Booking options
£24
£24
On-Demand course
23 hours 29 minutes
All levels
If you are working in company related to wireless technology, the course is the best solution for you. The course illustrates the fundamentals and essentials functions of wireless network technology and helps you to embrace the system efficiently.
The course is sectioned into two parts - one is network administration, and another one is about network security. Both the sections help you to achieve a strong command over the technology. The basic concept of Radio Frequency (RF), WLAN security system, Legal system, Encryption Cipers and methods will be discussed in the Wireless Security Professional section. On the other hand, you gain a crystal clear knowledge about Wi-Fi access, MAC, WLAN, troubleshooting in the Network Administration part.
The purpose of the bundled course is to help you to accustom with the troubleshooting process and network configuration process of Wireless technology. The course helps you to handle WLAN network securely.
At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
Certified Wireless Network Administrator (CWNA) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.
As there is no experience and qualification required for this course, it is available for all students from any academic background.
Our Certified Wireless Network Administrator (CWNA) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
Overview of Wireless Communications | |||
Overview of Wireless Communications | FREE | 00:23:00 | |
Communication Fundamentals | 00:15:00 | ||
Fundamentals of RF | |||
Fundamentals of RF | 00:07:00 | ||
Characteristics of RF | 00:17:00 | ||
RF Behaviors | 00:17:00 | ||
Components and Measurements of RF | |||
Components and Measurements of RF | 00:19:00 | ||
dB Mathematics | 00:18:00 | ||
Math Examples (eNotes) | 00:20:00 | ||
Noise Floor | 00:07:00 | ||
RF Signal and Antenna Concepts | |||
RF Signal and Antenna Concepts | 00:13:00 | ||
Antenna Types | 00:15:00 | ||
Beamforming | 00:09:00 | ||
IEEE 802.11 | |||
IEEE 802.11 | 00:15:00 | ||
802.11i | 00:10:00 | ||
Spread Spectrum Technologies Course Overview | |||
Direct Sequence Spread Spectrum (Part 1) | 00:22:00 | ||
Direct Sequence Spread Spectrum (Part 2) | 00:21:00 | ||
WLAN Topologies | |||
WLAN Topologies | 00:10:00 | ||
Distribution Service | 00:08:00 | ||
Mesh BSS | 00:15:00 | ||
Wi-Fi Access | |||
Wi-Fi Access | 00:14:00 | ||
Interframe Space (IFS) | 00:13:00 | ||
MAC Architecture | |||
MAC Architecture | 00:18:00 | ||
Beacon Frames | 00:11:00 | ||
WLAN Architecture | |||
WLAN Architecture | 00:17:00 | ||
WLAN Controller | 00:11:00 | ||
WLAN Deployment | |||
WLAN Deployment | 00:10:00 | ||
Network Extension to Remote Areas | 00:13:00 | ||
Troubleshooting | |||
Troubleshooting | 00:18:00 | ||
802.11 Coverage Considerations | 00:17:00 | ||
Capacity vs. Coverage | 00:19:00 | ||
Security | |||
Security | 00:22:00 | ||
Robust Security | 00:24:00 | ||
Types of Wireless Attacks | |||
Types of Wireless Attacks | 00:30:00 | ||
Intrusion Monitoring | 00:08:00 | ||
Fundamentals of Site Surveys | |||
Fundamentals of Site Surveys | 00:16:00 | ||
Site Survey Tools | |||
Site Survey Tools | 00:05:00 | ||
Site Survey | 00:15:00 | ||
PoE | |||
PoE | 00:09:00 | ||
Midspan | 00:08:00 | ||
High Throughput (HT) | |||
High Throughput (HT) | 00:11:00 | ||
Spatial Multiplexing (SM) | 00:12:00 | ||
Very High Throughput (HT) | |||
Very High Throughput (VHT) | 00:18:00 | ||
BYOD | |||
BYOD | 00:19:00 | ||
Over the Air Management | 00:10:00 | ||
WLAN Security Overview | |||
WLAN Security Overview and Data Privacy | 00:58:00 | ||
Networking Basics | 00:04:00 | ||
Web GUI Introduction | 00:05:00 | ||
Security Options | 00:03:00 | ||
Legacy Security | |||
Legacy Security | 00:32:00 | ||
VPNs | 00:21:00 | ||
Security Association | 00:09:00 | ||
MAC Spoofing | 00:07:00 | ||
Encryption Ciphers and Methods | |||
Encryption Ciphers and Methods | 00:19:00 | ||
TKIP | 00:26:00 | ||
CCMP | 00:20:00 | ||
Encryption Examples | 00:06:00 | ||
802.11 Authentication Methods | |||
802.11 Authentication Methods | 00:26:00 | ||
802.1X | 00:20:00 | ||
EAP | 00:25:00 | ||
Certified Authority Server Credentials | 00:06:00 | ||
Dynamic Encryption Key Generation | |||
Dynamic Encryption Key Generation | 00:21:00 | ||
Authentication and Key Management | 00:13:00 | ||
RSNA Key Hierarchy | 00:12:00 | ||
EAP | 00:05:00 | ||
Information Elements | 00:06:00 | ||
SOHO 802.11 Security | |||
SOHO 802.11 Security | 00:26:00 | ||
Cracking Hashes | 00:09:00 | ||
Cracking Hashes | 00:09:00 | ||
Fast Secure Roaming | |||
Fast Secure Roaming | 00:24:00 | ||
PMKSA | 00:29:00 | ||
FT Key Hierarchy (e-notes) | 00:30:00 | ||
802.11K-2008 | 00:28:00 | ||
Wireless Security Risks | |||
Wireless Security Risks | 00:22:00 | ||
Authentication Attacks | 00:20:00 | ||
Rogue Devices | 00:04:00 | ||
Public Hotspots | 00:06:00 | ||
Wireless LAN Security Auditing | |||
Wireless LAN Security Auditing | 00:28:00 | ||
Wireless Security Monitoring | |||
Wireless Security Monitoring | 00:21:00 | ||
Device Tracking | 00:17:00 | ||
VPNs, Remote Access and Guest Access Services | |||
VPNs, Remote Access and Guest Access Services | 00:23:00 | ||
Remote Access | 00:14:00 | ||
WLAN Security Infrastructure | |||
WLAN Security Infrastructure | 00:37:00 | ||
Management Protocols | 00:23:00 | ||
Other RADIUS Solutions | 00:15:00 | ||
Wireless Security Policies | |||
Wireless Security Policies | 00:17:00 | ||
Other Policies | 00:14:00 | ||
Order Your Certificates and Transcripts | |||
Order Your Certificates and Transcripts | 00:00:00 |