IT-kurs
Vestfold
Du har valgt: Tønsberg
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Tønsberg ) i IT-kurs
 

Nettkurs 12 måneder 9 000 kr
ITIL® 4 Specialist: Create, Deliver and Support dekker «kjernen» i ITIL®, aktiviteter rundt administrasjon av tjenester, og utvider omfanget av ITIL® til å omfatte «oppre... [+]
Kurset fokuserer på integrering av forskjellige verdistrømmer og aktiviteter for å lage, levere og støtte IT-aktiverte produkter og tjenester, samtidig som den dekker støtte for praksis, metoder og verktøy. Kurset gir kandidatene forståelse for tjenestekvalitet og forbedringsmetoder. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Specialist: Create, Deliver and Support e-læring (engelsk) i 12 måneder. ITIL® 4 Specialist: Create, Deliver and Support online voucher til sertifiseringstest.   ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 12 måneder 8 000 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 40 minutter 5 600 kr
MoP®, er et rammeverk og en veiledning for styring av prosjekter og programmer i en portefølje. Sertifiseringen MoP Foundation gir deg en innføring i porteføljestyring me... [+]
Du vil få tilsendt en «Core guidance» bok og sertifiserings-voucher slik at du kan ta sertifiseringstesten for eksempel hjemme eller på jobb. Denne vil være gyldig i ett år. Tid for sertifiseringstest avtales som beskrevet i e-post med voucher. Eksamen overvåkes av en web-basert eksamensvakt.   Eksamen er på engelsk. Eksamensformen er multiple choice - 50 spørsmål skal besvares, og du består ved 50% korrekte svar (dvs 25 av 50 spørsmål). Deltakerne har 40 minutter til rådighet på eksamen.  Ingen hjelpemidler er tillatt.   Nødvendige forkunnskaper: Ingen [-]
Les mer
Virtuelt klasserom 3 timer 1 600 kr
Webinaret passer for deg som har de grunnleggende ferdighetene i Excel, men som vil lære mer om verktøyene i programmet. [+]
  Webinaret passer for deg som har de grunnleggende ferdighetene i Excel, men som vil lære mer om verktøyene i programmet. På kurset vil vi vise deg hvordan du kan jobbe mer effektivt ved å ta i bruk flere verktøy som ligger i systemet. Målet er at du etter endt kurs skal kunne jobbe raskere og mer effektivt når du produserer regneark. Temaer på webinaret: Datatyper i Excel Autofyll og serier Formatering og betinget formatering Formler med absolutte, relative og blandede referanser Bruk av navn i formler Noen praktiske funksjoner Lister og tabeller med sortering og filtrering Bygge diagram raskt og enkelt   Pris: 1600 kroner (Ansatte og studenter ved UiS har egne betingelser)   [-]
Les mer
Oslo 2 dager 12 900 kr
29 May
29 May
MS Project: Planlegging og oppfølging av prosjekter [+]
MS Project: Planlegging og oppfølging av prosjekter [-]
Les mer
Oslo 5 dager 27 900 kr
03 Jun
03 Jun
16 Sep
GDPR - Certified Data Protection Officer [+]
GDPR - Certified Data Protection Officer [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
Python is an object oriented rapid development language deployed in many scenarios in the modern world. [+]
COURSE OVERVIEW   This Python Programming 1 course is designed to give delegates the knowledge to develop and maintain Python scripts using the current version (V3) of Python. There are many similarities between Python V2 and Python V3. The skills gained on this course will allow the delegate to develop their own skills further using Python V2 or V3 to support the development and maintenance of scripts. The Python Programming 1 course comprises sessions dealing with syntax,variables and data types,operators and expressions,conditions and loops,functions,objects,collections,modules and packages,strings,pattern matching,exception handling,binary and text files,and databases. Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered. TARGET AUDIENCE The Python Programming 1 course course is aimed at those who want to improve their Python programming skills,and for developers/engineers who want to migrate to Python from another language,particularly those with little or no object-oriented knowledge. For those wishing to learn Python and have no previous knowledge of programming,they should look to attend our foundation course Introduction to Programming - Python. COURSE OBJECTIVES This course aims to provide the delegate with the knowledge to be able to produce Python scripts and applications that exploit all core elements of the language including variables,expressions,selection and iteration,functions,objects,collections,strings,modules,pattern matching,exception handling,I/O,and classes. COURSE CONTENT DAY 1 COURSE INTRODUCTION Administration and Course Materials Course Structure and Agenda Delegate and Trainer Introductions SESSION 