IT-kurs
Kurs i programvare og applikasjoner
Rogaland
Du har valgt: Stavanger
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Stavanger ) i Kurs i programvare og applikasjoner
 

Nettkurs 40 minutter 5 600 kr
MoP®, er et rammeverk og en veiledning for styring av prosjekter og programmer i en portefølje. Sertifiseringen MoP Foundation gir deg en innføring i porteføljestyring me... [+]
Du vil få tilsendt en «Core guidance» bok og sertifiserings-voucher slik at du kan ta sertifiseringstesten for eksempel hjemme eller på jobb. Denne vil være gyldig i ett år. Tid for sertifiseringstest avtales som beskrevet i e-post med voucher. Eksamen overvåkes av en web-basert eksamensvakt.   Eksamen er på engelsk. Eksamensformen er multiple choice - 50 spørsmål skal besvares, og du består ved 50% korrekte svar (dvs 25 av 50 spørsmål). Deltakerne har 40 minutter til rådighet på eksamen.  Ingen hjelpemidler er tillatt.   Nødvendige forkunnskaper: Ingen [-]
Les mer
Oslo 5 dager 27 500 kr
22 Apr
10 Jun
10 Jun
AZ-305: Microsoft Azure Architect Design [+]
AZ-305: Microsoft Azure Architect Design [-]
Les mer
Oslo Bergen 5 dager 43 500 kr
10 Jun
10 Jun
24 Jun
ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies [+]
ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
The Implementing and Operating Cisco Enterprise Network Core Technologies course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterpri... [+]
COURSE OVERVIEW  Learn how to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. The automation and programmability of Enterprise networks is also incorporated in this course. This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 CE credits toward recertification   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 3 days of self study. The self-study content will be provided as part of the digital courseware that you receive at the beginning of the course and should be part of your preparation for the exam. Additional lab access will be provided at the end of the class, this will be valid for 60 hours or 90 days whichever is the shorter. It will be possible to complete all but 7 of the labs after the class. TARGET AUDIENCE Network engineers involved in the installation, support and troubleshooting of enterprise networks. COURSE OBJECTIVES After completing this course you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using EtherChannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Centre™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Centre and vManage COURSE CONTENT Examining Cisco Enterprise Network Architecture Cisco Enterprise Architecture Model Campus LAN Design Fundamentals Traditional Multilayer Campus Layer Design Campus Distribution Layer Design   Understanding Cisco Switching Paths Layer 2 Switch Operation Control and Data Plane Cisco Switching Mechanisms Implementing Campus LAN Connectivity Revisiting VLANs Trunking with 802.1Q Inter-VLAN Routing Building Redundant Switched Topology Spanning-Tree Protocol Overview Spanning-Tree Protocol Operation Spanning-Tree Protocols Types and Features Multiple Spanning Tree Protocol PortFast and BPDU Implementing Layer 2 Port Aggregation (Self-Study) Need for EtherChannel EtherChannel Mode Interactions Layer 2 EtherChannel Configuration Guidelines EtherChannel Load-Balancing Options Troubleshoot EtherChannel Issues Understanding EIGRP EIGRP Features EIGRP Reliable Transport Establishing EIGRP Neighbour Adjacency EIGRP Metrics EIGRP Path Selection Explore EIGRP Path Selection Explore EIGRP Load Balancing and Sharing EIGRP for IPv6 Compare EIGRP and OSPF Routing Protocols Implementing OSPF Describe OSPF The OSPF Process OSPF Neighbour Adjacencies Building a Link-State Database OSPF LSA Types Compare Single-Area and Multi-Area OSPF OSPF Area Structure OSPF Network Types Optimizing OSPF OSPF Cost OSPF Route Summarization Benefits OSPF Route Filtering Tools Compare OSPFv2 and OSPFv3 Exploring EBGP Interdomain Routing with BGP BGP Operations Types of BGP Neighbour Relationships BGP Path Selection BGP Path