IT-kurs
Du har valgt: Troms
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Troms ) i IT-kurs
 

Oslo 1 dag 9 900 kr
13 Sep
13 Sep
ITIL® 4 Practitioner: Monitoring and Event Management [+]
ITIL® 4 Practitioner: Monitoring and Event Management [-]
Les mer
Nettkurs 90 minutter 6 000 kr
Denne modulen er bindeleddet mellom den praktiske (Managing Professional) og den strategiske (Strategic Leader) sertifiseringsstrømmen, og er del av begge disse to. [+]
Du vil få tilsendt en «Core guidance» bok og sertifiserings-voucher slik at du kan ta sertifiseringstesten for eksempel hjemme eller på jobb. Denne vil være gyldig i ett år. Tid for sertifiseringstest avtales som beskrevet i e-post med voucher. Eksamen overvåkes av en web-basert eksamensvakt.   Eksamen er på engelsk. Eksamensformen er multiple choice - 40 spørsmål skal besvares, og du består med 70% riktige svar (dvs. 28 av 40). Deltakerne har 1 time og 30 minutter til rådighet på eksamen.  Ingen hjelpemidler er tillatt.  Nødvendige forkunnskaper: Bestått ITIL Foundation sertifisering Gjennomført godkjent kurs/e-læring [-]
Les mer
Virtuelt klasserom 3 timer 1 750 kr
27 Jun
Analyserer du store datamengder? Gjør du samme import hver dag/uke/måned? Importerer du data til Excel som ikke alltid har rett format? Har du lurt på hvordan det nye ver... [+]
Kursinnhold Import av .csv Import av tekstfiler (.txt) Import fra internett Transformering av data Rette opp feil Lage beregnede kolonner Regelmessig import Analyse av store datamengder   Det er fordelaktig å ha to skjermer - en til å følge kurset og en til å gjøre det kursholder demonstrerer. Kurset gjennomføres i sanntid med nettundervisning via Teams. Det blir mulighet for å stille spørsmål, ha diskusjoner, demonstrasjoner og øvelser. Du vil motta en invitasjon til Teams fra kursholder.   [-]
Les mer
Bedriftsintern 1 dag 11 000 kr
This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform. [+]
Through a combination of presentations, demos, and hands-on labs, participants get an overview of the Google Cloud platform and a detailed view of the data processing and machine learning capabilities. This course showcases the ease, flexibility, and power of big data solutions on Google Cloud Platform. Learning Objectives This course teaches participants the following skills: Identify the purpose and value of the key Big Data and Machine Learning products in the Google Cloud Platform Use Cloud SQL and Cloud Dataproc to migrate existing MySQL and Hadoop/Pig/Spark/Hive workloads to Google Cloud Platform Employ BigQuery and Cloud Datalab to carry out interactive data analysis Train and use a neural network using TensorFlow Employ ML APIs Choose between different data processing products on the Google Cloud Platform Course Outline Module 1: Introducing Google Cloud Platform -Google Platform Fundamentals Overview-Google Cloud Platform Big Data Products Module 2: Compute and Storage Fundamentals -CPUs on demand (Compute Engine)-A global filesystem (Cloud Storage)-CloudShell-Lab: Set up an Ingest-Transform-Publish data processing pipeline Module 3: Data Analytics on the Cloud -Stepping-stones to the cloud-CloudSQL: your SQL database on the cloud-Lab: Importing data into CloudSQL and running queries-Spark on Dataproc-Lab: Machine Learning Recommendations with Spark on Dataproc Module 4: Scaling Data Analysis -Fast random access-Datalab-BigQuery-Lab: Build machine learning dataset Module 5: Machine Learning -Machine Learning with TensorFlow-Lab: Carry out ML with TensorFlow-Pre-built models for common needs-Lab: Employ ML APIs Module 6: Data Processing Architectures -Message-oriented architectures with Pub/Sub-Creating pipelines with Dataflow-Reference architecture for real-time and batch data processing Module 7: Summary -Why GCP?-Where to go from here-Additional Resources [-]
Les mer
3 dager 19 900 kr
To be a successful architect, one needs to know the pros and cons of different architectures and under what conditions they are applied in a project. In addition, a good ... [+]
