Cisco Implementing Cisco Enterprise Wireless Networks v2 (ENWLSI)

The Implementing Cisco Enterprise Wireless Networks (ENWLSI) training helps you implement network settings to provide a secure wireless network infrastructure and troubleshoot any related issues. The goal of this 5-day instructor-led training is to prepare you to secure and implement the wireless infrastructure, and use Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), Cisco DNA Center, Cisco Spaces, and Cisco Connect Mobile Experience to monitor and troubleshoot network issues. This training provides you with hands-on labs to reinforce concepts including deploying Cisco Catalyst 9800 Wireless Controller Release IOS XE Bengaluru 17.6.3, Cisco Digital Network Architecture (DNA) Center Release 2.3.3, Cisco Prime Infrastructure Release 3.5, Cisco Spaces, Cisco CMX Release 10.5, features, and Cisco Identity Services Engine (ISE) Release 3.0. This training prepares you for the 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks exam. If passed, you earn the Cisco Certified Specialist – Enterprise Wireless Implementation certification and satisfy the concentration exam requirement for the CCNP Enterprise certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.

Description

  • Secure the Wireless Network Infrastructure
  • Monitor and Troubleshoot Wireless Network
  • Monitor Wireless Networks with Cisco Prime Infrastructure
  • Monitor Wireless Network with Cisco DNA Center
  • Implementing 802.1X Authentication
  • Configure Cisco FlexConnect
  • Implement Guest Access
  • Monitor and Troubleshoot Client Connectivity
  • Implement QoS in Wireless Network
  • Implement Cisco AVC in Wireless Networks
  • Implement Multicast Services
  • Troubleshoot QoS
  • Deploy Cisco Spaces and Cisco CMX
  • Implement Location Services
  • Monitor Wireless Network with Cisco Spaces and Cisco CMX

Prerequisites

WLFNDU or equivalent knowledge or Implementing and Administering Cisco Solutions (CCNA) Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) training

Target Audience

  • Wireless Network Engineers
  • Security Network Engineers
  • Sales Engineers
  • Wireless Network Technicians
  • Test Engineers
  • Network Designers
  • Network Administrators
  • Network Managers
  • Midlevel Wireless Support Engineers
  • Project Managers

Objectives

Explain how to secure the wireless network infrastructure Access and navigate the remote lab Explain device administration Describe security best practices for administrative access to Cisco WLC Describe Cisco WLC configuration and overview for TACACS+ Explain role-based access control in Cisco ISE Explain how to configure access to the access point Configure secure port access for the access points Implement the 802.1X authentication process Explain how to configure access points and Cisco ISE for the 802.1X authentication Describe how to monitor and troubleshoot a wireless network Describe access point joint issue troubleshooting Describe the tools for CAPWAP access point discovery, DTLS, and join issues troubleshooting Capture a successful AP authentication Describe how to monitor and manage the network for rogue devices and RF interferers on Cisco WLC and Cisco Prime Infrastructure Describe how to implement and add devices to Cisco Prime Infrastructure Describe how to add access points to maps and monitor wireless clients Explain reports and their functions in Cisco Prime Infrastructure Describe enhanced client information with Cisco ISE and location details with Cisco CMX Discover how to use Cisco Prime Infrastructure for network monitoring Explain how to observe wireless networks for rogue devices, add devices to, monitor radio frequency interferers, and integrate Cisco DNA Center with external resources Explain how to troubleshoot access point and WLC issues with Cisco DNA Center Assurance Explain enhanced network insights with Cisco AI Network Analytics Observe and learn how to use reports in Cisco DNA Center Explain how to implement AAA-Based wireless security on Cisco WLC and Cisco ISE Explain how to configure WLAN for 802.1X on Cisco WLC and wireless clients for 802.1X authentication Explain how to implement and configure AAA override on Cisco WLC and Cisco ISE Configure, understand, and perform FlexConnect authentication, identity-based networking, split tunneling, and AAA services on Cisco WLC Explain how to upgrade FlexConnect access points Describe how to configure OfficeExtend Implement guest access in the wireless network Explain how to implement central web authentication Describe how to configure Cisco WLC and Cisco ISE for Centralized Web Authentication Show Cisco WLC configuration for Guest Services Explain the basics, onboarding process of BYOD Explain how to configure Cisco ISE for BYOD in the wireless network Describe how to monitor and troubleshoot client connectivity on Cisco WLC and authentication issues Show how to capture successful client authentication by using Radioactive Trace and Cisco ISE Describe the issues that affect client performance Explain wireless coverage and capacity, how to enhance client performance, and troubleshoot client throughput and data rate issues Describe how to implement QoS in wireless networks Describe QoS In wireless networks, marking QoS, and traffic classifications Explain congestions in the wireless world Describe IEEE 802.11 QoS fundamentals and how to configure Cisco WLC to support voice traffic Show how to configure QoS in the wireless network for voice and video services Describe how to optimize wireless utilization with Cisco Aire Time Fairness, QoS profiles, and Cisco Fastlane Implement and configure multicast services, forwarding, and Cisco AVC in wireless networks and on Cisco WLC Implement multicast services Explain how to configure mDNS and Cisco Media Stream Describe Cisco DNA Center Service for Bonjour and Cisco Media Stream Explain the QoS troubleshooting process in the wireless network and on Cisco WLC Describe how to use AVC to identify issues Describe how to verify and troubleshoot mDNS and media stream on Cisco WLC Explain how to deploy Cisco Spaces and Cisco CMX Describe how to implement location-based services and the provided functionalities Describe how to design for location services, deploy Cisco Spaces and Cisco CMX, and integrate Cisco Spaces and Cisco XMC with Cisco DNA Center, and Cisco CMS with Cisco Prime Infrastructure Describe how to deploy and configure Cisco Hyperlocation Describe how to implement detect and locate services in Cisco Spaces Describe how to prepare maps for location services in Cisco DNA Center, implement, detect, and locate services on Cisco CMX, analytics services in Cisco Spaces, and on Cisco CMX Describe how to implement presence services on Cisco CMX Describe how to implement and configure guest services, monitor, detect, and run analytics on wireless clients, rouge devices, and interferers in Cisco Spaces and with Facebook on Cisco CMX Describe how to troubleshoot location accuracy