Attributes Implementing Network Redundancy Need for Default Gateway Redundancy Define FHRP HSRP Advanced Features Cisco Switch High Availability Features Implementing NAT Define Network Address Translation NAT Address Types Explore NAT Implementations NAT Virtual Interface Introducing Virtualisation Protocols and Techniques Server Virtualisation Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Introducing Virtualisation Protocols and Techniques Server Virualization Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Understanding Virtual Private Networks and Interfaces Site-to-Site VPN Technologies IPSec VPN Overview IPSec: IKE IPsec Modes IPsec VPN Types Cisco IOS VTI Understanding Wireless Principles Explain RF Principles Describe Watts and Decibels Describe Antenna Characteristics Describe IEEE Wireless Standards Identify Wireless Component Roles Examining Wireless Deployment Options Wireless Deployment Overview Describe Autonomous AP Deployment Describe Centralized Cisco WLC Deployment Describe FlexConnect Deployment Cloud Deployment and Its Effect on Enterprise Networks Describe the Cloud-Managed Meraki Solution Cisco Catalyst 9800 Series Controller Deployment Options Describe Cisco Mobility Express Understanding Wireless Roaming and Location Services Wireless Roaming Overview Mobility Groups and Domains Wireless Roaming Types Describe Location Services Examining Wireless AP Operation Universal AP Priming Explore the Controller Discovery Process Describe AP Failover Explain High Availability Explore AP Modes Understanding Wireless Client Authentication Authentication Methods Pre-Shared Key (PSK) Authentication 802.1X User Authentication Overview PKI and 802.1X Certificate Based Authentication Introduction to Extensible Authentication Protocol EAP-Transport Layer Security (EAP-TLS) Protected Extensible Authentication Protocol EAP-FAST Guest Access with Web Auth Troubleshooting Wireless Client Connectivity Wireless Troubleshooting Tools Overview Spectrum Analysis Wi-Fi Scanning Packet Analysis Cisco AireOS GUI and CLI Tools Cisco Wireless Config Analyzer Express Common Wireless Client Connectivity Issues Overview Client to AP Connectivity WLAN Configuration Infrastructure Configuration Introducing Multicast Protocols (Self-study) Multicast Overview Internet Group Management Protocol Multicast Distribution Trees IP Multicasting Routing Rendezvous Point Introducing QoS (Self-study) Understand the Impact of User Applications on the Network Need for Quality of Service (QoS) Describe QoS Mechanisms Define and Interpret a QoS Policy Implementing Network Services Understanding Network Time Protocol Logging Services Simple Network Management Protocol Introducing NetFlow Flexible NetFlow Understanding Cisco IOS Embedded Event Manager Using Network Analysis Tools Troubleshooting Concepts Network Troubleshooting Procedures: Overview Network Troubleshooting Procedures: Case Study Basic Hardware Diagnostics Filtered Show Commands Cisco IOS IP SLAs Switched Port Analyzer(SPAN) Overview Remote SPAN (RSPAN) Encapsulated Remote Switched Port Analyzer(ERSAPN) Cisco Packet Capture Tools Overview Implementing Infrastructure Security ACL Overview ACL Wildcard Masking Types of ACLs Configure Numbered Access Lists Use ACLs to Filter Network Traffic Apply ACLs to Interfaces Configured Named Access Lists Control Plane Overview Control Plane Policing Implementing Secure Access Control Securing Device Access AAA Framework Overview Benefits of AAA Usage Authentication Options RADIUS and TACACS+ Enabling AAA and Configuring a Local User for Fallback Configuring RADIUS for Console and VTY Access Configuring TACACS+ for Console and VTY Access Configure Authorization and Accounting Understanding Enterprise Network Security Architecture (Self-study) Explore Threatscape Cisco Intrusion Prevention Systems Virtual Private Networks Content Security Logging Endpoint Security Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Firewall Concepts TrustSec MACsec Identity Management 802.1X for Wired