In this course, participants will learn about the pitfalls of misapplying an architecture style and applying it to the wrong problem. We’ll also cover topics like Microservices, CQRS, Hexagonal Architecture, Event Sourcing, System stability, Development quality, and more. Target audience: Architects, Team Leads, Senior Developers Day 1.  Architecture and Architects What is “architecture”? What is good architecture? Who is a good architect? System Architecture Monolith Microservices Modular Monolith How to make a choice? A path from Monolith to Microservices Communication Synchronous and Asynchronous communication Commands vs Events Big and Small Events Message Naming Event Versioning Messaging in Monolith Event Choreography and Orchestration Message Concurrency  Message Processing Order Dealing with Errors Idempotent Consumers Two-phase Commit for sending Messages? Day 2.  Domain Driven Design Why use DDD? How to discover a Bounded Context? Coding your Architecture Project structure Package structure Designing Aggregates and Value Objects Choosing ID types (UUID, Long, etc.) Ensuring Invariants in Domain Model Separate Behavior and Persistence Do Exceptions help? Applying Hexagonal Architecture principles Code quality automation Code reviews REST API General principles Task-based REST API Dealing with Errors: Problem Details Day 3.  Command Query Responsibility Segregation Event Sourcing: advantages and challenges Documenting your Architecture Sharing main decisions Visualizing architecture Continuous Integration and Continuous Deployment Versioning Automation Stability of your System Common failures and stability antipatterns Stability patterns Securing your System Monitoring your System Aspects of monitoring Metrics to expose Control in production Distributed tracing Format: 40% workshop / 60% lecture Prerequisites Mid, senior developers and architects Good experience in mainstream languages such as Java, C # etc (examples to be presented in Java and Spring Boot) [-]
Les mer
Oslo 3 dager 17 900 kr
22 May
22 May
07 Oct
COBIT 2019 Foundation [+]
COBIT 2019 Foundation [-]
Les mer
Oslo 4 dager 25 900 kr
25 Jun
25 Jun
17 Sep
Advanced Python Development [+]
Advanced Python Development [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Fysiske medier i bruk i lokalnettverk. Nettverkskomponenter. Design av nettverk (nettverk infrastruktur). Trådløse nettverk, design og sikkerhet. Generelt om forskjellige... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Ingen Innleveringer: For å kunne gå opp til eksamen må 8 utvalgte øvingsoppgaver være godkjente. Personlig veileder: ja Vurderingsform: Skriftlig eksamen, individuell, 3 timer. Ansvarlig: Arne Bjørn Mikalsen Eksamensdato: 16.12.13 / 19.05.14         Læremål: KUNNSKAPERKandidaten:- kan gjøre rede for de mest brukte teknologiene for lokalnettverk- kan gjøre rede for teknisk oppbygning av nettverk- kan gjøre rede for ulike nettverkskomponenter, deres virkemåte og bruksområde- kan planlegge og vurdere sikkerhet i lokalnettverk FERDIGHETER:Kandidaten:- kan koble til og konfigurere en datamaskin slik at den fungerer i et nettverk med internettoppkobling- kan opprette brukerkontoer, tildele rettigheter, samt administrere nettverk med en ressursdatabase- kan planlegge, implementere og konfigurere et mindre lokalnettverk GENERELL KOMPETANSE:Kandidaten:- har kompetanse til selvstendig både å formidle og å ta i bruk sine kunnskaper og ferdigheter innen emnets tema i en driftssituasjon- kan i en praktisk driftssituasjon, forklare og gjøre bruk av sin kunnskap både innen hvert enkelt tema i faget og på tvers av temaene- kan kommunisere med andre om nettverksløsninger Innhold:Fysiske medier i bruk i lokalnettverk. Nettverkskomponenter. Design av nettverk (nettverk infrastruktur). Trådløse nettverk, design og sikkerhet. Generelt om forskjellige typer nettverksoperativsystem. Introduksjon til Active Directory og eDirectory. Prinsipper for konfigurasjon, installasjon, drift og sikkerhet og driftsfilosofi i lokalnettverk. Introduksjon til virtualisering. Driftsmodeller: Fjerndrift eller ASP (Application Service Provider)Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Drift av lokalnettverk 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Virtuelt klasserom 3 timer 1 200 kr
Microsoft 365 er abonnement på Office-programmer og andre produktivitetstjenester som du får tilgang til via Internett (skytjenester). [+]
