CWNA-108-9 Topics Crossreference CWP-Sybec
CWNA-108-9 Topics Crossreference CWP-Sybec
CWNA-108-9 Topics Crossreference CWP-Sybec
Objectives
Data used
About Topics
IMPORTANT NOTES
Notes
ross Index File to books
martin.ericson@gmail.com
When studying for CWNA the amount of topics will overwhelm you. Depending on background skills you may
want to jump some of the topics already known. Studies should be targeting topics that are new for the
student and also those that are difficult to grasp after first reading.
One way is to keep track of the topics known in the objectives list for the exam and the ones that requires
deeper studies.
When reviewing the topics list, keep track of where the corresponding discussion of the topics are find in the
material at hands. For this reason I have created an Excel spreadsheet that link the Objectives to the
corresponding pages in the more common material available fot students.
Feel free to use this spreadsheet as a tool in any way you like to prepare for your exam. Add columns and
markers as you like. Maybe a column for time spent, chapter Q&A results etc.
There is a difference how the topics are laid out acroos the texts. The difference makes it a little difficult to
match the content in the books with the Objectives. The following discusses some observations.
Not all objectives has a corresponding slide. Some objectives has sub-objectives and those are market with a
bullet.
Some text in the Certitrek Study Guide is not covered at all in the Class Guide. There is more room for
discussion in the Study Guide.
The major objectives includes slides that discusses content that are not easy to match to an objective.
For those slides an extra topic has been added to the objectives list and marked with yellow background
color.
The CWNA 108 "Bible" from Sybex covers many additional topics that are valuable to know by a WLAN
engineer. Some of them are objectives in the exam but has a deeper level of content. Some of them are not
part of the exam at all, but are covered anyway. Those topics has been listed in the index with a grey
background color.
The CWNA 108 "Bible" from Sybex uses the CWNA-108 Objectives which to large parts are the same as the
109 Objectives. The major difference in the 109, is the renaming and merging of the 2 last knowledge
domains from 108. PLEASE OBSERVE THAT WHEN READING THE SYBEX BIBLE
There are topics that could not be matched across the sources, those are marked with a hyphen (-). Topics
that are difficult to find in the text are marked with a (?). This topics may also be missed.
ERATA
CWNA-109 Slide deck
1.4 Explain and apply the functionality of RF antennas, antenna systems, and accessories available
• Omni-directional antennas
• Semi-directional antennas
• Highly directional antennas
• Reading Azimuth and Elevation charts for different antenna types
• Antenna orientation
• RF cables and connectors
• Lightning arrestors and grounding rods/wires
Antenna Mounting
Antenna Mounting Accessories
AP Mounting Enclosures
Directional Antenna Arrays
RF Splitter
Amplifiers-Attenuaters
2.2 Explain and apply the various Physical Layer (PHY) solutions of the IEEE 802.11-2016
standard as amended including supported channel widths, spatial streams, data rates.
• DSSS – 802.11
• HR-DSSS – 802.11b
• OFDM – 802.11a
• ERP – 802.11g
• Wi-Fi 4 - HT – 802.11n
• Wi-Fi 5 - VHT – 802.11ac
• Wi-Fi 6 - HE - 802.11ax
802.11 Amendments
S1G, DMG, and TVHT
ISM
2,4 GHz Channels
5 GHz U-NII Bands
5 GHz Channels
WiFI 6E &6 GHz
6 GHz Channels
LTE 5 GHz
6 GHz Incumbents
2.3 Understand spread spectrum technologies, Modulation and Coding Schemes (MCS)
Basic Type of Modulation ASK. FSK. PSK
• DSSS
• OFDM
• OFDMA and Resource Units
• BPSK
• QPSK
• QAM (16, 64, 256,1024)
Coding Methods and MCS
Co-Location/Co-Channel Interference
Narrowband and Spread Spectrum
Frequncy Hopping
Transmit Spectrum Mask DSSS, OFDM