and Wireless Endpoint Authentication MAC Authentication Bypass Web Authentication Exploring Automation and Assurance Using Cisco DNA Centre (Self-study) Need for Digital Transformation Cisco Digital Network Architecture Cisco Intent-Based Networking Cisco DNA Centre Automation Overview Cisco DNA Centre Platform Overview Cisco DNA Centre Design Cisco DNA Centre Inventory Overview Cisco DNA Centre Configuration and Management Overview Onboarding of Network Devices Using Cisco DNA Centre Cisco DNA Centre Software Image Management Overview Cisco DNA Assurance Key Features and Use Cases Cisco DNA Centre Assurance Implementation Workflow Examining the Cisco SD-Access Solution (Self-study) Need for Cisco SD-Access Cisco SD Access Overview Cisco SD-Access Fabric Components Cisco SD-Access Fabric Control Plane Based on LISP Cisco SD-Access Fabric Control Plane Based on VXLAN Cisco SD-Access Fabric Control Plane Based on Cisco TrustSec Role of Cisco ISE and Cisco DNA Centre in SD-Access Cisco SD-Access Wireless Integration Traditional Campus Interoperating with Cisco SD-Access Understanding the Working Principles of the Cisco SD-WAN Solution (Self-study) Need for Software Defined Networking for WAN Cisco SD-WAN Components and Functions Cisco SD-WAN Orchestration Plane Cisco SD-WAN Management Plane- vManage Cisco SD-WAN Control Plane - vSmart Cisco SD-WAN Data Plane - WAN Edge Cisco SD-WAN Programmatic APIs Cisco SD-WAN Automation and Analytics Cisco SD-WAN Terminology Cisco IOS XE and IOS XE SD-WAN Software Flexible Controller Deployment Options Cisco SD-WAN Security Understanding the Basics of Python Programming Describe Python Concepts String Data Types Numbers Data Types Boolean Data Types Script Writing and Execution Analyse Code Introducing Network Programmability Protocols Configuration Management Evolution of Device Management and Programmability Data Encoding Formats Understanding JSON Model Driven Programmability Stack Introduction to YANG Types of YANG Models Understanding NETCONF Explain NETCONF and YANG REST Understanding RESTCONF Protocol Introducing APIs in Cisco DNA Centre and vManage (Self-study) Application Programming Interfaces REST API Response Codes and Results REST API Security Cisco DNA Centre APIs Cisco SD-WAN REST API Overview Labs Lab 1: Investigate the CAM Lab 2: Analyse Cisco Express Forwarding Lab 3: Troubleshoot VLAN and Trunk Issues Lab 4: Tuning STP and Configuring RSTP Lab 5: Configure Multiple Spanning Tree Protocol Lab 6: Troubleshoot EtherChannel Lab 7: Implementing Multiarea OSPF Lab 8: Implement OSPF Tuning Lab 9: Apply OSPF Optimization Lab 10: Implement OSPFv3 Lab 11: Configure and Verify Single-Homed EBGP Lab 12: Implementing HSRP Lab 13: Configure VRRP Lab 14: Implement NAT Lab 15: Configure and Verify VRF Lab 16: Configure and Verify a GRE Tunnel Lab 17: Configure Static VTI Point-to-Point Tunnels Lab 18: Configure Wireless Client Authentication in a Centralized Deployment (No Extended Access) Lab 19: Troubleshoot Wireless Client Connectivity Issues (No Extended Access) Lab 20: Configure Syslog Lab 21: Configure and Verify Flexible NetFlow Lab 22: Configuring Cisco IOS Embedded Event Manager (EEM) Lab 23: Troubleshoot Connectivity and Analyse Traffic with Ping, Traceroute and Debug Lab 24: Configure and Verify Cisco IP SLA's Lab 25: Configure Standard and Extended ACLs Lab 26: Configure Control Plane Policing Lab 27: Implement Local and Server-Based AAA (No Extended Access) Lab 28: Writing and Troubleshooting Python Scripts (No Extended Access) Lab 29: Explore JSON Objects and Scripts in Python (No Extended Access) Lab 30: Use NETCONF via SSH (No Extended Access) Lab 31: Use RESTCONF with Cisco IOS XE Software (No Extended Access) [-]
Les mer
Nettkurs 2 timer 1 690 kr
Tekst er ikke alltid best egnet til å kommunisere ditt budskap. Dette webinaret viser deg hvordan du enkelt og effektivt benytter figurer, smart art modeller, diagrammer.... [+]
