 802.11 Amendments and Wi-Fi Certifications 3. RF Fundamentals Channels and Bands o 2.4 GHz Channels o 5 GHz Channels 11. Troubleshooting Station Connections Common Station Problems Radio On/Off Switches Wi-Fi Client Utilities o Automatic SSID Configuration o Manual SSID Configuration o Security Configuration Power Management Protocols o Power states and modes o 802.11 Power Management o Automatic Power Save Delivery o Power Management Settings 12. WLAN Analysis Packet Capture o Passive Monitoring o Monitor Mode Protocol Analysis Software The Wi-Fi Connection o Beyond Basic Troubleshooting o The 802.11 State Machine Discovery Analysis Authentication and Association/li> Roaming Secure Connections o WEP Connections o PSK Connections
Modulation and Coding o DSSS o OFDM RF Math o Watts and Milliwatts (mw) o Decibels (db), dbi, and dbm Multipath o Identifying Multipath o Solving Multipath Problems 4. Antennas and Outdoor Wireless Link Budgets o Reading Signal Strength o Transmitter Power o Measuring Antenna Gain o Cables, Connectors, and Accessories o Signal Propagation Antenna Operation o Baseband RF to Radio Waves Antenna Types o Omnidirectional Antennas o Semidirectional Antennas o Highly Directional Antennas Antenna Coverage Patterns o Antenna Beamwidth o Antenna Mounting 5. WPA/WPA2 Authentication 802.11 Security Amendments 802.11i Robust Security Networks o RSN Authentication Options Preshared Key o Small Network o PSK Vulnerability o Preshared Key Design 802.1X o Extensible Authentication Protocol o 802.1X/EAP Design 802.1X/EAP Authentication Mutual Authentication and Key Negotiation o Enterprise Authentication o EAP-TLS o EAP-PEAP o Choosing an EAP Type 6. WPA/WPA2 Encryption WLAN Encryption o Wired Equivalent Privacy o 802.1X/EAP Connections 13. WLAN Channel Analysis Analyzing the Channel Using the Protocol Analyzers o Filtering Basic 802.11 Overhead o Wi-Fi Collisions Channel Efficiency o 802.11 Retrys Performance Degradation o Interference Types Spectrum Analyzers o Distributed Spectrum Analyzers o Spectrum Analyzer Troubleshooting 14. Enterprise Infrastructure Design Basic AP Configuration Enterprise WLAN Needs o Optional AP Settings Wireless Network Management Systems o Controller-less WLANs Wireless VLANs o Wireless VLAN Security Power over Ethernet o Power sourcing equipment o Powered devices o Detection and classification Picocells o Power Output Settings o Channel Reuse o Redundancy Client Isolation RTS/CTS o RTS/CTS Protocol o RTS/CTS Thresholds o RTS/CTS Uses AP Optimization Best 15. Station Optimization Station Configuration Additional Station Settings o Roaming Tendency o Disable Upon Wired Connect
WPA/WPA2 Encryption Options RC4 Encryption o Secure Stream Cipher TKIP Improvements o TKIP Operation AES-CCMP o AES-CCMP Similarities to TKIP o AES-CCMP Operation 802.11i Encryption Summary o Automatic Encryption Selection o Encrypting in the Real World 7. WLAN Operation 802.11 Channel Access CSMA/CA o A Clear Channel Interframe Spacing Random Backoff Time o The Contention Window o Winning Arbitration Acknowledgements o After the Acknowledgement An Arbitration Example o Timelines o IFS Timeless o Backoff Timelines o Frame Timelines o ACK Timelines Effects of Arbitration 8. Mixed Mode Operation Mixed Mode Networks 802.11b/g Mixed Mode o Protection Mechanism o Enabling Protection 802.11g/n Mixed Mode ) o 802.11n Greenfield o 802.11 g/n Mixed Mode AP o Nearby 802.11g AP 802.11n 2.4 GHz Problems 802.11n 5 GHz Mixed Mode Best 9. Security Design RSN Concerns o General Security Approach Wireless Data Security o Eavesdropping o Encryption Options Network Security o Single Sign-on Station Optimization Best 16. QoS Configuration Legacy WLANs o QoS Needs QBSS Load Enhanced Distributed Channel Access o AIFSN Lengths o The Contention Window (QoS) o Transmit Opportunity o TXOP and Contention- Free Burst Priority Settings QoS Configuration Best 17. Channel Optimization RF Difficulties o Handling RF Problems Roaming o Roaming Behavior o Roaming Problems o Cell Overlap Common WLAN Types o Basic-Coverage WLANs o High-Density WLANs o Application-Based WLANs Alternative technologies o Role-based access control o Transmit beamforming o Virtual Cells o Controller-less management o Multi-radio APs Channel Optimization Best 18. Site Surveys Radio Frequency Problems Site Surveys o Pre-Installation Surveying Kit Preparation WLAN Simulation Software o Predictive Coverage o High Cost, High Benefit