1: GETTING STARTED About Python Python versions Python documentation Python runtimes Installing Python The REPL shell Python editors SESSION 2: PYTHON SCRIPTS & SYNTAX Script naming Comments Docstring Statements The backslash Code blocks Whitespace Console IO (to enable the writing of simple programs) A first Python program Script execution SESSION 3: VARIABLES & DATA TYPES Literals Identifiers Assignment Numbers (bool,int,float,complex) Binary,octal,and hexadecimal numbers Floating point accuracy Collections (str,list,tuple,set,dict) None Implicit and explicit type conversion (casting) The type function SESSION 4: OPERATORS & EXPRESSIONS Arithmetic Operators Assignment Operators Comparison Operators Logical Operators Membership Operators Bitwise Operators Identity Operators SESSION 5: CONDITIONS & LOOPS Conditional statements (if,elif,else) Nested conditional statements Short hand if/if else Python's alternative to the ternary operator Iterative statements (while,for,else) The range function Iterating over a list Break Continue Nested conditional/iterative statements COURSE CONTENTS - DAY 2 SESSION 6: FUNCTIONS Declaration Invocation Default values for parameters Named arguments args and kwargs Returning multiple values None returned Variable scope Masking and shadowing The pass keyword Recursive functions SESSION 7: OBJECTS AND CLASSES About objects Attributes and the dot notation The dir function Dunder attributes Mutability The id function Pass by reference Introduction to Classes Class Declaration and Instantiation Data attributes Methods Composition SESSION 8: LISTS About lists List syntax including slicing Getting and setting list elements Iterating over a list Checking for the presence of a value The len function List methods incl. append,insert,remove,pop,clear,copy,sort,reverse etc. The del keyword Appending to and combining lists List comprehension SESSION 9: TUPLES About tuples Tuple syntax Getting tuple elements including unpacking Iterating over a tuple Checking for the presence of a value The len function Appending to and combining tuples SESSION 10: SETS About Sets Dictionary syntax Creating,adding and removing set elements Iterating over a set Membership Testing Sorting Copying Set methods incl. union,intersection,difference,symmetric_difference etc. COURSE CONTENTS - DAY 3 SESSION 11: DICTIONARIES About dictionaries Dictionary syntax Getting and setting dictionary elements Iterating over a dictionary (keys,values,and items) Checking for the presence of a key The len function Dictionary methods incl. keys,values,items,get,pop,popitem,clear etc. The del keyword Dictionary comprehension SESSION 12: STRINGS About strings String syntax including slicing Escape characters Triple-quoted strings Concatenation Placeholders The format method Other methods e.g. endswith,find,join,lower,replace,split,startswith,strip,upper etc. A string as a list of bytes SESSION 13: MODULES & PACKAGES About modules Inbuilt modules math,random and platform the dir() and help() functions Creating and using modules the __pycache__ and the .pyc files The module search path Importing modules Namespaces Importing module objects The import wildcard Aliases Importing within a function Executable modules Reloading a module About packages Importing packaged modules Importing packaged module objects Package initialisation Subpackages Referencing objects in sibling packages The Standard Library Installing modules and packages using pip SESSION 14: PATTERN MATCHING About regular expressions Regular expression special characters Raw strings About the re module re module functions incl. match,search,findall,full match,split,sub   COURSE CONTENTS - DAY 4 SESSION 15: EXCEPTION HANDLING About exceptions and exception handling Handling exceptions (try,except,else,finally) Exception types The exception object Raising exceptions Custom exception types Built-in exceptions hierarchy SESSION 16: FILES & THE FILESYSTEM The open function Methods for seeking (seekable,seek) Methods for reading from a file (readable,read,readline,readlines) Iterating over a file Methods for writing to a file (writable,write,writelines) Introduction to context managers Text encoding schemes,codepoints,codespace ASCII and UNICODE (UTF schemes) UTF-8,binary and hexadecimal representations The ord() and chr() functions Binary files,bytes and bytearray I/O layered abstraction. About the os module os module functions incl. getcwd,listdir,mkdir,chdir,remove,rmdir etc. OSError numbers and the errno module SESSION 17: DATABASES The DB-API DP-API implementations Establishing a connection Creating a cursor Executing a query Fetching results Transactions Inserting,updating,and deleting records FOLLOW ON COURSES Python Programming 2  Data Analysis Python  Apache Web Server PHP Programming  PHP & MySQL for Web Development  PHP & MariaDB for Web Development  Perl Programming  Ruby Programming  Introduction to MySQL  Introduction to MariaDB [-]
