Request a Quote for this class
The WWPIM is based on the best portions of both the WMNGI course and the WMUAPI course. The WWPIM course establishes a strong foundation in managing the full range of Cisco wired and wireless infrastructure using Prime Infrastructure 2.0. During this course you will also explore the Application Visibility and Control capabilities of Prime Infrastructure through monitoring and troubleshooting problems on the network. The course puts the user in the context of a realistic customer scenario, and covers every aspect of Cisco Prime Infrastructure 2.0's Lifecycle management approach. You will create Sites, Maps, Deploy configurations, perform device discovery as well as learn to set alarms and troubleshoot network and application issues.
The Wired & Wireless Prime Infrastructure Management training class is designed to prepare you to use the Cisco Prime Infrastructure management products and applications to configure, administer, manage, troubleshoot, and optimize the network. This course is a classroom based instructor-led class that offers in-depth instructor-assisted hands-on labs. This course provides hands-on labs which cover controller firmware release 7.5 MR1 as well as Cisco Prime Infrastructure software release 2.0. All labs are hands-on labs via remote access, using real Cisco gear.
The class begins with a high-level overview of the Cisco Prime Infrastructure (PI) product line, including product functions, components, capabilities, and features. You will learn where to locate installation procedures for both the access point (AP) and their associated Wireless LAN Controllers (WLCs) and properly install the PI hardware appropriate to site and use requirements. You will look at ways to administer CUWN, 802.11 security policies, and QoS appropriately to protect and optimize performance on the wireless network. You will configure and implement key PI security features to mitigate WLAN security threats. You will conclude training by learning how to utilize recommended troubleshooting methodology and the various tools available to gather and assess system data to isolate equipment failures and security threats.
After completing this course, the student should be able to: