By John Academy
Online
Can be taken anytime
Professional Training Course
Yes (Details)
English
Course Overview
If you are working in company related to wireless technology, the course is the best solution for you. The course illustrates the fundamentals and essentials functions of wireless network technology and helps you to embrace the system efficiently.
The course is sectioned into two parts - one is network administration, and another one is about network security. Both the sections help you to achieve a strong command over the technology. The basic concept of Radio Frequency (RF), WLAN security system, Legal system, Encryption Cipers and methods will be discussed in the Wireless Security Professional section. On the other hand, you gain a crystal clear knowledge about Wi-Fi access, MAC, WLAN, troubleshooting in the Network Administration part.
The purpose of the bundled course is to help you to accustom with the troubleshooting process and network configuration process of Wireless technology. The course helps you to handle WLAN network securely.
Who should take this course
Certified Wireless Network Administrator (CWNA) - Complete Video Course is certified by CPD Qualifications Standards and IAO. This makes it perfect for anyone trying to learn potential professional skills.
As there is no experience and qualification required for this course, it is available for all students from any academic background.
Accreditation
CPD
Course content
COURSE CURRICULUM Overview of Wireless Communications
- Overview of Wireless Communications
- Communication Fundamentals
Fundamentals of RF
- Fundamentals of RF
- Characteristics of RF
- RF Behaviors
Components and Measurements of RF
- Components and Measurements of RF
- dB Mathematics
- Math Examples (eNotes)
- Noise Floor
RF Signal and Antenna Concepts
- RF Signal and Antenna Concepts
- Antenna Types
- Beamforming
IEEE 802.11
- IEEE 802.11
- 802.11i
Spread Spectrum Technologies Course Overview
- Direct Sequence Spread Spectrum (Part 1)
- Direct Sequence Spread Spectrum (Part 2)
WLAN Topologies
- WLAN Topologies
- Distribution Service
- Mesh BSS
Wi-Fi Access
- Wi-Fi Access
- Interframe Space (IFS)
MAC Architecture
- MAC Architecture
- Beacon Frames
WLAN Architecture
- WLAN Architecture
- WLAN Controller
WLAN Deployment
- WLAN Deployment
- Network Extension to Remote Areas
Troubleshooting
- Troubleshooting
- 802.11 Coverage Considerations
- Capacity vs. Coverage
Security
- Security
- Robust Security
Types of Wireless Attacks
- Types of Wireless Attacks
- Intrusion Monitoring
Fundamentals of Site Surveys
- Fundamentals of Site Surveys
Site Survey Tools
- Site Survey Tools
- Site Survey
PoE
- PoE
- Midspan
High Throughput (HT)
- High Throughput (HT)
- Spatial Multiplexing (SM)
Very High Throughput (HT)
- Very High Throughput (VHT)
BYOD
- BYOD
- Over the Air Management
WLAN Security Overview
- WLAN Security Overview and Data Privacy
- Data Privacy Demo 01 Networking Basics
- Data Privacy Demo 02 Web GUI Introduction
- Data Privacy Demp 03 Security Options
Legacy Security
- Legacy Security
- VPNs
- VPNs Demo 01 Security Association
- VPNs Demo 02 MAC Spoofing
Encryption Ciphers and Methods
- Encryption Ciphers and Methods
- TKIP
- CCMP
- CCMP Demo 01 Encryption Examples
802.11 Authentication Methods
- 802.11 Authentication Methods
- 802.1X
- EAP
- EAP Demo 01 Certified Authority Server Credentials
Dynamic Encryption Key Generation
- Dynamic Encryption Key Generation
- Authentication and Key Management
- RSNA Key Hierarchy
- RSNA Key Hierarchy Demo 01 EAP
- RSNA Key Hierarchy Demo 02 Information Elements
SOHO 802.11 Security
- SOHO 802.11 Security
- Wi-Fi Protected Setup (WPS) Demo 01 Cracking Hashes
- Wi-Fi Protected Setup (WPS) Demo 01 Cracking Hashes
Fast Secure Roaming
- Fast Secure Roaming
- PMKSA
- FT Key Hierarchy (e-notes)
- 802.11K-2008
Wireless Security Risks
- Wireless Security Risks
- Authentication Attacks
- Authentication Attacks Demp 01 Rogue Devices
- Authentication Attacks Demo 02 Public Hotspots
Wireless LAN Security Auditing
- Wireless LAN Security Auditing
Wireless Security Monitoring
- Wireless Security Monitoring
- Device Tracking
VPNs, Remote Access and Guest Access Services
- VPNs, Remote Access and Guest Access Services
- Remote Access
WLAN Security Infrastructure
- WLAN Security Infrastructure
- Management Protocols
- Other RADIUS Solutions
Wireless Security Policies
- Wireless Security Policies
- Other Policies
Assessment:
- At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
- Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
Certification:
In addition to the course price there is an additional charge for certificate. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at the following price:
- Hard Copy by post - GBP39.00
- Soft Copy PDF via email - GBP24.00
About Course Provider
We are a company who is best known for offering awarding body accredited online courses that are available for anyone who wishes to acquire a certification and take their professional life to the next level.
As an online learning site, we are aware of the fact that there are a lot of people out there who considers themselves to be a curious learner but the courses that they are interested in are not available in the area. So, we have decided to give them a chance to learn in a convenient way – in their own convenient place and time.