2.5 Describe the OSI model layers affected by the 802.11-2016 standard and amendments
2.6 Identify and comply with regulatory domain requirements and constraints (specifically in 2.4
GHz and 5 GHz) bands used by the 802.11 PHYs
• Frequency
• Available channels
• Regulatory power constraints
• Dynamic Frequency Selection (DFS)
• Transmit Power Control (TPC)
Channel Comparison
2.7 Explain basic use case scenarios for 802.11 wireless networks
• Wireless LAN (WLAN) – BSS and ESS
• Wireless bridging
• Wireless Ad-Hoc (IBSS)
• Wireless Mesh
Personal Basic Service Set WPAN
3.1 Describe the components and functions that make up an 802.11 wireless service set
• Stations (STAs)
Access Points Station and IS
• Basic Service Set (BSS) (Infrastructure mode)
• SSID
• BSSID
• Extended Service Set (ESS)
• IBSS (Ad-Hoc)
• Distribution System (DS)
• Distribution System Media (DSM)
Access Points Modes
Client Station Modes
3.4 Identify and explain the purpose of the three main 802.11 frame types
• Management
• Control
• Data
Action Frames
3.5 Explain the process used to locate and connect to a WLAN
• Scanning (active and passive)
• Authentication
• Association
• Open System Authentication and Shared Key authentication
• Connecting to 802.1X/EAP and Pre-Shared Key authentication networks
• BSS selection
• Connecting to hidden SSIDs
4-Way Handshake
ACK Block ACK
802.11 State Machine
Basic and Supported Rates
Reassociation
Disassociation, Deauthentication
PS-Poll
3.8 Describe features of, select, and install WLAN devices, control, and management systems )
• Access Points (APs)
• WLAN controllers
• Wireless network management systems
• Wireless bridge and mesh APs
• Client devices
Client Configuration
Wireless Monitoring Systems
Home WLAN Routers
4.1 Describe and implement Power over Ethernet (PoE) 802.3af, 802.3at, 802.3bt
• Power Source Equipment
• Powered Device
• Midspan and endpoint PSEs
• Power classes to include power differences between PSE and PD
• Power budgets and powered port density
Planning and Deploying PoE
4.2 Define and describe differences, advantages and constraints of the different wireless
LAN architectures
• Centralized data forwarding
• Distributed data forwarding
• Control, Management and Data planes
• Scalability and availability solutions
• Tunneling, QoS and VLANs
Core, Distribution and Access Layer Forwarding
Controller Based
Cloud-Based Model
Distributed Model, Hybrid
Controller-Less (Autonomous) Model
Remote Offfice Controllers
Enterprise WLAN Routers
Appliction Programming Interface
Split Mac
4.5 Determine and configure required network services supporting the wireless network
• DHCP for client addressing, AP addressing and/or controller discovery
• AirTime Fairness,
• DNS for address resolution for clients and APs
• Time synchronization protocols (e.g. NTP, SNTP)
• VLANs for segmentation
• Authentication services (e.g. RADIUS, LDAP)
• Access Control Lists for segmentation
• Wired network capacity requirements
Network Acces Control NAC
5.1 Identify weak security options that should not be used in enterprise WLANs
• WEP
• Shared Key authentication
• SSID hiding as a security mechanism
• MAC filtering
• Use of deprecated security methods (e.g. WPA and/or WPA2 with TKIP)
• Wi-Fi Protected Setup (WPS)
5.2 Identify and configure effective security mechanisms for enterprise WLANs
AAA
CIA
Robust Security Network
• Application of AES with CCMP for encryption and integrity
• WPA2-Personal including limitations and best practices for pre-shared (PSK) use
• WPA2-Enterprise -configuring wireless networks to use 802.1X including connecting to
RADIUS servers and appropriate EAP methods
Per-User PSK (PPSK)
SSO, Saml, Oauth
5.3 Understand basic concepts of WPA3 and Opportunistic Wireless Encryption (OWE) and
enhancements compared to WPA2
• Understand basic security enhancements in WPA3 vs. WPA2
• Understand basic security enhancements of encryption and integrity in WPA3 (e.g.