Microsoft 365 er abonnement på Office-programmer og andre produktivitetstjenester som du får tilgang til via Internett (skytjenester). Tidligere var dette kjent under navnet Office 365, men Microsoft har nå endret navnet til Microsoft 365. Fordelen er at du alltid har tilgang til Office-programmer og dine dokumenter, og kan dele dem med andre fra hvilken som helst enhet. Dette betyr at du har tilgang på dine dokumenter og verktøy via PC, mobil eller nettbrett. På kurset vil du lære om samhandling, kommunikasjon og tilgjengelighet. Om Microsoft 365Microsoft 365 er abonnement på Office-programmer og andre produktivitetstjenester som du får tilgang til via Internett (skytjenester). I abonnementet har du tilgang på en rekke applikasjoner, slik som Word, Excel, PowerPoint, Teams og lagring i OneDrive, samt mange andre nyttige verktøy. Fordelen er at du alltid har tilgang til Office-programmer og dine dokumenter, og kan dele dem med andre fra hvilken som helst enhet. Vi viser deg hvordan du kan jobbe effektivt med ditt Microsoft 365 abonnement. Pris: 1200 kroner Ansatte ved UiS har egne prisbetingelser.   Etter at du har meldt deg på webinaret, vil du få tilsendt praktisk informasjon om pålogging. Webinarene gjennomføres fra din PC eller nettbrett.    [-]
Les mer
Oslo 5 dager 43 500 kr
13 May
24 Jun
24 Jun
RH294: Red Hat System Administration III: Linux Automation with Ansible [+]
RH294: Red Hat System Administration III: Linux Automation with Ansible [-]
Les mer
Virtuelt klasserom 4 dager 24 000 kr
MS-500 MICROSOFT 365 SECURITY ADMINISTRATOR [+]
COURSE OVERVIEW This course is comprised of the following Microsoft Official Curriculum modules: MS-500T01 Managing Microsoft 365 Identity and Access, MS-500T02 Implementing Microsoft 365 Threat Protection, MS-500T03 Implementing Microsoft 365 Information Protection and MS-500T04 Administering Microsoft 365 Built-in Compliance.   MS-500T01 Managing Microsoft 365 Identity and Access Help protect against credential compromise with identity and access management. In this course you will learn how to secure user access to your organization’s resources. Specifically, this course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to configure Active Directory federation services, how to setup and use Azure AD Connect, and introduces you to Conditional Access. You will also learn about solutions for managing external access to your Microsoft 365 system.   MS500T02 Implementing Microsoft 365 Threat Protection Threat protection helps stop damaging attacks with integrated and automated security. In this course you will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions for them. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and how to use Microsoft 365 Threat Intelligence. It also discusses securing mobile devices and applications. The goal of this course is to help you configure your Microsoft 365 deployment to achieve your desired security posture.   MS500T03 Implementing Microsoft 365 Information Protection Information protection is the concept of locating and classifying data anywhere it lives. In this course you will learn about information protection technologies that help secure your Microsoft 365 environment. Specifically, this course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, the course explains the deployment of Microsoft Cloud App Security.   MS500T04 Administering Microsoft 365 Built-in Compliance Internal policies and external requirements for data retention and investigation may be necessary for your organization. In this course you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. Specifically, this course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations. The course also helps your organization prepare for Global Data Protection Regulation (GDPR).   Virtual Learning   This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins. TARGET AUDIENCE This course is for the Microsoft 365 security administrator role. This role collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization. COURSE CONTENT Module 1: User and Group Security This module explains how to manage user accounts and groups in Microsoft 365. It introduces you to Privileged Identity Management in Azure AD as well as Identity Protection. The module sets the foundation for the remainder of the course.   Module 2: Identity Synchronization This module explains concepts related to synchronizing identities. Specifically, it focuses on Azure AD Connect and managing directory synchronization to ensure the right people are connecting to your Microsoft 365 system.   Module 3: Federated Identities This module is all about Active Directory Federation Services (AD FS). Specifically, you will learn how to plan and manage AD FS to achieve the level of access you want to provide users from other directories.   Module 4: Access Management This module describes Conditional Access for Microsoft 365 and how it can be used to control access to resources in your organization. The module also explains Role Based Access Control (RBAC) and solutions for external access.   Module 5: Security in Microsoft 365 This module starts by explaining the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions to thwart those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture.   Module 6: Advanced Threat Protection This module explains the various threat protection technologies and services available in Microsoft 365. Specifically, the module covers message protection through Exchange Online Protection, Azure Advanced Threat Protection and Windows Defender Advanced Threat Protection.   Module 7: Threat Intelligence This module explains Microsoft Threat Intelligence which provides you with the tools to evaluate and address cyber threats. You will learn how to use the Security Dashboard in the Microsoft 365 Security and Compliance Center. It also explains and configures Microsoft Advanced Threat Analytics.   Module 8: Mobility This module is all about securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications.   Module 9: Information Protection This module explains information rights management in Exchange and SharePoint. It also describes encryption technologies used to secure messages. The module introduces how to implement Azure Information Protection and Windows Information Protection.   Module 10: Data Loss Prevention This module is all about data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications.   Module 11: Cloud Application Security This module is all about cloud app security for Microsoft 365. The module will explain cloud discovery, app connectors, policies, and alerts.     [-]
Les mer
Oslo 5 dager 27 900 kr
03 Jun
03 Jun
16 Sep
GDPR - Certified Data Protection Officer [+]
GDPR - Certified Data Protection Officer [-]
Les mer
Trondheim 5 dager 30 000 kr
23 Sep
MasterClass: Hacking and Securing Windows Infrastructure with Paula Januszkiewicz [+]
MasterClass: Hacking and Securing Windows Infrastructure with Paula Januszkiewicz [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
The Implementing Cisco Enterprise Wireless Networks course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any relate... [+]
COURSE OVERVIEW You’ll learn how to implement and secure a wireless network infrastructure and use Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.   The course provides hands-on labs to reinforce concepts including deploying Cisco Prime Infrastructure Release 3.5, Cisco Catalyst 9800 Wireless Controller Release IOS XE Gibraltar 16.10, Cisco Digital Network Architecture (DNA) Center Release 1.2.8, Cisco CMX Release 10.5, Cisco MSE Release 8.0 features and Cisco Identity Services Engine (ISE) Release 2.4.   This course also helps you prepare to take the Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) exam, which is part of the new CCNP Enterprise certification. Passing the exam will also provide you with the Cisco Certified Specialist - Enterprise Wireless Implementation certification.   TARGET AUDIENCE Individuals needing to understand how to implement, secure and troubleshoot a Cisco Enterprise Wireless Network.   