Free Download Wireless Network Fundamentals Zero-To-Hero
Published 3/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.42 GB | Duration: 22h 11m
Wireless LAN (WLAN)
Free Download What you’ll learn
RF Signals and Modulation
RF Standards
RF Signals in the Real World
Understanding Antennas
Wireless LAN Topologies
Understanding 802.11 Frame Types
Planning Coverage with Wireless APs
Understanding Cisco Wireless Architectures
Implementing Autonomous and Cloud Deployments
Implementing Controller-based Deployments
Understanding Controller Discovery
Understanding Roaming
Understanding RRM
Wireless Security Fundamentals
Configuring a WLAN
Implementing a Wireless Guest Network
Configuring Client Connectivity
Managing Cisco Wireless Networks
Dealing with Wireless Interference
Troubleshooting WLAN Connectivity
Requirements
This course doesn’t have formal prerequisite.
Description
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network. Through a gateway, a WLAN can also provide a connection to the wider Internet.Wireless LANs based on the IEEE 802.11 standards are the most widely used computer networks in the world. These are commonly called Wi-Fi, which is a trademark belonging to the Wi-Fi Alliance. They are used for home and small office networks that link together laptop computers, printers, smartphones, Web TVs and gaming devices with a wireless router, which links them to the internet. Hotspots provided by routers at restaurants, coffee shops, hotels, libraries, and airports allow consumers to access the internet with portable wireless devices.The IEEE 802.11 has two basic modes of operation: infrastructure and ad hoc mode. In ad hoc mode, mobile units communicate directly peer-to-peer. In infrastructure mode, mobile units communicate through a wireless access point (WAP) that also serves as a bridge to other networks such as a local area network or the Internet.Since wireless communication uses a more open medium for communication in comparison to wired LANs, the 802.11 designers also included encryption mechanisms: Wired Equivalent Privacy (WEP), no longer considered secure, Wi-Fi Protected Access (WPA, WPA2, WPA3), to secure wireless computer networks. Many access points will also offer Wi-Fi Protected Setup, a quick, but no longer considered secure, method of joining a new device to an encrypted network.
Overview
Section 1: RF Signals and Modulation
Lecture 1 Comparing Wired and Wireless Networks
Lecture 2 Understanding Basic Wireless Theory
Lecture 3 Carrying Data Over an RF Signal
Section 2: RF Standards
Lecture 4 Regulatory Bodies
Lecture 5 IEEE Standards Body
Lecture 6 IEEE 802.11 Channel Use
Lecture 7 IEEE 802.11 Standards
Lecture 8 Radio Frequency[RF] and Wireless Bands and Standards
Lecture 9 Wi-Fi Alliance
Section 3: RF Signals in the Real World
Lecture 10 Interference
Lecture 11 Free Space Path Loss
Lecture 12 Effects of Physical Objects
Section 4: Understanding Antennas
Lecture 13 Antenna Characteristics
Lecture 14 Antenna Types
Lecture 15 Antenna Accessories
Section 5: Wireless LAN Topologies
Lecture 16 Types of Wireless Networks
Lecture 17 Fundamentals of Wireless Networks
Lecture 18 Wireless LAN Topologies
Lecture 19 Other Wireless Topologies
Section 6: Understanding 802.11 Frame Types
Lecture 20 IEEE 802.11 Frame Types and Addressing
Lecture 21 Accessing the Wireless Medium
Lecture 22 IEEE 802.11 Frame Types
Lecture 23 Client Housekeeping
Section 7: Planning Coverage with Wireless APs
Lecture 24 AP Cell Size
Lecture 25 Adding APs to an ESS
Lecture 26 Designing and Validating Coverage with Site Surveys
Section 8: Understanding Cisco Wireless Architectures
Lecture 27 Autonomous and Cloud-Based
Lecture 28 Cisco Wireless Architectures
Lecture 29 Split MAC and AP Modes
Lecture 30 Cisco Wireless Network Building Blocks
Section 9: Implementing Autonomous and Cloud Deployments
Lecture 31 Implementing Autonomous AP
Lecture 32 Implementing Cloud-Based AP
Section 10: Implementing Controller-based Deployments
Lecture 33 Connecting a Centralized Controller
Section 11: Understanding Controller Discovery
Lecture 34 Understanding Controller Discovery
Lecture 35 Designing High Availability
Section 12: Understanding Roaming
Lecture 36 Roaming Overview
Lecture 37 Roaming Between Centralized Controllers
Lecture 38 Roaming Between Converged Controllers
Section 13: Wireless Security Fundamentals
Lecture 39 Anatomy of a Secure Connection
Lecture 40 Securing Wireless Networks
Lecture 41 Wireless Client Authentication Methods
Lecture 42 Wireless Privacy and Integrity Methods
Lecture 43 WPA and WPA2
Lecture 44 Securing Management Frames with MFP
Section 14: Building a Wireless LAN
Lecture 45 Building a Wireless LAN
Section 15: Locating Devices in a Wireless Network
Lecture 46 Locating Devices in a Wireless Network
Section 16: Troubleshooting WLAN Connectivity
Lecture 47 Troubleshooting Client Connectivity
Lecture 48 Troubleshooting AP Connectivity
Lecture 49 Checking the RF Environment
Enterprise Network Engineers , Wireless Engineers
Homepage
www.udemy.com/course/wireless-network-fundamentals-zero-to-hero/
ifkdf.W.N.F.Z.part01.rar.html
ifkdf.W.N.F.Z.part02.rar.html
ifkdf.W.N.F.Z.part03.rar.html
ifkdf.W.N.F.Z.part04.rar.html
ifkdf.W.N.F.Z.part05.rar.html
ifkdf.W.N.F.Z.part06.rar.html
ifkdf.W.N.F.Z.part07.rar.html
ifkdf.W.N.F.Z.part08.rar.html
ifkdf.W.N.F.Z.part09.rar.html
Uploadgig
ifkdf.W.N.F.Z.part01.rar
ifkdf.W.N.F.Z.part02.rar
ifkdf.W.N.F.Z.part03.rar
ifkdf.W.N.F.Z.part04.rar
ifkdf.W.N.F.Z.part05.rar
ifkdf.W.N.F.Z.part06.rar
ifkdf.W.N.F.Z.part07.rar
ifkdf.W.N.F.Z.part08.rar
ifkdf.W.N.F.Z.part09.rar
NitroFlare
ifkdf.W.N.F.Z.part01.rar
ifkdf.W.N.F.Z.part02.rar
ifkdf.W.N.F.Z.part03.rar
ifkdf.W.N.F.Z.part04.rar
ifkdf.W.N.F.Z.part05.rar
ifkdf.W.N.F.Z.part06.rar
ifkdf.W.N.F.Z.part07.rar
ifkdf.W.N.F.Z.part08.rar
ifkdf.W.N.F.Z.part09.rar
Leave a Reply
You must be logged in to post a comment.