CCMP, GCMP, AES)
• Simultaneous Authentication of Equals (SAE) in WPA3 as an enhancement for legacy
pre-shared key technology
• Understand the purpose of Opportunistic Wireless Encryption (OWE) for public and
guest networks
6 GHz 802.11ax Security Requirements
5.4 Describe common security options and tools used in wireless networks
• Access control solutions (e.g. captive portals, NAC, BYOD)
• Protected management frames 811-819
• Fast Secure Roaming methods
• Wireless Intrusion Prevention System (WIPS) and/or rogue AP detection
• Protocol and spectrum analyzers
• Best practices in secure management protocols (e.g. encrypted management HTTPS,
SNMPv3, SSH2, VPN and password management)
RBACK
Wireless Security Policies
Wireless Attacks
Rogue Wireless Devices
Peer-to-peer attacks
Eavesdropping
Encryption cracking
KRACK Attakc
KrOOk vulnarbility
Authentication Attacks
MAC Spoofing
Management Interface exploits
Wireless Hijacking
DOS Attacks
Vendor Specific Attacks
Social Engineering
6.1 Verify and document that design requirements are met including coverage, throughput,
roaming, and connectivity with a post-implementation validation survey
RF Survey Defined
Survey Process
Validation Survey
Legacy AP on a Stick
Predictive design
Hybrid Survey
Document and reports
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
ies available 157
84-86 101-103 134-136 158-160
87-88 104-105 137-139 152-154
89-92 106-110 139-140 164-167
82-83 99-100 126-127 150-152
78, 93-94,99,107 129 128-129 161-164, 185
109-112 131-134 148-150 188-189
114-115 136-137 145-146 191-192
107-108 111,129-130 142,147-148 181-183
93 112 147 184-185
94 113 245 183
100-101 119-120 140 167-169
110 132 150 189
- - 143-145 189-190
Slide # Class Guide page Self Study page Sybex 108 page
6 7 5 5
10-14 11-1 6 14-15,23-25 8
21-22 27-29 16-22 11-21, 400-402
7-8 8-9 22-23 9-10
9,148 10,175 7-11 5-6
- - 12 6-7
25-26 32-33 30 302-303
151 179 33-35 248-250
Slide # Class Guide page Self Study page Sybex 108 page
129 153
119,121,130, 17-18, 143,154 170 42-43
15,119,121,130 17-18, 143,154 171-172 46
15,120,122,131 17-18, 143,155 173 45-
15,121,131 17-18, 143,155 174 48-50
15,121-122,131 17-18, 143,156 175-177 54
16,120,122,133 19,157 178 59-60
17,127,135 20,159 179-180 64, 834-, 864-866
18-20 21-24 26-28 47, 50-54, 55-59
134,136 158,160 180-183 60-62,
- - - 218-219
119 141 193 224-
- - - 220-223
120 142 194- 227-230
- - - 223
127 151 197 232-235
- - - 231
- - - 235-239
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
128 152 158-168 21-22, 299
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
? ? 199 251-252
- - - 252
152 180 200 255-258
153 181 205 256
153 181 205 258-260
152-153 180-181 203 261-
152 180 202 262
153 181 206 253
153 181 206 254
- 180 201, 203-205, 229-2267
152 - - 269
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Ch 8 Ch 8
210-212 248-249 320 276-278
212,218 250, 257 320-321 278-280
218 258-259 326- 286-288
224-225 265-266 331-333 338
224 265 332
214 252 323-324 280-282
215 253-254 287-288 285-286
213 251-252 322-323 279-281
224,334 265, 386 505 641645
216 255-256 323-325 283-284
219 260 326 288
220 261 327 287
221 262 326 288-289
222 222 333 855-860
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
464
23, 184 30,215 256 469-470
184 215 256 467-469
186 217 256-258 470-483
185 216 259-260 469
187 218 257 484-490
- - - 484-490
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
729-
283 328 402-406 731-734
283 328 406-407 731
284 329-330 408 735-736
284 329-330 408 735
283 328 409 755
284 329 411 17-18,
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
688-
- - - 689-691
- - - 692
- - - 693-697
- - - 697
- - - 698
- - - 698
- - - 699-700
- - - 701
- - - 701
- - - 702-703
- - - 703-705
- - - 705
- - - 706
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Slide # Class Guide page Self Study page Sybex 108 page
Isotropic Radiator
Cyclic Shift Diversity
1.4 Explain and apply the functionality of RF antennas, antenna systems, and accessories available
1.4.1 • Omni-directional antennas
1.4.2 • Semi-directional antennas
1.4.3 • Highly directional antennas
1.4.4 • Reading Azimuth and Elevation charts for different antenna types
1.4.5 • Antenna orientation
1.4.6 • RF cables and connectors
1.4.7 • Lightning arrestors and grounding rods/wires
1.4.8 Antenna Mounting
1.4.8 Antenna Mounting Accessories
1.4.8 AP Mounting Enclosures
N/A Directional Antenna Arrays
N/A RF Splitter
N/A Amplifiers-Attenuaters
2.2 Explain and apply the various Physical Layer (PHY) solutions of the IEEE 802.11-2016
standard as amended including supported channel widths, spatial streams, data rates.
