Wireless Networking for the IT Professional. Now Available at Interface Technical Training

Home > Blogs > Cisco > Wireless Networking for the IT Professional. Now Available at Interface Technical Training

Wireless Networking for the IT Professional. Now Available at Interface Technical Training

Like This Blog 0 Dr. Avril Salter
Added by January 21, 2015

Why IT professionals need to understand wireless

Wireless networks are becoming increasingly more important to all organizations, from  mall mom and pop stores, to major corporations. It is forecasted that by 2018 wireless devices will account for 61% of IP traffic, greatly exceeding traffic from wired devices, which will reduced to a mere 39% of IP traffic. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013–2018.  The growth in smartphones and tablets connected to Wi-Fi networks has taken the industry by surprise. Today, smartphones send over 4 times more data over Wi-Fi than cellular, and these figure are set to grow. This has led to many organizations implementing “bring your own device” (BYOD) policies, to allow employees to connect their personal devices to the enterprise network.


As wireless networks become increasingly prevalent, it becomes critical that IT professional have a rudimentary understanding of wireless networks. With this in mind, Interface is offering a new course offering titled “Wireless for the IT Professional”.

What is exceptional about this new course offering?
There are three things that make this course exceptional: A world-renown instructor, a course syllabus that focuses on the IT lifecycle, and a unique opportunity to discuss and resolve real world problems

World-Renown Instructor:
Dr. Avril Salter has worked on Wireless LANs since 1992, five years before the first 802.11 Wi-Fi specifications were finalized. She developed her in-depth understanding of wireless while working for Motorola. Since then she has worked for Intel and Microsoft. She has taught Wi-Fi courses at Cisco since 2002, and has published an advanced wireless certification book with HP Press. Dr. Salter is well known for her ability to solve some of the most complex Wi-Fi implementation challenges.

What You Will Learn:
The course is focused around the IT lifecycle. This is distinct from other wireless courses which focus on certifications or how to implement a specific vendor’s wireless products.


The course starts by making sure the learner understands the radio concepts essential for planning and designing a wireless network. Key concepts range from assigning channel frequencies to determining sources of interference and calculating link budgets. It takes the learner through Wi-Fi operations including Quality of Service (QoS), equipping them with the knowledge to enable them to effectively configure Wi-Fi for their specific work environment Wireless brings the advantage of flexibility, convenience and improved productivity to the organization, but it comes with risks such as eavesdropping, unauthorized access, and rogue Access Points. For that reason, learners will walk through the different security options available for Wi-Fi networks and discuss how to select the right security mechanisms for an enterprise’s unique needs. Students will experience different types of wireless attacks, such as eavesdropping, Denial of Service (DOS) attacks, and Rogue Access Points (APs). They will learn how the Wi-Fi mechanisms provide (or do not provide) countermeasures to obviate these attacks.

Students will learn the best practices for troubleshooting wireless networks. Learners are given real-life problems and will be expected to use the tools and techniques used in the course to troubleshoot and identify these problems. Tools include the use of Wireshark to analyze wireless packet captures and a spectrum analyzer to assess interference and physical layer activities.

The course ends with a discussion on how high data rates and high capacity networks can be achieved and sustained in a live environment. Both 802.11n and the newer 802.11ac technologies will be covered in depth.
Real-World Problems:
Students are encouraged to bring into the classroom their wireless issues, for discussion and resolution. The instructor, Dr. Avril Salter, will guide the student in taking the material they are learning through the week and applying it to these real-life problems.


This technique not only reinforces the students learning, but most importantly enables the student to immediately be more effective in their job function.

Register for this course today.

WIRE400: Wireless Networking for the IT Professional
5-Day course at Interface Technical Training in Phoenix, Arizona.
Learn how to take control of your enterprises Wi-Fi network. In this 5-day hands-on course, you will learn how to plan, configure, deploy and manage a wireless network, secure and troubleshoot interference sources, identify and analyze Wi-Fi packets in Wireshark for data transfer. This course finishes with an overview of the latest next generation in Wi-Fi product enhancements for enterprise and end-users.

Videos You May Like

Creating Users and Managing Passwords in Microsoft Office 365

0 645 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Windows 10 Features and Navigation – December 1, 2015

0 114 1

In this recorded Windows 10 webinar from December 1,2015, Windows Instructor Steve Fullmer presents the navigation and some of the new features associated with Windows 10 including Sysinternals Tools for Windows Client, Windows core concepts, exploring Process Explorer as well as some of the features that are not yet ready for prime time but will … Continue reading Windows 10 Features and Navigation – December 1, 2015

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.