5 days


Employees of federal, state and local governments; and businesses working with the government.

Course Description

The CWNA certification is the foundation-level enterprise Wi-Fi certification for the CWNP Program. Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully survey, install, and administer enterprise Wi-Fi networks.
In this hands-on course, you will gain a full understanding of how radio frequency affects networking so you can perform site surveys, design a high-performance network, and protect both users and sensitive data from potential intruders. Plus, you will explore advanced topics such as VoWLAN deployments, seamless mobile connectivity, and detailed wireless frame analysis. You will use enterprise-class hardware and software tools during live lab exercises, simulating a state-of-the-art production environment.
Get exam ready in this approved CWNA certification course that includes:

  • CWNA study guide
  • Practice exams
  • Exam voucher

What You’ll Learn

  • Radio frequency properties, behaviors, and regulations, and how they affect networking
  • Wireless standards, including 802.11 extensions a, b, g, and n
  • General troubleshooting tips to common real-world 802.11n issues
  • General parameters for performing a successful site survey, along with software tools that reduce time and expense
  • Device-level Wi-Fi communications processes
  • Why 802.11n networks operate the way they do and how to apply that knowledge when faced with problems that stump most network administrators
  • Using wireless network analyzers to capture live data and pinpoint potential network issues
  • How using radio frequency makes wireless networks vulnerable
  • Most common wireless threats and how to detect and defend against them
  • Wireless security standards for keeping unauthorized users out and maintaining wireless data privacy
  • Applying WPA2 security standards, including 802.1X/EAP and AES, along with the devices used to apply them
  • Wireless intrusion detection and why it’s essential for maintaining a secure network

Who Needs to Attend

  • Administrators: network, systems, infrastructure, security, and LAN/WLANs
  • Support professionals: technical assistance and field support
  • Designers: network, systems, and infrastructure
  • Developers: wireless software and hardware products
  • Consultants and integrators: IT and security
  • Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers
  • CCNAs

Course Outline

1.WLAN Infrastructure

  • The Basic Service Set
  • Access Points
    • Basic AP Operation
  • WLAN Controllers
  • Wi-Fi Stations
    • Wi-Fi Client Software
  • Independent Basic Service Set (IBSS)
    • Service Set Identifier
    • The Extended Service Set

2.WLAN Standards

  • WLAN Organizations
    • The IEEE
    • The Wi-Fi Alliance
    • IETF
  • The IEEE 802.11 Standard
    • The 802.11 Physical Layer
    • The 802.11 MAC Layer
  • 802.11 Amendments
    • 802.11a (OFDM)
    • 802.11b (HR/DSSS)
    • 802.11g (ERP)
    • 802.11n (HT)
      • 802.11n Improvements
        • Speed
        • Range
        • Power Consumption
      • MIMO Operation
  • 802.11 and Wi-Fi
    • 802.11 Amendments and Wi-Fi Certifications

3.RF Fundamentals

  • Channels and Bands
    • 2.4 GHz Channels
    • 5 GHz Channels
  • Modulation and Coding
    • DSSS
    • OFDM
  • RF Math
    • Watts and Milliwatts (mW)
    • Decibels (dB), dBi, and dBm
  • Multipath
    • Identifying Multipath
    • Solving Multipath Problems

4.Antennas and Outdoor Wireless

  • Link Budgets
    • Reading Signal Strength
    • Transmitter Power
    • Measuring Antenna Gain
    • Cables, Connectors, and Accessories
    • Signal Propagation
  • Antenna Operation
    • Baseband RF to Radio Waves
  • Antenna Types
    • Omnidirectional Antennas
    • Semidirectional Antennas
    • Highly Directional Antennas
  • Antenna Coverage Patterns
    • Antenna Beamwidth
    • Antenna Mounting

5.WPA/WPA2 Authentication

  • 802.11 Security Amendments
  • 802.11i Robust Security Networks
    • RSN Authentication Options
  • Preshared Key
    • Small Network
    • PSK Vulnerability
    • Preshared Key Design
  • 802.1X
    • Extensible Authentication Protocol
    • 802.1X/EAP Design
  • 802.1X/EAP Authentication
  • Mutual Authentication and Key Negotiation
    • Enterprise Authentication
    • EAP-TLS
    • EAP-PEAP
    • Choosing an EAP Type

6.WPA/WPA2 Encryption

  • WLAN Encryption
    • Wired Equivalent Privacy
  • WPA/WPA2 Encryption Options
  • RC4 Encryption
    • Secure Stream Cipher
  • TKIP Improvements
    • TKIP Operation
    • AES-CCMP Similarities to TKIP
    • AES-CCMP Operation
  • 802.11i Encryption Summary
    • Automatic Encryption Selection
    • Encrypting in the Real World

7.WLAN Operation

  • 802.11 Channel Access
    • A Clear Channel
  • Interframe Spacing
  • Random Backoff Time
    • The Contention Window
    • Winning Arbitration
  • Acknowledgements
    • After the Acknowledgement
  • An Arbitration Example
    • Timelines
    • IFS Timeless
    • Backoff Timelines
    • Frame Timelines
    • ACK Timelines
  • Effects of Arbitration

8.Mixed Mode Operation

  • Mixed Mode Networks
  • 802.11b/g Mixed Mode
    • Protection Mechanism
    • Enabling Protection
  • 802.11g/n Mixed Mode )
    • 802.11n Greenfield
    • 802.11 g/n Mixed Mode AP
    • Nearby 802.11g AP
  • 802.11n 2.4 GHz Problems
  • 802.11n 5 GHz
  • Mixed Mode Best Practices

9.Security Design

  • RSN Concerns
    • General Security Approach
  • Wireless Data Security
    • Eavesdropping
    • Encryption Options
  • Network Security
  • Guest Access
    • Captive portals
    • Captive portal vulnerabilities
  • RF Denial
    • Client Testing Software
    • DoS: Connection Loss
    • DoS Response
    • Network Rogue APs
    • Rogue AP Response
  • MAC Address Spoofing
  • Endpoint Security
    • Evil Twin Rogue APs
    • ESS
    • NAC
  • Enterprise WIDS
    • Enterprise WIDS Types
    • Enterprise WIDS Monitoring
    • WIDS Rogue Prevention
    • Enterprise WIDS Summary
  • Security Design Best Practices

10.Troubleshooting Station Connections

  • Common Station Problems
  • Radio On/Off Switches
  • Wi-Fi Client Utilities
    • Automatic SSID Configuration
    • Manual SSID Configuration
    • Security Configuration
  • Power Management Protocols
    • Power states and modes
    • 802.11 Power Management
    • Automatic Power Save Delivery
    • Power Management Settings

11.WLAN Analysis

  • Packet Capture
    • Passive Monitoring
    • Monitor Mode
  • Protocol Analysis Software
  • The Wi-Fi Connection
    • Beyond Basic Troubleshooting
    • The 802.11 State Machine
  • Discovery Analysis
  • Authentication and Association/li>
  • Roaming
  • Secure Connections
    • WEP Connections
    • PSK Connections
    • 802.1X/EAP Connections
  • Connection Loss

12.WLAN Channel Analysis

  • Analyzing the Channel
  • Using the Protocol Analyzers
    • Filtering
  • Basic 802.11 Overhead
    • Wi-Fi Collisions
  • Channel Efficiency
    • 802.11 Retrys
  • Performance Degradation
    • Interference Types
  • Spectrum Analyzers
    • Distributed Spectrum Analyzers
    • Spectrum Analyzer Troubleshooting

13.Enterprise Infrastructure Design

  • Basic AP Configuration
  • Enterprise WLAN Needs
    • Optional AP Settings
  • Wireless Network Management Systems
    • Controller-less WLANs
  • Wireless VLANs
    • Wireless VLAN Security
  • Power over Ethernet
    • Power sourcing equipment
    • Powered devices
    • Detection and classification
  • Picocells
    • Power Output Settings
    • Channel Reuse
    • Redundancy
  • Client Isolation
    • RTS/CTS Protocol
    • RTS/CTS Thresholds
    • RTS/CTS Uses
  • AP Optimization Best Practices

14.Station Optimization

  • Station Configuration
  • Additional Station Settings
    • Roaming Tendency
    • Disable Upon Wired Connect
    • Single Sign-on
  • Station Optimization Best Practices

