Why this CWTS course?
This unique course provides a technical grounding in 802.11 / Wi-Fi networks, including 802.11 / Wi-Fi standards and amendments, 802.11 protocol operation, equipment configuration, installation and testing; RF Channels, RF spectrum analysis, and an overview of Wi-F Site Survey. The course helps attendees prepare for the Certitrek Certified Wireless Technician (CWT) and Certified Wireless Specialist (CWS) on-line certification exams
CWTS Training Course Objectives
On completing this course, you will be able to:
- Understand 802.11 / Wi-Fi terminology
- Understand Wi-Fi equipment and its primary functions
- Understand the configuration process for SSIDs, security settings and other client adapter settings
- Properly configure and install Wi-Fi access points
- Configure a WLAN client for connectivity
- Understand essential aspects of outdoor wireless networks
- Gather information from a design specification document
- Specify Wi-Fi site survey requirements
- Troubleshoot basic Wi-Fi connection problems and help users regain network connectivity
- Prepare for the Certitrek Certified Wireless Technician (CWT) and Certified Wireless Specialist (CWS) on-line certification exams.
Who should attend this CWTS course
- Wi-Fi sales professionals or marketing personnel.
- Level 1 and Level 2 IT support staff supporting Wi-Fi network users.
- Installers of Wi-Fi access points and other wireless products.
- Project managers responsible for wireless network deployments.
- People wanting to take the Certitrek Certified Wireless Specialist (CWS) and/or Certified Wireless Technician (CWT) on-line certification exams.
CWTS Course Pre-requisites
Students should have a basic knowledge of Ethernet networks.
Lifetime Post-Course Support
After completing this CWTS training course, delegates receive lifetime post-training support from LEVER Technology Group, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.
CWTS Training Course Content
Introduction to Networking
- Understanding Network Models
- Understanding Protocols
- SDU
- PDU
- OSI – The de facto Reference Model
- The seven layer model
- Equipment per layer
- Mapping other protocols into the OSI model
- TCP/IP – four layer model
Wi-Fi Organisations and Standards
- Regulatory Bodies
- IEEE
- Wi-Fi Alliance
- WLAN Connectivity
- WLAN Security
- WLAN QoS and Power-Save
- IEEE 802.11 Standards,
- Amendments, and Drafts
- 802.11-2016
- Wi-Fi 6
- 802.11a/b/g/n/ac/ax
- 802.11e/h/i/j/k/r/s/u/v/w
- Hotspot 2.0
Wi-Fi Hardware and Software
- Access Points
- Lightweight
- Autonomous
- WLAN Routers
- WLAN Bridges
- WLAN Repeaters
- WLAN Controllers/Switches
- Direct-connect APs
- Distributed-connect APs
- PoE Infrastructure
- Midspan
- Endpoint
- Client hardware and software
- Antenna types and uses
Radio Frequency (RF) Fundamentals
- Units of RF measurements
- Factors affecting network range and speed
- Environment
- Line-of-sight
- Interference
Spread Spectrum Concepts
- OFDM and HR/DSSS channels
- Co-location of HR/DSSS and OFDM systems
- Adjacent-channel and co-channel interference
- WLAN / WPAN co-existence
- CSMA/CA operation half duplex
- Defining differences between physical layers
- MIMO
RF Antenna Concepts
- Passive gain
- Beam widths
- Simple diversity
- Polarisation
- Antenna Mounting
- Pole/mast mount
- Ceiling mount
- Wall mount
- WLAN Accessories
- RF cables
- RF connectors
- Lightning arrestors and grounding rods
Wi-Fi Site Surveying
- Information gathering and reporting
- Multiple Channel Architecture (MCA) cell planning basics
- Single Channel Architecture (SCA) cell planning basics
- Predictive Site Survey
- Manual Site Survey
- Passive Survey
- Active Survey
- Mesh Access Layers
- Use of Analysers:
- Spectrum Analysers
- Protocol Analysers
- Site Survey tools
- Identifying and locating RF interference sources
- Wi-Fi versus Non-Wi-Fi interference
- Hardware placement limitations
- Best practices for antenna use
Wi-Fi Operational Concepts
- Range, Coverage, Capacity
- Frequencies/channels used
- Channel reuse and co-location
- Active and passive scanning
- Power saving operation
- Data rates and throughput
- Dynamic rate selection
- Authentication and association
- The distribution system and roaming
- Infrastructure and ad hoc modes
- BSSID and ESSID
- Protection mechanisms
Applications, Support, and Troubleshooting
- Installation/configuration of common network types
- Small Office / Home Office (SOHO)
- Extension of existing networks into remote locations
- Building-to-building connectivity
- Public wireless hotspots
- Mobile office, classroom, industrial, and healthcare
- Corporate data access and end-user mobility
- Last-mile data delivery (WISP)
- Transportation networks
Wi-Fi Security and Compliance
- 802.11 Legacy Security Methods (including WEP)
- Encryption – TKIP, CCMP/AES
- Authentication Passphrases and 802.1X/EAP
- WPAv1 versus WPA2
- WPA-Personal
- WPA-Enterprise
- WPS Pushbutton / PIN
- Role-Based Access Control (RBAC)
- VPN Security
- Wireless Intrusion
- Protection Systems (WIPS)
- PCI Compliance
- HIPAA Compliance
- Enforcing Compliance
Recognising and troubleshooting wireless network problems
- Decreased throughput
- Intermittent or no connectivity
- Weak signal strength
- Device upgrades
- Wi-Fi Network Optimisation Procedures
- Infrastructure hardware selection and placement
- Identifying, locating, and removing sources of interference
- Client load-balancing
- Analysing infrastructure capacity and utilisation
- Multipath and hidden nodes
Classroom Demonstrations
- AP/Client Connectivity with WPA2-Personal Security and PoE Power
- Spectrum Analysis of RF Environment
- Protocol Analysis of RF Environment
- Configuring an Autonomous AP
- Configuring a Controller-based wireless network
- Configuring “controller-less” systems