Similar events

The Engineering Cisco Meraki Solutions training helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This training combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. This training helps prepare you for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies. This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.

More Information

This looks like just another CCNA course. But hidden inside is a complete transformation system that teaches you to think like a network architect, not just a configuration technician. You’ll learn to integrate AI, automation, and cloud technologies into network operations. Plus, you’ll master security fundamentals across IP addressing, routing, wireless LANs, and switching, all using Cisco’s industry-leading best practices. Which means instead of just passing an exam, you’ll develop the strategic thinking across network fundamentals that makes you indispensable. This 5-day intensive program doesn’t just prepare you for the globally recognized certification that consistently tops IT lists; it prepares you for career advancement by teaching you to install, configure, and troubleshoot modern networks like a true professional.

More Information

Over half of IT decision-makers say their current enterprise networks can’t support long-term innovation. As business demands outpace legacy infrastructure, engineers must master both traditional internetwork operations and next-gen solutions like SD-WAN, automation, and virtualization. The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.4 course gives you the knowledge and skills needed to install, configure, operate, and troubleshoot Cisco enterprise networks—from core routing and switching to wireless, security, automation, and overlay network design using Cisco SD-Access and SD-WAN solutions. This course prepares you for the 350-401 ENCOR exam, the core exam required for the Cisco Certified Network Professional (CCNP) Enterprise certification and Cisco Certified Specialist – Enterprise Core credential. It also supports certification prep for CCIE Enterprise Wireless, Cisco Certified Network Associate (CCNA), and ENARSI.

More Information

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles. This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.

More Information

Your network will fail. The only question is whether you'll see it coming. 70% of enterprise outages stem from preventable misconfigurations, yet most IT teams rely on reactive troubleshooting methods designed for simpler networks. As enterprise networks become more complex, IT professionals need more than basic routing knowledge. They need advanced troubleshooting skills to identify, resolve, and optimize routing issues across hybrid environments before they become business-critical failures. The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 course gives you the skills to implement and troubleshoot advanced routing technologies used in real-world enterprise networks. From EIGRP and OSPF to BGP, MPLS, and DMVPN, this course prepares you to configure and secure enterprise infrastructure, and helps you prepare for the Cisco ENARSI 300-410 exam, a required step on the CCNP Enterprise path.

More Information

Is your network access policy protecting your data—or blocking your users? Up to 70% of organizations say they lack full visibility into who’s accessing their systems—opening the door to both security risks and productivity gaps. The Implementing and Configuring Cisco Identity Services Engine (SISE) Training Course gives you the skills to fix that. You’ll learn to deploy Cisco ISE v3.x and enforce identity-based policies across wired, wireless, and VPN networks. Through expert instruction and hands-on labs, you’ll configure guest portals, BYOD onboarding, device profiling, posture checks, and TrustSec controls. This course also prepares you for the SISE v4.0 certification exam, helping you validate your expertise in Cisco ISE deployment, configuration, and troubleshooting as part of a Zero Trust strategy.

More Information