COURSE OBJECTIVES After completing this course you should be able to: Implement network settings to provide a secure wireless network infrastructure Troubleshoot security issues as it relates to the wireless network infrastructure Implement a secure wireless client and troubleshoot wireless client connectivity issues Implement and troubleshoot QoS in wireless networks Implement and troubleshoot advanced capabilities in wireless network services   COURSE CONTENT Securing and Troubleshooting the Wireless Network Infrastructure Implement Secure Access to the WLCs and Access Points Configure the Network for Access Point 802.1X Authentication Use Cisco DNA Center for Controller and AP Auto Install Implement Cisco Prime Infrastructure Define Network Troubleshooting Techniques Troubleshoot Access Point Join Issues Monitor the Wireless Network Implementing and Troubleshooting Secure Client Connectivity Configure the Cisco WLC for Wireless Client 802.1x Authentication Configure the Wireless Client for 802.1X Authentication Configure a Wireless LAN for FlexConnect Implement Guest Services in the Wireless Network Configure the Cisco WLC for Centralized Web Authentication Configure Central Web Authentication on Cisco ISE Implement BYOD Implement Location-Aware Guest Services Troubleshoot Client Connectivity Describe Issues that Affect Client Performance Monitor Wireless Clients Implementing and Troubleshooting QoS in Wireless Networks Implement QoS in the Wireless Network Configure the Cisco WLC to Support Voice Traffic Optimize Wireless Utilization on the Cisco WLC Implement Cisco AVC in the Wireless Network Implement Multicast Services Implement mDNS Service Implement Cisco Media Stream Troubleshoot QoS Issues in the Wireless Network Troublehoot mDNS Issues Troubleshoot Media Stream Issues Implementing and Troubleshooting Advanced Wireless Network Services Implement Base Location Services on Cisco Prime Infrastructure Implement Hyperlocation in the Wireless Network Implement Detect and Locate Services on Cisco CMX Implement Analytics on Cisco CMX Implement Presence Services on Cisco CMX Monitor and Locate Rogue Devices with Cisco Prime Infrastructure and Cisco CMX Monitor and Detect Wireless Clients with Cisco CMX and Cisco DNA Center Run Analytics on Wireless Clients Troubleshoot Location Accuracy with Cisco Hyperlocation Monitor and Manage RF Interferers on the Cisco WLC Monitor and Manager RF Interferers on Cisco Prime Infrastructure and Cisco CMX Labs Lab Familiarization (Base Learning Lab) Configure Secure Management Access for WLCs and APs Add Network Devices and External Resources to Cisco Prime Infrastructure Capture a Successful AP Authentication Implement AAA Services for Central Mode WLANs Implement AAA Services for FlexConnect Mode WLANs Configure Guest Services in the Wireless Network Configure BYOD in the Wireless Network Capture a Successful Client Authentications Configure QoS in the Wireless Network for Voice and Video Services Configure Cisco AVC in the Wireless Network Capture Successful QoS Traffic Marking in the Wireless Network Configure Detect and Locate Services on the Cisco CMX Identify Wireless Clients and Security Threats [-]
Les mer
3 dager 8 200 kr
Vil du lære å lage visittkort, annonser, brosjyrer og plakater i InDesign? Enten du jobber i en markedsavdeling, grafisk bedrift, avis eller magasin, er InDesign det pr..... [+]
Vil du lære å lage visittkort, annonser, brosjyrer og plakater i InDesign? Enten du jobber i en markedsavdeling, grafisk bedrift, avis eller magasin, er dette det profesjonelle programmet du bruker til jobben.  Arbeider du med markedsføring og layout, vil du ha stor nytte av å kunne sette sammen tekst og bilder selv. Du slipper å sette ut arbeidet,  får større kontroll på layouten og mer ut av markedsbudsjettet. Du velger dette kurset for å lære alt du trenger for å komme igang med programmet InDesign. Hvem passer kurset for? Kurset passer for deg som har liten eller ingen erfaring med å jobbe i InDesign. InDesign er bransjestandarden for å lage annonser, brosjyrer, magasiner, plakater, DM, rapporter og bøker. Uansett hva du skal bruke programme til, så passer dette kurset for deg! Dette lærer du: Bli kjent med menyer og verktøy Effektiv jobbing med tekst- og sidemaler Grunnleggende typografi Importere og tilpasse bilder og tekst Plassere bilder med tekst rundt Lage egne farger Bruk av effekter Kontroll av dokumenter og eksport til pdf https://igm.no/indesign-grunnkurs/ [-]
Les mer