Les mer
Oslo Bergen 5 dager 43 500 kr
10 Jun
10 Jun
24 Jun
ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies [+]
ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies [-]
Les mer
Oslo Bergen Og 1 annet sted 2 dager 16 900 kr
06 Jun
13 Jun
20 Jun
Modern Service Oriented Architecture [+]
Modern Service Oriented Architecture [-]
Les mer
Virtuelt klasserom 4 dager 20 000 kr
This four-day instructor-led course is designed for IT professionals who configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW These professionals manage and support an infrastructure that includes on-premises and Azure IaaS-hosted Windows Server-based workloads. The course teaches IT professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to manage and secure Azure VMs running Windows Server. The course also covers how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights various administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. COURSE OBJECTIVES After you complete this course you will be able to: Harden the security configuration of the Windows Server operating system environment. Enhance hybrid security using Azure Security Center, Azure Sentinel, and Windows Update Management. Apply security features to protect critical resources. Implement high availability and disaster recovery solutions. Implement recovery services in hybrid scenarios. Plan and implement hybrid and cloud-only migration, backup, and recovery scenarios. Perform upgrades and migration related to AD DS, and storage. Manage and monitor hybrid scenarios using WAC, Azure Arc, Azure Automation and Azure Monitor. Implement service monitoring and performance monitoring, and apply troubleshooting. COURSE CONTENT Module 1: Windows Server security This module discusses how to protect an Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. The module covers how to limit authentication scope and remediate potentially insecure accounts. The module also describes how to harden the security configuration of a Windows Server operating system environment. In addition, the module discusses the use of Windows Server Update Services to deploy operating system updates to computers on the network. Finally, the module covers how to secure Windows Server DNS to help protect the network name resolution infrastructure. Lessons for module 1 Secure Windows Sever user accounts Hardening Windows Server Windows Server Update Management Secure Windows Server DNS Lab : Configuring security in Windows Server Configuring Windows Defender Credential Guard Locating problematic accounts Implementing LAPS After completing module 1, students will be able to: Diagnose and remediate potential security vulnerabilities in Windows Server resources. Harden the security configuration of the Windows Server operating system environment. Deploy operating system updates to computers on a network by using Windows Server Update Services. Secure Windows Server DNS to help protect the network name resolution infrastructure. Implement DNS policies. Module 2: Implementing security solutions in hybrid scenarios This module describes how to secure on-premises Windows Server resources and Azure IaaS workloads. The module covers how to improve the network security for Windows Server infrastructure as a service (IaaS) virtual machines (VMs) and how to diagnose network security issues with those VMs. In addition, the module introduces Azure Security Center and explains how to onboard Windows Server computers to Security Center. The module also describes how to enable Azure Update Management, deploy updates, review an update assessment, and manage updates for Azure VMs. The modules explains how Adaptive application controls and BitLocker disk encryption are used to protect Windows Server IaaS VMs. Finally, the module explains how to monitor Windows Server Azure IaaS VMs for changes in files and the registry, as well as monitoring modifications made to application software. Lessons for module 2 Implement Windows Server IaaS VM network security. Audit the security of Windows Server IaaS Virtual Machines Manage Azure updates Create and implement application allowlists with adaptive application control Configure BitLocker disk encryption for Windows IaaS Virtual Machines Implement change tracking and file integrity monitoring for Windows Server IaaS VMs Lab : Using Azure Security Center in hybrid scenarios Provisioning Azure VMs running Windows Server Configuring Azure Security Center Onboarding on-premises Windows Server into Azure Security Center Verifying the hybrid capabilities of Azure Security Center Configuring Windows Server 2019 security in Azure VMs After completing module 2, students will be able to: Diagnose network security issues in Windows Server IaaS virtual machines. Onboard Windows Server computers to Azure Security Center. Deploy and manage updates for Azure VMs by enabling Azure Automation Update Management. Implement Adaptive application controls to protect Windows Server IaaS VMs. Configure Azure Disk Encryption for Windows IaaS virtual machines (VMs). Back up and recover encrypted data. Monitor Windows Server Azure IaaS VMs for changes in files and the registry. Module 3: Implementing high availability This module describes technologies and options to create a highly available Windows Server environment. The module introduces Clustered Shared Volumes for shared storage access across multiple cluster nodes. The module also highlights failover clustering, stretch clusters, and cluster sets for implementing high availability of Windows Server workloads. The module then discusses high availability provisions for Hyper-V and Windows Server VMs, such as network load balancing, live migration, and storage migration. The module also covers high availability options for shares hosted on Windows Server file servers. Finally, the module describes how to implement scaling for virtual machine scale sets and load-balanced VMs, and how to implement Azure Site Recovery. Lessons for module 3 Introduction to Cluster Shared Volumes. Implement Windows Server failover clustering. Implement high availability of Windows Server VMs. Implement Windows Server File Server high availability. Implement scale and high availability with Windows Server VMs. Lab : Implementing failover clustering Configuring iSCSI storage Configuring a failover cluster Deploying and configuring a highly available file server Validating the deployment of the highly available file server After completing module 3, students will be able to: Implement highly available storage volumes by using Clustered Share Volumes. Implement highly available Windows Server workloads using failover clustering. Describe Hyper-V VMs load balancing. Implement Hyper-V VMs live migration and Hyper-V VMs storage migration. Describe Windows Server File Server high availablity options. Implement scaling for virtual machine scale sets and load-balanced VMs. Implement Azure Site Recovery. Module 4: Disaster recovery in Windows Server This module introduces Hyper-V Replica as a business continuity and disaster recovery solution for a virtual environment. The module discusses Hyper-V Replica scenarios and use cases, and prerequisites to use it. The module also discusses how to implement Azure Site Recovery in on-premises scenarios to recover from disasters. Lessons for module 4 Implement Hyper-V Replica Protect your on-premises infrastructure from disasters with Azure Site Recovery Lab : Implementing Hyper-V Replica and Windows Server Backup Implementing Hyper-V Replica Implementing backup and restore with Windows Server Backup After completing module 4, students will be able to: Describe Hyper-V Replica, pre-requisites for its use, and its high-level architecture and components Describe Hyper-V Replica use cases and security considerations. Configure Hyper-V Replica settings, health monitoring, and failover options. Describe extended replication. Replicate, failover, and failback virtual machines and physical servers with Azure Site Recovery. Module 5: Implementing recovery services in hybrid scenarios This module covers tools and technologies for implementing disaster recovery in hybrid scenarios, whereas the previous module focus on BCDR solutions for on-premises scenarios. The module begins with Azure Backup as a service to protect files and folders before highlighting how to implementRecovery Vaults and Azure Backup Policies. The module describes how to recover Windows IaaS virtual machines, perform backup and restore of on-premises workloads, and manage Azure VM backups. The modules also covers how to provide disaster recovery for Azure infrastructure by managing and orchestrating replication, failover, and failback of Azure virtual machines with Azure Site Recovery. Lessons for module 5 Implement hybrid backup and recovery with Windows Server IaaS Protect your Azure infrastructure with Azure Site Recovery Protect your virtual machines by using Azure Backup Lab : Implementing Azure-based recovery services Implementing the lab environment Creating and configuring