15.QoS Configuration

  • Legacy WLANs
    • QoS Needs
  • QBSS Load
  • Enhanced Distributed Channel Access
    • AIFSN Lengths
    • The Contention Window (QoS)
    • Transmit Opportunity
    • TXOP and Contention-Free Burst
  • Priority Settings
  • QoS Configuration Best Practices

16.Channel Optimization

  • RF Difficulties
    • Handling RF Problems
  • Roaming
    • Roaming Behavior
    • Roaming Problems
    • Cell Overlap
  • Common WLAN Types
    • Basic-Coverage WLANs
    • High-Density WLANs
    • Application-Based WLANs
  • Alternative technologies
    • Role-based access control
    • Transmit beamforming
    • Virtual Cells
    • Controller-less management
    • Multi-radio APs
  • Channel Optimization Best Practices

17.Site Surveys

  • Radio Frequency Problems
  • Site Surveys
    • Pre-Installation Surveying
  • Kit Preparation
  • WLAN Simulation Software
    • Predictive Coverage
    • High Cost, High Benefit
  • Post-Installation Surveying
    • Performing Spot Checks
  • Live Survey Software
    • Coverage Mapping
    • Survey Reporting
  • Site Survey Best Practices

18.Next-Generation WLANs

  • Next-Generation Improvements
  • Automatic RF management
    • Band Steering
    • Airtime management
  • Wi-Fi Direct
  • Secure Roaming
    • Fast Transition Basics
    • Fast Transition Options
    • WMM Voice Enterprise
  • Mesh Networks
    • Mesh Networking Technology
    • Outdoor Access
    • Consumer Wi-Fi Technologies
  • Home Media Streaming
    • Direct Link Setup
    • Software-Based APs
    • Software-Based AP Uses
  • Wi-Fi Cellular Calling


1. WLAN Client Management

Configure a Microsoft Windows XP Wireless Zero Configuration (WZC) client utility. Enable security features that prevent attacks against workstations when users leave the enterprise environment.

2. WLAN Protocol Analyzers

Set up Wildpackets Omnipeek for advanced WLAN monitoring. Configure the Omnipeek interface for future protocol analysis exercises.

3. WLAN Channel Analyzers

Set up the AirMagnet WiFi Analyzer for basic WLAN monitoring. Name stations and APs in order to streamline future troubleshooting exercises.

4. Spectrum Analyzer Setup: WiSpy with Chanalyzer

Set up the WiSpy with Chanalyzer for spectrum analysis. Navigate through the software to prepare for detailed analysis in later lab exercises.

5. WLAN Configuration: WPA2 Enterprise

Configure basic connectivity and security settings on a Ruckus Wireless LAN Controller. Configure WiFi clients using the Broadcom Client Utility to connect to the access point using WPA2 Enterprise with EAP-TTLS (MS-CHAPv2) authentication and AES-CCMP encryption.

6. Wireless IDS Setup

Set up the AirMagnet Enterprise wireless IDS (WIDS). Examine WIDS alarm settings in order to prevent false-positives. Configure AP trust levels in order to differentiate authorized APs from rogue APs.

7. Connection Analysis

Verify Open, WPA2 Personal, and WPA2 Enterprise connections using WildPackets Omnipeek. Identify frames captured during authentication and analyze connection patterns. Examine the contents of 802.11n Beacon frames.

8. Performance Analysis

Test 802.11g and 802.11n throughput with varying channel configurations. Identify performance degradation when channel configurations are configured improperly. Perform individual throughput tests on each station as well as overall channel throughput tests using AirMagnet WiFi Analyzer.

9. VoWLAN Setup and Testing

Set up Ascom i75 VoFi handsets for Wi-Fi calling. Test voice quality with multiple active calls on a single WLAN channel. Examine channel error rates using WildPackets Omnipeek.

10. Roaming

Test notebook and VoFi handset client roaming patterns between multiple APs. Add varying amounts of data traffic to the network and compare VoFi call quality and roaming capabilities.

11. Site Survey: Planning/Simulation

Upload a map of the training center environment to Ekahau Site Survey Pro and detail obstruction specifications (walls, doors, etc.). Configure access point locations and perform a site survey simulation to estimate the coverage area.

12. Site Survey: Live Coverage Mapping

Use AirMagnet Survey to determine the Wi-Fi coverage area on the previously uploaded map of the training center. Compare the results of the live site survey with the results of the site survey simulation from the previous lab.