2.2.1 • DSSS – 802.11
2.2.2 • HR-DSSS – 802.11b
2.2.3 • OFDM – 802.11a
2.2.4 • ERP – 802.11g
2.2.5 • Wi-Fi 4 - HT – 802.11n
2.2.6 • Wi-Fi 5 - VHT – 802.11ac
2.2.7 • Wi-Fi 6 - HE - 802.11ax
2.2.8 • Wi-Fi 6E - HE - 802.11ax 6GHz
802.11 Amendments
S1G, DMG, and TVHT
ISM
2,4 GHz Channels
5 GHz U-NII Bands
5 GHz Channels
WiFI 6E &6 GHz
6 GHz Channels
LTE 5 GHz
6 GHz Incumbents
2.3 Understand spread spectrum technologies, Modulation and Coding Schemes (MCS)
Basic Type of Modulation ASK. FSK. PSK
2.3.1 • DSSS
2.3.2 • OFDM
2.3.3 • OFDMA and Resource Units
2.3.4 • BPSK
2.3.5 • QPSK
2.3.6 • QAM (16, 64, 256,1024)
Coding Methods and MCS
Co-Location/Co-Channel Interference
Narrowband and Spread Spectrum
Frequncy Hopping
Transmit Spectrum Mask DSSS, OFDM
2.5 Describe the OSI model layers affected by the 802.11-2016 standard and amendments
2.6 Identify and comply with regulatory domain requirements and constraints (specifically in 2.4
GHz and 5 GHz) bands used by the 802.11 PHYs
2.6.1 • Frequency
2.6.2 • Available channels
2.6.3 • Regulatory power constraints
2.6.4 Indoor, outdoor deployments and implementation variants
2.6.5 • Dynamic Frequency Selection (DFS)
2.6.6 • Transmit Power Control (TPC)
Channel Comparison
2.7 Explain basic use case scenarios for 802.11 wireless networks
2.7.1 • Wireless LAN (WLAN) – BSS and ESS
2.7.2 • Wireless bridging
2.7.3 • Wireless Ad-Hoc (IBSS)
2.7.4 • Wireless Mesh
Personal Basic Service Set WPAN
3.4 Identify and explain the purpose of the three main 802.11 frame types
3.4.1 • Management
3.4.2 • Control
3.4.3 • Data
Action Frames
Backoff Timer
Access Categories
Transmission Queues
WMM
BSS Color
3.8 Describe features of, select, and install WLAN devices, control, and management systems )
3.8.1 • Access Points (APs)
3.8.2 • WLAN controllers
3.8.3 • Wireless network management systems
3.8.4 • Wireless bridge and mesh APs
3.8.5 • Client devices
Client Configuration
Wireless Monitoring Systems
Home WLAN Routers
4.2 Define and describe differences, advantages and constraints of the different wireless
LAN architectures
4.2.1 • Centralized data forwarding
4.2.2 • Distributed data forwarding
4.2.3 • Control, Management and Data planes
4.2.4 • Scalability and availability solutions
4.2.5 • Tunneling, QoS and VLANs
Core, Distribution and Access Layer Forwarding
Controller Based
Cloud-Based Model
Distributed Model, Hybrid
Controller-Less (Autonomous) Model
Remote Offfice Controllers
Enterprise WLAN Routers
Appliction Programming Interface
Split Mac
4.5 Determine and configure required network services supporting the wireless network
4.5.1 • DHCP for client addressing, AP addressing and/or controller discovery
4.5.2 • DNS for address resolution for clients and APs
4.5.3 • Time synchronization protocols (e.g. NTP, SNTP)
4.5.4 • VLANs for segmentation
4.5.5 • Authentication services (e.g. RADIUS, LDAP)
4.5.6 • Access Control Lists for segmentation
4.5.7 • Wired network capacity requirements
Network Acces Control NAC
5.2 Identify and configure effective security mechanisms for enterprise WLANs
AAA
CIA
Robust Security Network
5.2.1 • Application of AES with CCMP for encryption and integrity
5.2.2 • WPA2-Personal including limitations and best practices for pre-shared (PSK) use
• WPA2-Enterprise -configuring wireless networks to use 802.1X including connecting to
5.2.3
RADIUS servers and appropriate EAP methods
Per-User PSK (PPSK)
SSO, Saml, Oauth
5.3 Understand basic concepts of WPA3 and Opportunistic Wireless Encryption (OWE) and
enhancements compared to WPA2
5.3.1 • Understand basic security enhancements in WPA3 vs. WPA2
• Understand basic security enhancements of encryption and integrity in WPA3 (e.g.
