CellStream, Inc. - Telecom Consulting and Training!
2-Day Instructor Led Hands On Lab Class Available in either Web Based delivery or On-Site Delivery Minimum 10 students - Maximum 20 students
Knowing the fundamentals of Wi-Fi 6 and Security as these subjects pertain to Wi-Fi/Wireless LAN Operations is vital to anyone who is in the networking field today, whether it be Service Provider level or Enterprise level, especially considering the need to support wireless access technologies by Field Operations, Customer Service, and IT departments. This insightful and revealing course has been designed to focus on the operational aspects of implementing and maintaining a Wi-Fi/WLAN deployment with a focus on Wi-Fi 6 and Security combined.
This course will help you understand how Wi-Fi/WLAN networks operate. We will focus on 802.11 functions, and we will define terms and acronyms along the way. We will discuss what can go wrong in Wi-Fi/WLAN networks. In the end, the students will be able to better troubleshoot and communicate with peers and customers.
The course is a combination of knowledge training, systems analysis, with hands-on exercises using a variety of tools in a swift, comprehensive, and understandable way.
"What is the difference between Wi-Fi 6 and its predecessors?" "What do I need to know about Wi-Fi 6 deployment" "What must I know about WLAN deployment options that will affect the network operation?" "What tools exist to help me analyze and design the best WLAN implementation?" "How do I properly configure WLAN equipment to improve customer satisfaction?" "What are the security issues with Wi-Fi networks?" "What can I, and my customers, do to be more secure on Wi-Fi?"
The objectives of the course are to:
Understand Wi-Fi 6
Be able to explain the differences between Wi-Fi 6 and its predecessors
Be aware and able to communicate Wi-Fi security issues
Understand what hackers do to WLAN/Wi-Fi networks, and how they do it
Develop a "hands-on" skill set targeted at WLAN/Wi-Fi Security in the following key areas:
Security vulnerabilities and attack methods
Improve customer trust, security, and satisfaction by sharing the knowledge and skills to mitigate security risks
Deepen wireless networking knowledge and understanding
These objectives are met by covering the necessary technical bases in a straight forward manner, by keep the content in context of the objectives - connecting the dots. Utilizing a short, subject specific architecture with exercises to drive home key points and Hands-On experience that reveal these points builds skills and knowledge based on Bloom's Taxonomy. Presentation is industry current and up-to-date using a technology specialists.
The target audience for this course is anyone in the telecommunications field that requires a solid understanding of the fundamental security in WLAN/Wi-Fi networks, and desires hands-on skills that can be applied to their job function. Ideal candidates are:
Central Office Technicians, Engineers, and Supervisors
Line Technicians, and Customer Service Technicians
Operations individuals that will provide IP configuration and support services
Development Engineers that must know TCP/IP networking in order to provide hardware and software solutions
Network Design Engineers that need to understand TCP/IP services and applications
Network Management individuals that are providing element and network management tools
Network Administrators and IT professionals
Technical sales individuals that must be able to correlate features with functionality
Technical marketing individuals that want more than just a basic understanding of IP
Certification Track individuals that need to expand their knowledge and studies
This course appeals to anyone needing the skills and knowledge of Wi-Fi 6 and WLAN's. The ideal student will have some experience in Wireless networking and operations, however no prior knowledge is necessary.
All students must attend with a lap-top computer in order to execute the Lab Exercises. Wireshark must be installed and operational. If the course is held at a classroom where computers are available, the Lap-top computer will not be required.
Students will be provided with a Course Student Guide.
There are several related courses that explore tangential technical aspects. These include: