CWNP’s Newest Update: CWNA-108

CWNP has released the newest iteration of its flagship CWNA certification curriculum

CWNP has recently released its newly updated Certified Wireless Network Administrator certification, version 108 (CWNA-108)!

In order to stay at the forefront of technology, certifications must be refreshed regularly. This is standard throughout the IT industry. The usual lifecycle is approximately 3 years. At this point information learned three years previously is considered to be out of date. We accept that the concepts remain valid, but the actual specifics need to be updated.

CWNP held a Job Task Analysis (JTA) workshop, with industry experts in attendance, at which it was decided to update a number of specifics in the CWNA curriculum (training class and certification exam).

The official Certified Wireless Network Administrator (CWNA) training class covers a multitude of topics ranging from RF Frequencies, Wireless LAN Analysis, and RF Math, to Site Surveying and Antennas. This class provides the networking professional with a solid foundation of knowledge for entering into, or advancing within, the wireless networking industry.

During their investigation into the curriculum, the JTA team established that heavier focus needed to be placed on one area specifically – that of WLAN Regulations and Standards. This is a vital area with which every wireless engineer should be heavily conversant.

Conversely, the JTA team established that a few areas no longer require quite such heavy focus: Network Architecture and Design Concepts has been reduced a little, since some of the concepts are already repeated in the Certified Wireless Design Professional (CWDP) curriculum; similarly, WLAN Troubleshooting is mentioned in every class, and receives special focus in Certified Wireless Analysis Professional (CWAP).

Moving Forward to the Future

It was decided that the level of coverage of the other knowledge areas was sufficient and should remain stable.

Overall, the JTA team determined that the focus of the new curriculum more closely matches the needs in the market at the current time.

So, as you can see, the class provides a good, solid, overall foundation for understanding how and why wireless technology works the way it does.

Who should attend?

If you are a business owner who needs ot understand how your wireless network works, an IT team manager wanting to improve your team’s skillset, or someone wanting to cross-train to get into the wireless network team – this is for you!

How to enroll?

It couldn’t be easier! Click this button and contact us to discuss specifics and learn about upcoming class dates.

We are also offering a Special Deal price on this class – ask us about it – or visit this page to learn more.

About NC-Expert

NC-Expert is a privately-held California corporation and is well established within the Wireless, Security, and Collaboration industry certification training, courseware development, and consulting markets.

Led by its Founder and CEO, Rie Vainstein, NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers have depended on NC-Expert to train, advise, and mentor their staff.

If you are looking for the best in IT Network Training then call us today at (855) 941-2121 or contact us by email today.

The post CWNP’s Newest Update: CWNA-108 appeared first on NC Expert.

NC-Expert Blog

By Rie Morgan April 30, 2026
Meet the Team: Repeaters, Hubs, Bridges, Switches, Modems, Gateways, and Access Points When you first step into networking, the equipment can feel like a cast of characters in a technical drama. Each device has a role. Some are veterans from networking’s early days. Others are modern specialists. Together, they form the backbone of how devices communicate. 
By Rie Morgan April 27, 2026
When people first start working with wi-fi security, or enter the cybersecurity arena, they quickly hear about something called the "CIA Triad". (No, not that CIA!) In cybersecurity, the CIA Triad stands for: Confidentiality, Integrity, and Availability . These three principles form the foundation of information security. Nearly every security control, policy, and technology decision can be traced back to protecting one (or more) of these pillars. But in real-world IT environments, there are two additional principles that deserve seats at the table: Authenticity and Non-Repudiation . Together, these five ideas provide a practical framework for understanding what security is actually trying to achieve. Let’s walk through them...
By Rie Morgan April 15, 2026
Wi‑Fi security is no longer just an IT checkbox; it is a business risk issue that affects data protection, uptime, customer trust, and compliance. Strong wireless security helps businesses keep unauthorized users out, protect sensitive traffic, and reduce the chance that a single compromised access point (AP) becomes a wider network breach.