5.3.2 CCMP, GCMP, AES)
• Simultaneous Authentication of Equals (SAE) in WPA3 as an enhancement for legacy
5.3.3 pre-shared key technology
5.3.4 • Opportunistic Wireless Encryption (OWE) for public and guest networks
6 GHz 802.11ax Security Requirements
5.4 Describe common security options and tools used in wireless networks
5.4.1 • Access control solutions (e.g. captive portals, NAC, BYOD)
5.4.2 • Protected management frames 811-819
5.4.3 • Fast Secure Roaming methods
5.4.4 • Wireless Intrusion Prevention System (WIPS) and/or rogue AP detection
5.4.5 • Protocol and spectrum analyzers
• Best practices in secure management protocols (e.g. encrypted management HTTPS,
5.4.6
SNMPv3, SSH2, VPN and password management)
RBACK
Wireless Security Policies
Wireless Attacks
Rogue Wireless Devices
Peer-to-peer attacks
Eavesdropping
Encryption cracking
KRACK Attakc
KrOOk vulnarbility
Authentication Attacks
MAC Spoofing
Management Interface exploits
Wireless Hijacking
DOS Attacks
Vendor Specific Attacks
Social Engineering
34
28-34 36-44 25-27, 72-86
47 59 87-88
38-41 48-51 89-93
44,46 54-55, 58 98-100, 204
25-36 45-46 101
65 74-75 101
37 47 94-98
42-43 52-53 88
113 137 175
113 137 176
48,106-107 60, 129-131 122
49 61 102
50 62 102
26-27 35-36 71
82 103 113
- 368
3-4 4-5 5
8-11 8-14 8
19-20 27-29 11-21, 400-402
5-6 6-7 9-10
7 8,175 5-6
- - 6-7
22-24 32-33 302-303
116 153
119,121,130, 17-20, 141, 156, 42-43
13,119,121,130 17-20, 141, 156 46
13,120,122,131 17-20, 141, 157 45-
13,121,131 17-20, 141, 157 48-50
13,121-122,131 17-20, 141, 158 54
14,120,122,133 19, 141, 159 59-60
15,127,135 20,141, 159, 161 64, 834-, 864-866
15
16-18 21-26 47, 50-54, 55-59
134,136 160,162 60-62,
- - 218-219
119,121 143, 145 224-
- - 220-223
120,122 144, 146 227-230
- - 223
127 153 232-235
- - 231
- - 235-239
52 64,162-165 28-31
51 63 208-209
56 69-70,166-167 211-213
57-58 71-73 838-851
53 65-66 213
53 65-66 213
54-55 67-68 213-214, 384-387, 862
59-60 74-75 208, 212, 394-399
138 165 516-519
51 63 202-203
51 63 205-207
136 383 210, 216-217
171
117-118 141-142 224-230
119-120,127 143-146, 153 225,227
143 175 5,
275 318-332
275 333-341
275 341-344
- - 331
Ch 8
205 242 276-278
206, 210-211 243, 250 278-280
212 251-252 286-288
218-219 256-259 338
219 265
208 252 280-282
209 246-247 285-286
207 244-245 279-281
302-304 359-363
301 347-348 572
301 348-350 573-582
351 599
- - 585
310 370 597
- - 595
304 352 609-614