iot training course

Learn the essential skills to design, implement, and manage Enterprise Ethernet LANs with our comprehensive training course. Gain in-depth knowledge of Ethernet technologies, network architecture, and best practices for optimizing LAN performance.

Develop practical skills in configuring switches, routers, and other network devices to ensure seamless connectivity and efficient data transfer across the LAN. Elevate your expertise in troubleshooting common LAN issues and implementing security measures to protect sensitive data.

With hands-on exercises and real-world case studies, this course equips you to excel in managing large-scale LAN infrastructures. Take your career to the next level and become a proficient Enterprise Ethernet LAN professional.

Enterprise LAN Ethernet Training Course

  • Overview of OSI Model
  1. Technologies at each layer · Concepts & Protocols
  • Ethernet 10/100/1000 Mbps Standards
  1. MAC Rules
  2. Collision & Broadcast Domains, Half-Duplex vs. Full-Duplex operations
  3. Auto-Negotiation
  4. Comparisons among Ethernet Standards, IFG, FLP, NLP, MII, GMII
  5. Hubs Vs. Switches
  • Multi Segments Configuration Guidelines
  • Performance & Error Statistics
  • Switched Networking
  1. Switching Architectures, Working, Types of Switches, Configurations
  2. Spanning Tree Protocol ( STP ) for loop resolutions
  3. Link Aggregation, Handling Multicasts, Tagging, Rules & Frame Distribution
  4. VLAN concepts, priority operation
  5. Internal Architecture of a Switch (Ports / Fabrics / Filters / Data Paths )
  6. Switch Management

LAN Technology Trends

WIRELESS LANs

Introduction

History, standards.

  • RF fundamentals

What is RF? Wavelength, Frequency, Amplitude, Phase. Wave behaviour. RF components. Watts, mW, dB, SNR, Link budgets.
Spectrum analysis. Listing WiFi networks. WiFi connection. inSSIDer.

Antennas

Radiation envelopes, polar charts, gain, Antenna types. Line of Sight, MIMO.
Connecting, installing, changing antennae. RSSI values.

802.11

802.11-2007, 802.11 post 2007, 802.11 drafts. 802.11 b/g/n.
WiFi performance measurement.

Spread Spectrum

RF frequency bands, FHSS, DSSS, OFDM. Channels.
Configuring channels.

Topologies

Mesh, Access points, distribution systems, SSID.
AP configuration. Client connection profiles.

802.11 MAC

CSMA/CA, Management frames, control frames, data frames. Passive scanning, active scanning. Open system authentication. Shared Key authentication. Association. RTS/CTS. Power management.
Capturing frames, analysing frames.

WiFi architecture

WiFi client, WLAN architecture: Autonomous, Centralised, distributed. WiFi bridges. WiFi routers. PoE.
WLAN controllers.

Troubleshooting

RF interference, multipath, adjacent channels, low SNR, mismatched power. Coverage, capacity.

802.11 Security

Basics, Legacy security: WEP, MAC filters, SSID cloaking. PSK, 8021.X/EAP, WPA/WPA2. TKIP/ CCMP encryption. Guest WLANs. Wireless attacks, intrusion monitoring.
WEP cracking, WPA2 configuration. RADIUS.

RF Site surveys

Protocol and spectrum analysis, coverage analysis. Site survey tools.
Performing a site survey.

WIRELESS LAN SECURITY

WLAN Security overview

Standards, security basics, AAA, 802.11 security history.
WLAN connectivity.

Legacy 802.11 security

Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking.
Analysing 802.11 frame exchanges, viewing hidden SSIDs.

Encryption

Basics, AES, TKIP, CCMP, WPA, WPA2.
Decrypting 802.11 data frames.

802.11 layer 2 authentication

802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST.
Analysing 802.1X/EAP frames.

802.11 layer 2 dynamic key generation

Robust Security Network.
Authentication and key management.

SOHO 802.11 security

WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS).
PSK mapping.

WLAN security infrastructure

DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC.
802.1X/EAP configuration. RADIUS configuration.

802.11 Fast secure roaming

History, RSNA, OKC, Fast BSS transition, 802.11k.
Roaming.

Wireless security risks

Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots.
Backtrack.

WiFi security auditing

Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools.

WiFi security monitoring

Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w.
Laptop spectrum analysers.

VPNs, remote access, guest access

Role of VPNs in 802.11, remote access, hotspots, captive portal.

Wireless security policies

General policy, functional policy, recommendations.

WHY JOIN OUR TRINING COURSE ….

Discover advanced networking skills with Enterprise Ethernet LAN training. Join now to enhance your expertise and drive business growth.

Master Enterprise Ethernet LAN with expert-led training. Enroll today to boost your career and stay ahead in the competitive IT industry.

Unlock the power of Enterprise Ethernet LAN through specialized training. Enroll now and gain the in-demand skills for professional success.

Take your networking knowledge to the next level with Enterprise Ethernet LAN training. Sign up today and accelerate your career prospects.

Gain a competitive edge with Enterprise Ethernet LAN training. Enroll now to develop essential skills and excel in the IT field.

Discover advanced networking skills with Enterprise Ethernet LAN training. Join now to enhance your expertise and drive business growth.

Master Enterprise Ethernet LAN with expert-led training. Enroll today to boost your career and stay ahead in the competitive IT industry.

Discover advanced networking skills with Enterprise Ethernet LAN training. Join now to enhance your expertise and drive business growth.

Master Enterprise Ethernet LAN with expert-led training. Enroll today to boost your career and stay ahead in the competitive IT industry.