Tekst er ikke alltid best egnet til å kommunisere ditt budskap. Dette webinaret viser deg hvordan du enkelt og effektivt benytter figurer, smart art modeller, diagrammer, bilder og video. Du får en rekke tips som vil bidra til at du sparer mye tid.  Webinaret varer i 2 timer og består av to økter à 45 min. Etter hver økt er det 10 min spørsmålsrunde. Mellom øktene er det 10 min pause.  Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.    Kursinnhold:   Innsetting av ulike objekter Figurer og SmartArt Bilder Video - ha kontroll på avspilling   Bruk av diagrammer Koblinger til Excel Håndtere koblinger   Håndtering av objekter Justere og fordele Fordeler og ulemper ved gruppering   3 gode grunner til å delta 1. Lær og justere og fordele objekter effektivt 2. Lag figurmodeller raskt og enkelt 3. Ha kontroll på koblede objekter   [-]
Les mer
Virtuelt klasserom 3 timer 1 600 kr
Med pivottabeller kan du på en rask og elegant måte summere, analysere, granske og presentere dine data med få klikk. [+]
Med pivottabeller kan du på en rask og elegant måte summere, analysere, granske og presentere dine data med få klikk. Har du store mengder data i Excel? Med verktøyet pivottabeller i Excel har du et kraftig verktøy som gjør at du raskt og enkelt sammenfatter hovedtall for store mengder data. I databehandling er en pivottabell et datavisualiseringsverktøy, og i Excel er dette verktøyet ypperlig for å trekke ut konklusjoner fra store mengder data. Blant andre funksjoner kan en pivottabell automatisk sortere, telle, summere totaler eller gjennomsnitt av de data som er lagret i en tabell eller regneark, og resultatene vises i en annen tabell som viser sammenfattet data. Med pivottabeller kan du på en rask og elegant måte summere, analysere, granske og presentere dine data med få klikk. Pivottabeller gir deg en svært effektiv måte å justere hvordan dine resultater skal vises. På basis av dine pivottabeller kan du også opprette flotte pivotdiagrammer som automatisk oppdateres når det gjøres endringer i dine pivottabeller.  Forkunnskap: Du bør være godt kjent med å jobbe i Microsoft Excel tidligere, og ha forståelse for bruk av formler og funksjoner. Hva er en pivottabell Forstå de ulike datatypene i Excel Opprettet pivottabeller basert på lister eller tabeller Jobbe med pivottabellrapporter Bruk av felt Gruppering i pivottabeller Pivottabelldiagrammer Slicers Tidslinjer Oppdatering av pivottabeller Lag egne kalkyler i pivottabeller Formatering og endring av utseende i pivottabeller Datamodeller & spørringer [-]
Les mer
Oslo 4 dager 22 500 kr
10 Jun
10 Jun
16 Sep
https://www.glasspaper.no/kurs/az-500/ [+]
AZ-500: Microsoft Azure Security Technologies [-]
Les mer
Nettkurs 8 timer 349 kr
I dette kurset lærer du å bruke Adobe Illustrator på et profesjonelt nivå - og det kreves ingen forkunnskaper for å ta kurset. I begynnelsen av kurset lærer du hvordan pr... [+]
Dette kurset, ledet av Espen Faugstad, er din omfattende guide til å mestre Adobe Illustrator på et profesjonelt nivå, uten at det kreves noen forkunnskaper. Kurset starter med grunnleggende, som å forstå programmet, dets verktøy og paneler, og lærer deg raskt å jobbe effektivt med lag, objekter, og grunnleggende geometriske figurer. Etter hvert som kurset utvikler seg, vil du dykke dypere inn i Illustrator og lære å tegne komplekse figurer med pennverktøyet, som er essensielt for å skape avansert grafikk i Illustrator. Kurset dekker også objektmanipulering, fargebruk, maling med pensler, tekst og typografi, effekter, bildehåndtering, og mye mer. Ved slutten av kurset vil du ha opparbeidet deg en solid forståelse og ferdigheter for å jobbe profesjonelt med Illustrator og vektorbasert grafikk.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Dokument Kapittel 3: Verktøy Kapittel 4: Velge og ordne objekter Kapittel 5: Linjer og figurer Kapittel 6: Tegne objekter Kapittel 7: Redigere objekter Kapittel 8: Farger Kapittel 9: Male Kapittel 10: Tekst Kapittel 11: Effekter Kapittel 12: Bilder Kapittel 13: Eksportere Kapittel 14: Avslutning   Varighet: 7 timer og 59 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Nettkurs 25 timer 3 750 kr