an Azure Site Recovery vault Implementing Hyper-V VM protection by using Azure Site Recovery vault Implementing Azure Backup After completing module 5, students will be able to: Recover Windows Server IaaS virtual machines by using Azure Backup. Use Azure Backup to help protect the data for on-premises servers and virtualized workloads. Implement Recovery Vaults and Azure Backup policies. Protect Azure VMs with Azure Site Recovery. Run a disaster recovery drill to validate protection. Failover and failback Azure virtual machines. Module 6: Upgrade and migrate in Windows Server This module discusses approaches to migrating Windows Server workloads running in earlier versions of Windows Server to more current versions. The module covers the necessary strategies needed to move domain controllers to Windows Server 2022 and describes how the Active Directory Migration Tool can consolidate domains within a forest or migrate domains to a new AD DS forest. The module also discusses the use of Storage Migration Service to migrate files and files shares from existing file servers to new servers running Windows Server 2022. Finally, the module covers how to install and use the Windows Server Migration Tools cmdlets to migrate commonly used server roles from earlier versions of Windows Server. Lessons for module 6 Active Directory Domain Services migration Migrate file server workloads using Storage Migration Service Migrate Windows Server roles Lab : Migrating Windows Server workloads to IaaS VMs Deploying AD DS domain controllers in Azure Migrating file server shares by using Storage Migration Service After completing module 6, students will be able to: Compare upgrading an AD DS forest and migrating to a new AD DS forest. Describe the Active Directory Migration Tool (ADMT). Identify the requirements and considerations for using Storage Migration Service. Describe how to migrate a server with storage migration. Use the Windows Server Migration Tools to migrate specific Windows Server roles. Module 7: Implementing migration in hybrid scenarios This module discusses approaches to migrating workloads running in Windows Server to an infrastructure as a service (IaaS) virtual machine. The module introduces using Azure Migrate to assess and migrate on-premises Windows Server instances to Microsoft Azure. The module also covers how migrate a workload running in Windows Server to an infrastructure as a service (IaaS) virtual machine (VM) and to Windows Server 2022 by using Windows Server migration tools or the Storage Migration Service. Finally, this module describes how to use the Azure Migrate App Containerization tool to containerize and migrate ASP.NET applications to Azure App Service. Lessons for module 7 Migrate on-premises Windows Server instances to Azure IaaS virtual machines Upgrade and migrate Windows Server IaaS virtual machines Containerize and migrate ASP.NET applications to Azure App Service Lab : Migrating on-premises VMs servers to IaaS VMs Implementing assessment and discovery of Hyper-V VMs using Azure Migrate Implementing migration of Hyper-V workloads using Azure Migrate After completing module 7, students will be able to: Plan a migration strategy and choose the appropriate migration tools. Perform server assessment and discovery using Azure Migrate. Migrate Windows Server workloads to Azure VM workloads using Azure Migrate. Explain how to migrate workloads using Windows Server Migration tools. Migrate file servers by using the Storage Migration Service. Discover and containerize ASP.NET applcations running on Windows. Migrate a containerized application to Azure App Service. Module 8: Server and performance monitoring in Windows Server This module introduces a range of tools to monitor the operating system and applications on a Windows Server computer as well as describing how to configure a system to optimize efficiency and to troublshoot problems. The module covers how Event Viewer provides a convenient and accessible location for observing events that occur, and how to interpret the data in the event log. The module also covers how to audit and diagnose a Windows Server environment for regulatory compliance, user activity, and troubleshooting. Finally, the module explains how to troubleshoot AD DS service failures or degraded performance, including recovery of deleted objects and the AD DS database, and how to troubleshoot hybrid authentication issues. Lessons for module 8 Monitor Windows Server performance Manage and monitor Windows Server event logs Implement Windows Server auditing and diagnostics Troubleshoot Active Directory Lab : Monitoring and troubleshooting Windows Server Establishing