CWISA: When the IT and OT Worlds Conjoin

Rie Vainstein • August 14, 2020

CWNP Training Certification – CWISA: Bringing the Worlds of Wireless and Internet of Things Together!

A Certified Wireless IoT Solutions Administrator (CWISA) certification and training class has been introduced into CWNP’s portfolio. It is part of a parallel track to CWNP’s wireless training certification suite. This track focuses on IoT from the wireless perspective, and vice versa, instigating the conjoining of the worlds of IT and OT.

This first class in the parallel track is CWISA, Certified Wireless IoT Solutions Administrator, an associate-level training class aimed at bridging the gap between the worlds of wireless and Internet of Things. It investigates how wireless works, from an IoT perspective, and is an excellent introduction to IoT for the wireless engineer.

This class introduces the student to IoT and is, effectively, a CWNA-level class for people who want to learn more about IoT technologies. Conversely, it is a class about how wireless works from the perspective of an IoT/OT engineer. It is a comprehensive introduction into the world of IoT and discusses what a wireless engineer needs to operate it.

There is a difference between IT (Information Technology) engineers and OT (Operations Technology) engineers in their spheres of work, the sorts of day-to-day requirements that are asked of them, and the kinds of solutions that might be applicable to their problems. The simplest explanation is that OT deals with industrial machines (sensors, monitors, etc.) while IT, essentially, focuses on the transmission of information.

What is this training about?

In this class, students will be exposed to a number of vital aspects of IoT technology as it relates to wireless. The student will learn about the history of wireless, regulatory organizations, industry standards, and the standards lifecycle.

The class discusses vertical market considerations, along with system requirements and potential constraints. It looks at the technicalities of wave characteristics, modulation techniques, and the use and capabilities of carrier waves (including light and sound).

It also investigates the features and capabilities of various solutions, such as cellular networks, sensor networks, and IoT networks.

It is necessary to discuss various troubleshooting techniques and, of course, security features and methodolgies are examined. Additionally, this class considers programming, scripting, and automation (APIs, etc.).

So, as you can see, the class provides a good, solid, overall foundation of the way the two worlds are already beginning to combine.

Who should attend?

CWNP’s CWNA training and certification is aimed at the IT world, while CWISA is targeted at the OT world. The ideal candidate for this class would be anyone in IT or OT that wants to learn about the “other” world.

As technology continues to become increasingly integrated, we will find that the boundaries between these currently separate worlds will increasingly blur. The time is fast approaching where engineers will need to understand, and be proficient in, both IT and OT.

If you are an IT engineer wanting to learn about IoT, or if you are an OT engineer wanting to learn about wireless, this training makes for a solid foundation and a great start!

How to enroll?

It couldn’t be easier! You have two choices: [1] Visit our Special Deals page to learn more, or [2] Click the button below to contact us for more information about the class and upcoming class dates.

About NC-Expert

NC-Expert is a privately-held California corporation and is well established within the Wireless, Security, and Collaboration industry certification training, courseware development, and consulting markets.

Led by its Founder and CEO, Rie Vainstein, NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers have depended on NC-Expert to train, advise, and mentor their staff.

If you are looking for the best in IT Network Training then call us today at (855) 941-2121 or contact us by email today.

NC-Expert Blog

By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.
By Phil Morgan February 27, 2025
Designing a Wi-Fi Network This is the first in a series of blogs on Wi-Fi operation, design, and troubleshooting. Designing a Wi-Fi network is much easier if you have the right procedures and tools in place. First you must collect data about the network: What are the requirements of the network? What is the goal of the new network? What is it meant to achieve? Are there any constraints you have to overcome? Next you have to decide what wireless vendor is being used? One of the most important things to get is an accurate map (or plan) of the site and the various floors.
Share by: