OnLine Course (course only)
- The value of this product only includes the Online Course of Certification.
- Does not include the certification exam.
- The right to a certification exam can be acquired with Academy Xperts at any time.
- The certification exam is always taken in person.
- Our platform allows you to obtain a Certificate of Attendance and Participation.
- The Certificate of Attendance is endorsed by Academy Xperts for which it must take and pass a final exam prepared by us.
- Both the Final Exam and the Certificate of Attendance They have NO cost.
- The Certificate of Attendance generates a unique code which can be verified on our portal: https://abcxperts.com/verificar-certificado/
Course Objectives
MTCWE (MikroTik Certified Wireless Engineer) is designed to provide wireless professionals with the knowledge and skills necessary to deploy, configure and troubleshoot wireless networks using MikroTik equipment.
Band, Frequency, scan-list
The importance of understanding the bands and frequencies used in wireless networks is addressed.
Feature compatibility tables are presented for different protocols, such as the Wireless Feature Matrix, WDS Configuration Matrix, and Station Mode Matrix.
Additionally, the IEEE 802.11 standard is explored and aspects related to bands and channel width are detailed.
Wireless Tools
Various tools are introduced for the analysis and monitoring of wireless networks. Tools such as “scan” and “frequency-usage” are studied to analyze the spectrum and frequencies used.
Tools such as “spectral-scan”, “spectral-history” and “wireless-snooper” are also explored to detect and resolve problems related to performance and interference in wireless networks.
Using DFS for automatic frequency selection
Dynamic frequency selection (DFS) and its application in wireless network management are studied.
You examine country regulations and learn how to configure and use DFS to avoid interference and ensure optimal operation of wireless networks.
Analysis of the log table for troubleshooting
We are working on troubleshooting wireless networks. You study the registration table and learn to use the ccq (Client Connection Quality) parameter to evaluate the quality of the clients' connection.
In addition, the parameters “frames” vs. “hw-frames” to identify possible problems and practical laboratories are carried out to evaluate these parameters under different conditions.
Use of advanced configurations for troubleshooting and tuning of Wireless connections
Advanced configurations are run that can help in troubleshooting and fine-tuning wireless connections. Aspects such as protection based on RTS/CTS and “CTS to self”, the HW fragmentation threshold, the Wireless Multi Media (WMM) configuration and the DSCP priority are studied. Important wireless priority considerations are also discussed.
Modifying the “data-rates” and transmission powers (tx-power) to stabilize wireless connections
The modification of “data-rates” and transmission power (tx-power) is analyzed to stabilize wireless connections. Different techniques and strategies are explored to adjust the data-rates and transmission power of MikroTik devices, with the aim of optimizing the performance and stability of the connections.
Concepts such as modulation, coding and data transfer rate are reviewed, and the effects of modifying these parameters on the quality of the connection are analyzed.
Implementation of security systems in wireless networks
Aspects related to the implementation of security systems in wireless networks. Different authentication and encryption techniques are explored, such as the WPA2-PSK protocol, the WPA2-EAP protocol, and the WPA3 protocol. You learn how to configure and manage security policies, strong passwords and key management.
Wireless Security to protect the wireless connection
Provide the knowledge and tools necessary to ensure the security of wireless connections. Fundamental wireless security concepts are addressed, such as PSK (Pre-Shared Key) authentication and EAP (Extensible Authentication Protocol) authentication.
Additionally, different encryption methods are explored, such as AES-CCM, TKIP, and WEP (obsolete).
Participants will learn how to configure and manage wireless security in MikroTik networks, including the use of pre-shared keys (PSK) and the implementation of different levels of encryption to guarantee the confidentiality and protection of transmitted information.
Protecting Wireless Clients from “de-authentication” and “MAC cloning” attacks
Protect wireless clients from common attacks, such as de-authentication and MAC address cloning. The Management Frame Protection functionality is explored, which helps prevent de-authentication of wireless clients.
You will learn how to configure Management Frame protection options and use protection keys to ensure the integrity of communications. Through practical laboratories, the opportunity will be provided to apply the knowledge acquired and strengthen the security of wireless networks.
Wireless WDS and MESH
Deepen the use of WDS (Wireless Distribution System) and MESH (mesh link) technologies in wireless networks. Participants will learn how to configure and optimize point-to-point and point-to-multipoint WDS links, allowing them to expand their network coverage and improve connectivity.
In addition, the concepts of (Rapid) Spanning Tree Protocol, layer-2 routing for mesh networks and HWMP+ (Hybrid Wireless Mesh Protocol) are explored. Hands-on labs will provide the opportunity to implement and test different WDS and MESH configurations, as well as become familiar with best practices in deploying these technologies.
Wireless Transparent Bridge
The concept of Wireless Transparent Bridge is explored, which allows the interconnection of Ethernet clients through wireless links. Participants will learn how to configure transparent bridges and use different modes, such as AP-Station WDS link and Pseudobridge and Pseudobridge Clone modes.
Configuration considerations for achieving efficient and stable interconnection are addressed, and recommendations are provided for implementation in outdoor environments.
Hands-on labs will allow participants to practice configuring transparent bridges and become familiar with the configuration options available.
Nstreme Protocol
MikroTik's Nstreme protocol, which offers improvements in the performance and throughput of wireless connections. The fundamental concepts of the Nstreme protocol are explored, including its different frames and their operation.
Participants will learn to analyze and optimize traffic using Nstreme, which will allow them to improve the efficiency and quality of wireless communications.
Nstreme Dual Wireless Protocol
The Wireless Nstreme Dual protocol, an evolution of the Nstreme protocol that allows two wireless interfaces to be used to transmit and receive data simultaneously.
They will learn how to configure and implement the Nstreme Dual protocol in their wireless networks, which will allow them to make the most of the performance and throughput of their links.
Key protocol concepts are covered, such as the Nstreme Dual interface, and different configuration options are explored. Hands-on labs will provide a hands-on experience to strengthen understanding and skills in using the Nstreme Dual protocol.
802.11n
Features of 802.11n, including the use of MIMO (Multiple-Input, Multiple-Output) and the available data rates. Key aspects such as channel bonding, frame aggregation and configuring 802.11n compatible wireless cards are explored.
Recommendations are provided for the configuration of outdoor links and the use of transparent bridges on N links. The practical laboratories will allow participants to apply theoretical knowledge and become familiar with the implementation and configuration of the 802.11n standard.
802.11ac
The 802.11ac standard offers significant improvements in speed and capacity in wireless networks. Key concepts such as MIMO (Multiple-Input, Multiple-Output), multi-user MIMO (MU-MIMO), SDMA (Space-Division Multiple Access) and beamforming are explored.
The channels available in the 802.11ac standard are discussed and information on supported data rates is provided.
You will learn about configuring 802.11ac wireless cards, transparent bridging on N links, and recommendations for implementing VPLS bridging and fragmentation are provided.
By the end
Upon completion of the course, participants will be prepared to address common challenges associated with deploying and managing wireless networks, and will be able to apply best practices to ensure reliable connectivity and optimal performance.
About the online course
- Live Trainer
- 16 hours long (4 days, 4 hours each day)
- Certification is obtained with a score equal to or greater than 6.0/10 (60%)
- The certification exam can only be taken in person
-
- Consult with your sales representative the countries and cities where Academy Xperts can take in-person exams
-
- Course Level: Intermediate-Advanced
Ratings
Not yet reviewed