a performance baseline Identifying the source of a performance problem Viewing and configuring centralized event logs After completing module 8, students will be able to: Explain the fundamentals of server performance tuning. Use built-in tools in Windows Server to monitor server performance. Use Server Manager and Windows Admin Center to review event logs. Implement custom views. Configure an event subscription. Audit Windows Server events. Configure Windows Server to record diagnostic information. Recover the AD DS database and objects in AD DS. Troubleshoot AD DS replication. Troubleshoot hybrid authentication issues. Module 9: Implementing operational monitoring in hybrid scenarios This module covers using monitoring and troubleshooing tools, processes, and best practices to streamline app performance and availabilty of Windows Server IaaS VMs and hybrid instances. The module describes how to implement Azure Monitor for IaaS VMs in Azure, implement Azure Monitor in on-premises environments, and use dependency maps. The module then explains how to enable diagnostics to get data about a VM, and how to view VM metrics in Azure Metrics Explorer, and how to create a metric alert to monitor VM performance. The module then covers how to monitor VM performance by using Azure Monitor VM Insights. The module then describes various aspects of troubleshooting on premises and hybrid network connectivity, including how to diagnose common issues with DHCP, name resolution, IP configuration, and routing. Finally, the module examines how to troubleshoot configuration issues that impact connectivity to Azure-hosted Windows Server virtual machines (VMs), as well as approaches to resolve issues with VM startup, extensions, performance, storage, and encryption. Lessons for module 9 Monitor Windows Server IaaS Virtual Machines and hybrid instances Monitor the health of your Azure virtual machines by using Azure Metrics Explorer and metric alerts Monitor performance of virtual machines by using Azure Monitor VM Insights Troubleshoot on-premises and hybrid networking Troubleshoot Windows Server Virtual Machines in Azure Lab : Monitoring and troubleshooting of IaaS VMs running Windows Server Enabling Azure Monitor for virtual machines Setting up a VM with boot diagnostics Setting up a Log Analytics workspace and Azure Monitor VM Insights After completing module 9, students will be able to: Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. View VM metrics in Azure Metrics Explorer. Use monitoring data to diagnose problems. Evaluate Azure Monitor Logs and configure Azure Monitor VM Insights. Configure a Log Analytics workspace. Troubleshoot on-premises connectivity and hybrid network connectivity. Troubleshoot AD DS service failures or degraded performance. Recover deleted security objects and the AD DS database. Troubleshoot hybrid authentication issues. [-]
Les mer
Oslo 3 dager 21 000 kr
09 Sep
09 Sep
ITIL® 4 Specialist: Monitor, Support and Fulfil [+]
ITIL® 4 Specialist: Monitor, Support and Fulfil [-]
Les mer
Nettkurs 2 timer 1 990 kr
Synes du det er uoversiktlig å samarbeide om dokumenter med andre? Vi lærer deg de viktigste funksjonene og metodene for vellykket dokument-samhandling og ferdigstillin..... [+]
Synes du det er uoversiktlig å samarbeide om dokumenter med andre? Vi lærer deg de viktigste funksjonene og metodene for vellykket dokument-samhandling og ferdigstilling av dokumenter. Webinaret varer i 2 timer og består av to økter à 45 min. Etter hver økt er det 10 min spørsmålsrunde. Mellom øktene er det 10 min pause. Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.   Kursinnhold:   Samarbeidsfunksjoner Spor endringer for å se hvem som har gjort hva Bruk av merknader Sammenligne dokumenter Passordbeskytte dokumenter   Filer i SharePoint, OneDrive for Business og OneDrive Samtidigredigering Versjonering   Før publisering Fjerne skjulte data Fjerne personlig informasjon   3 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Gratis support [-]
Les mer
Virtuelt klasserom 5 timer 33 000 kr
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE BOOTCAMP [+]