Guest Access o Captive portals o Captive portal vulnerabilities RF Denial o Client Testing Software o DoS: Connection Loss o DoS Response o Network Rogue APs o Rogue AP Response MAC Address Spoofing Endpoint Security o Evil Twin Rogue APs o ESS o NAC o Enterprise WIDS o Enterprise WIDS Types o Enterprise WIDS Monitoring o WIDS Rogue Prevention o Enterprise WIDS Summary o Security Design Best 10. Next-Generation WLANs Next-Generation Improvements Post-Installation Surveying o Performing Spot Checks Live Survey Software o Coverage Mapping o Survey Reporting Site Survey Best Automatic RF management o Band Steering o Airtime management Wi-Fi Direct Secure Roaming o Fast Transition Basics o Fast Transition Options o WMM Voice Enterprise Mesh Networks o Mesh Networking Technology o Outdoor Access o Consumer Wi-Fi Technologies Home Media Streaming o Direct Link Setup o Software-Based APs o Software-Based AP Uses WI-FI Cellular Calling Labs 1. WLAN Client Management Configure a Microsoft Windows XP Wireless Zero Configuration (WZC) client utility. Enable security features that prevent attacks against workstations when users leave the enterprise environment. 2. WLAN Protocol Analyzers Set up Wildpackets Omnipeek for advanced WLAN monitoring. Configure the Omnipeek interface for future protocol analysis exercises. 3. WLAN Channel Analyzers Set up the AirMagnet WiFi Analyzer for basic WLAN monitoring. Name stations and APs in order to streamline future troubleshooting exercises. 4. Spectrum Analyzer Setup: WiSpy with Chanalyzer Set up the WiSpy with Chanalyzer for spectrum analysis. Navigate through the software to prepare for detailed analysis in later lab exercises. 5. WLAN Configuration: WPA2 Enterprise Configure basic connectivity and security settings on a Ruckus Wireless LAN Controller. Configure WiFi clients using the Broadcom Client Utility to connect to the access point using WPA2 Enterprise with EAP- TTLS (MS-CHAPv2) authentication and AES-CCMP encryption. 6. Wireless IDS Setup Set up the AirMagnet Enterprise wireless IDS (WIDS). Examine WIDS alarm settings in order to prevent
false-positives. Configure AP trust levels in order to differentiate authorized APs from rogue APs. 7. Connection Analysis Verify Open, WPA2 Personal, and WPA2 Enterprise connections using WildPackets Omnipeek. Identify frames captured during authentication and analyze connection patterns. Examine the contents of 802.11n Beacon frames. 8. Performance Analysis Test 802.11g and 802.11n throughput with varying channel configurations. Identify performance degradation when channel configurations are configured improperly. Perform individual throughput tests on each station as well as overall channel throughput tests using AirMagnet WiFi Analyzer. 9. VoWLAN Setup and Testing Set up Ascom i75 VoFi handsets for Wi-Fi calling. Test voice quality with multiple active calls on a single WLAN channel. Examine channel error rates using WildPackets Omnipeek. 10. Roaming Test notebook and VoFi handset client roaming patterns between multiple APs. Add varying amounts of data traffic to the network and compare VoFi call quality and roaming capabilities. 11. Site Survey: Planning/Simulation Upload a map of the training center environment to Ekahau Site Survey Pro and detail obstruction specifications (walls, doors, etc.). Configure access point locations and perform a site survey simulation to estimate the coverage area. 12. Site Survey: Live Coverage Mapping Use AirMagnet Survey to determine the Wi-Fi coverage area on the previously uploaded map of the training center. Compare the results of the live site survey with the results of the site survey simulation from the previous lab To Register Pls. call Sandra at 668-6531 GLOBALKNOWLEDGE PHILIPPINES INC. Ground Flr. Unit 107 Beacon Plaza, Shaw Blvd. Cor. Ideal St. Mandaluyong City, Philippines Tel/Fax Nos.: 668-6531 / 721-4380 Email: sandra@gkphilippines.com URL: www.gkphilippines.com