# # # #

Service Center

Cisco CCNA Wireless Certification Training IUWNE Online Course

Wireless network deployment has exploded in recent years. The use of wireless devices went quickly from early adoption in sites where cabling was difficult or impossible, to widespread use in home networks. The change was rapid due to the ease of use of wireless routers and other equipment.
Cisco Certified Network Associate Wireless (CCNA® Wireless) validates associate-level knowledge and skills to configure, implement and support of wireless LANs, specifically those networks using Cisco equipment. With a CCNA Wireless certification, network professionals can support a basic wireless network on a Cisco WLAN in a SMB to enterprise network. The CCNA Wireless curriculum includes information and practice activities to prepare them for configuring, monitoring and troubleshooting basic tasks of a Cisco WLAN in SMB and Enterprise networks.
This training  course also explores WLAN radio frequency (RF) principles and RF mathematics, to provide an explanation of how the radio waves used in wireless networks function. This course maps to the 640-721, Implementing Cisco Unified Wireless Networking Essentials (IUWNE), exam objectives for describing wireless topologies (IBSS, BSS, ESS, Point-to-Point, Point-to-Multipoint, basic Mesh, bridging); describing networking technologies used in wireless (SSID, WLAN_ID, Interface, VLAN, 802.1q trunking); and describing WLAN RF principles (refraction, reflection, etc.).
Cisco  IWNUE Wireless Certification Training Courses Includes
  Full Multi Media Lessons
    Labs integrated within the lessons
  Test Preps - Hundreds of Practice Exams Online
Target Audience
Network associates, WLAN designers, planners, implementers, optimizers, trainers or support personnel; candidates for the Implementing Cisco Unified Wireless Networking Essentials v1.0 640-721 examination, seeking to attain Cisco's CCNA-WIRELESS credential

Course Outline

Wireless Fundamentals

  • WPAN, WLAN, WMAN, and WWAN network types
  • Ad hoc networks
  • Access point (APs), service set identifier (SSIDs), and workgroup bridge (WGB) topologies
  • The role of reflection and refraction in wireless signal loss
  • How the Fresnel zone and measures of signal strength can be used to estimate signal quality
  • Scale of common radio frequency units
  • Perform power conversions and EIRP calculations

Wireless Antennae and Spread Spectrum Technologies

  • Four categories of omnidirectional antennae and three categories of directional antennae
  • The impact of antenna accessories on signal patterns and strength
  • Type of antenna and determine its best use and location
  • How DBPSK, DQPSK, and CCK are used to achieve higher signal speeds in Direct Sequence Spread Spectrum (DSSS) technology
  • The capabilities and coding techniques for three OFDM modulations: BPSK, QPSK, and QAM
  • Implications of potential overlap between spread spectrum channels

Wireless Regulation Bodies, Standards, and Certifications

  • The role of the IEEE and the Wi-Fi Alliance in defining wireless protocols and specifications
  • The scope of 802.11 standards that operate in the 2.4 GHz spectrum and in the 5 GHz spectrum
  • The place of the 802.11n and the 802.11 original protocol in the 802.11 family of protocols
  • Spectrum, channels, speed, and data rates of the 802.11a protocol
  • Components of the 802.11n protocol
  • Functional changes that 802.11n will bring to networks currently operating under the 802.11a, b, and g standards

Wireless Frame Basics and Nonstandard Technologies

  • How wireless devices prevent collisions as data frames travel through the system
  • Frame types, frame speed organization, and the structural elements of frame shape
  • How beacons, probes, and management frames enable a wireless client to discover and connect to a network
  • How Bluetooth, cordless phones, and ZigBee networks operate
  • How WiMAX can interact with Wi-Fi
  • How VLANs and trunks function to separate SSIDs on the wired side of the network
  • Configure and Create VLANs and trunks

Unified Wireless Network Basic Architecture

  • How wireless devices prevent collisions as data frames travel through the system
  • Frame types, frame speed organization, and the structural elements of frame shape
  • How beacons, probes, and management frames enable a wireless client to discover and connect to a network
  • How Bluetooth, cordless phones, and ZigBee networks operate
  • How WiMAX can interact with Wi-Fi
  • How VLANs and trunks function to separate SSIDs on the wired side of the network
  • Configure and Create VLANs and trunks

Access Point Management

  • Access point operational modes
  • How the roaming process works
  • The functions of mobility anchors
  • How to manage and monitor rogues
  • Monitor and manage clients
  • Create an internal DHCP scope
  • How to convert a standalone AP to LWAPP using the Cisco IOS-to-LWAPP  and Cisco WCS
  • The architecture of Cisco Mobility Express
  • Configure and migrate Standalone Access Points

Wireless Clients

  • Network Manager to configure wireless networks for Linux
  • Mac AirPort to configure wireless networks for Mac
  • Wireless Zero Configuration (WZC) utility to configure wireless networks in Windows
  • How to manage Cisco wireless cards with the Cisco ADU tool
  • ADU functions for diagnostics, troubleshooting, administration, and profile management
  • Cisco Secure Services Client (SSC) for advanced administration and network profile management
  • Cisco Compatible Extensions (CCX) program
  • Create a Cisco ADU profile
  • Configure the Cisco ACAU

WLAN Security Basics

  • Features of authentication
  • Features of encryption
  • Management Frame Protection (MFP) in advanced wireless security
  • How open authentication and WEP are used to establish security
  • Configure a MAC filter on a WLAN
  • Features of IEEE 802.1X
  • EAP resolves authentication issues
  • How to use a RADIUS server as an authentication source on the controller
  • Configure the controller for local EAP
  • Create a wireless security profile

WLAN Authentication and Encryption

  • Asymmetric keys function in wireless networks
  • How certificates and public key infrastructure (PKI) allow authentication and encryption
  • EAP-TLS functions as an authentication scheme
  • EAP-FAST functions as an authentication scheme
  • PEAP and LEAP provide security on wireless networks
  • What is involved in the WPA authentication process
  • The features of the WPA2 certification
  • How to configure the specific EAP authentication profile on the client side

 Introducing, Installing, and Administering WCS

  • Features of Cisco WCS Location
  • How the Cisco WCS licensing system works
  • Cisco WCS installation
  • The functions you can perform in the Cisco WCS Administration Background Tasks window
  • How to edit Cisco WCS logging options
  • Create credentials on the Cisco WCS

Cisco WCS Administration

  • Configure controllers and network devices from Cisco WCS
  • How maps provide a graphical representation of network layout
  • How to use and edit Cisco WCS maps
  • How the WCS Home page can be customized
  • WCS Monitor page enables you to verify and monitor devices
  • Cisco WCS to locate wireless devices
  • Use the Cisco WCS to locate devices

Maintenance and Troubleshooting

  • How to upgrade or downgrade controller code
  • WCS database backup procedures
  • Conducting a predeployment site survey
  • How to detect common client, controller, and AP issues
  • How to test Layer 2 and Layer 3 connectivity
  • How logs and messages can be used for troubleshooting
  • Cisco and third-party troubleshooting tools
  • Configure logs and SNMP traps to monitor the wireless network