COURSE OVERVIEW The Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency.   Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class.   TARGET AUDIENCE Individuals involved in the deployment and maintenance of the Cisco ISE platform. COURSE OBJECTIVES After completing this course you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party network access devices (NADs), Cisco TrustSec®, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authentication, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. COURSE CONTENT Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Fucntions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Services Configure Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning Working with Network Access Devices Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Labs Lab 1: Access the SISE Lab and Install ISE 2.4 Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage  Lab 3: Integrate Cisco ISE with Active Directory Lab 4: Configure Cisco ISE Policy Lab 5: Configure Access Policy for Easy Connect Lab 6: Configure Guest Access Lab 7: Configure Guest Access Operations Lab 8: Create Guest Reports Lab 9: Configure Profiling Lab 10: Customize the Cisco ISE Profiling Configuration Lab 11: Create Cisco ISE Profiling Reports Lab 12: Configure BYOD Lab 13: Blacklisting a Device Lab 14: Configure Cisco ISE Compliance Services Lab 15: Configure Client Provisioning Lab 16: Configure Posture Policies Lab 17: Test and Monitor Compliance Based Access Lab 18: Test Compliance Policy Lab 19: Configure Cisco ISE for Basic Device Administration Lab 20: Configure TACACS+ Command Authorization   [-]
Les mer
Nettkurs 375 kr
Kurs med Daniel Webb som lærer deg grunnleggende ferdigheter i Power BI. [+]
  Kurs med Daniel Webb som lærer deg grunnleggende ferdigheter  i Power BI.   I vår moderne verden er det data overalt – i bilen, ute, hjemme og ikke minst på jobb. Å ha kontroll på dataene er viktigere enn noensinne, og da gjelder det å gjøre informasjon lett tilgjengelig for rett person på rett sted og til rett tid. Power BI er Microsofts Business Intelligence-verktøy, og kan hjelpe deg med hele prosessen fra innhenting av data til ferdig rapport. Power BI er ypperlig for å tilgjengeliggjøre, dele og samarbeide om viktig informasjon med det resultatet at du kan ta faktabaserte valg og beslutninger. Power BI er tett integrert med Microsoft sine andre løsninger, bl.a. Excel, Teams og Power Platform. I dette kurset bruker Daniel Webb Power BI til å lage en salgsrapport basert på data fra en Excel-fil. Du vil lære deg de grunnleggende ferdighetene for å kunne lage dine egne rapporter i Power BI Desktop, samt få en oversikt over hele Power BI-økosystemet og hvordan ting henger sammen.    Leksjoner Introduksjon til kurset Power BI – Introduksjon og oversikt Power BI Desktop Power BI Service Power BI – lisensiering Introduksjon til Get Data Import vs Direct Query vs Live Connection Gjennomgang av ofte brukte data connectors Excel connector, lokale filer og gateways Introduksjon tll Power Query Arbeid med første data Query Import av andre queries Datamodelleringsteori Modellering i praksis DAX og measures Å skrive DAX DAX-eksempler Quick measures Report view i Power BI Desktop Hvilken visual skal du bruke? Slicers og filters Setter ting sammen Workspaces i Power BI Service Workspace-elementer – reports, datasets og dashboards Deling og samarbeid Oppsummering   [-]
Les mer
Nettkurs 3 timer 3 120 kr
I de fleste prosjekter skal bygget/byggene plasseres geografisk i henhold til et koordinatsystem. [+]
NTI leverer opplæring for å forenkle og effektivisere din arbeidshverdag Årlig utdanner over 8.000 personer seg i ulike CAD- og BIM-løsninger hos NTI.Vi har mer enn 70 forskjellige kurs innen fagområdene CAD/BIM-, Industri, Prosess, Plant og Infrastruktur- og dokumenthåndtering, og i snitt har våre 100 konsulenter og instruktører mer enn 10 års erfaring med opplæring og konsulenttjenester. Hvordan få riktig oppsett av koordinater i prosjekt? Dette er et tema NTI merker stor pågang rundt til support, og henvendelsene kommer fra disipliner som byggteknikk, VVS og elektro i tillegg til arkitekt. Det er ofte arkitekten som setter opp koordinatene i Revit. Hvis utgangspunktet er feil, påvirkes dette i alle andre disipliner også. Spesielt der det er krav til at utvekslingsformatet er IFC. På dette online-kurset vil du lære: Forskjellen mellom de ulike koordinatsystemene Hva er et lokalt nullpunkt Sette opp reelle koordinater (Survey) «Best Practice» i oppsett av koordinater fra start Samhandling ved utveksling av filer og koordinater Behandle flere koordinatsystemer i samme prosjekt IFC export/import i forhold til delte koordinater Det kan gå noe tid mellom hver gang du setter opp koordinater, og det er lett å glemme prosessen. Etter gjennomført kurs, får du en «step by step» dokumentasjon, som kan benyttes som oppslagsverk senere.  Kurs på dine betingelser!Ditt firma har kanskje investert i ny CAD-programvare, oppgradert til ny versjon, oppdatert til ny programvare eller dere trenger rett og slett oppfriskning. Da er det på tide å investere i kompetanse for dine ansatte! Kontakt vår kurskoordinator Wenche, telefon 21 40 27 89 eller epost. [-]
Les mer