Stadig flere bedrifter har behov for folk med kunnskaper om data og databehandling. Kan du dokumentere at du har slik kunnskap? Kurset MS Office 2016 - 4 Moduler tar for... [+]
Stadig flere bedrifter har behov for folk med kunnskaper om data og databehandling. Kan du dokumentere at du har slik kunnskap? Mål med kurset: Deltakeren skal tilegne seg kunnskaper om de mest benyttede Windows programmene og etter avsluttet kurs kunne jobbe smartere og mer effektivt. Krav til forkunnskaper: Et innføringskurs i data eller noe erfaring med data fra før er nødvendig. Kurset MS Office 2016 - 4 Moduler tar for seg de mest brukte Windows programmene: Excel Word PowerPoint Windows 10 Gjennomføring:  Gjennomføres på Internett, interaktivt. Kurset inneholder tekst, bilder, videofremvisninger, små tester og en mengde oppgaver. Enkelt og fleksibelt. Kursdeltageren har on-line tilgang i 12 måneder fra man starter å ta kurset.  Dette gjør at man har tilstrekkelig tid til å tilegne seg nødvendige kunnskaper. [-]
Les mer
2 dager 16 900 kr
Elasticsearch [+]
Elasticsearch [-]
Les mer
Virtuelt klasserom 2 timer 1 690 kr
24 May
Med Microsoft 365 har du fått flere oppgave- og planleggingsverktøy, som To Do og Planner. Appene flettes også mer og mer i hverandre. [+]
Med Microsoft 365 har du fått flere oppgave- og planleggingsverktøy, som To Do og Planner. Appene flettes også mer og mer i hverandre. I dette webinaret vises hvordan appene Planner og To Do samspiller med Teams og Outlook. Appene gir deg full oversikt over både dine egne og gruppeoppgavene på alle enheter. Planner – oppgaver for gruppen Hva er Planner | Hvor finner du Planner appen | Planner Hub | Lage ny plan | Opprette oppgaver | Fordele oppgaver | Trinn i oppgavene | Visninger | Planner og Teams To Do – oppgaver for deg Hva er To Do | Hvor finner du To Do appen | Online eller App | Min Dag-siden | Opprette oppgaver | Behandle oppgaver | Lister| Grupper | To Do og Outlook | To Do og Teams Hvordan ting henger sammen Hvordan de ulike appene spiller sammen | Ting du utfører i den ene appen vises i den andre, og kanskje i den tredje, dersom innstillingene er gjort riktig.   Pris: 1690 kroner [-]
Les mer
Oslo Bergen Og 1 annet sted 5 dager 27 450 kr
27 May
03 Jun
03 Jun
AZ-400: Designing and Implementing Microsoft DevOps solutions [+]
AZ-400: Designing and Implementing Microsoft DevOps solutions [-]
Les mer
Virtuelt klasserom 4 dager 22 000 kr
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solut... [+]
. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.   TARGET AUDIENCE This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. COURSE OBJECTIVES Implement an identity management solution Implement an authentication and access management solutions Implement access management for apps Plan and implement an identity governancy strategy COURSE CONTENT Module 1: Implement an identity management solution Learn to create and manage your initial Azure Active Directory (Azure AD) implementation and configure the users, groups, and external identities you will use to run your solution. Lessons M1 Implement Initial configuration of Azure AD Create, configure, and manage identities Implement and manage external identities Implement and manage hybrid identity Lab 1a: Manage user roles Lab 1b: Setting tenant-wide properties Lab 1c: Assign licenses to users Lab 1d: Restore or remove deleted users Lab 1e: Add groups in Azure AD Lab 1f: Change group license assignments Lab 1g: Change user license assignments Lab 1h: Configure external collaboration Lab 1i: Add guest users to the directory Lab 1j: Explore dynamic groups After completing module 1, students will be able to: Deploy an initail Azure AD with custom settings Manage both internal and external identities Implement a hybrid identity solution Module 2: Implement an authentication and access management solution Implement and administer your access management using Azure AD. Use MFA, conditional access, and identity protection to manager your identity solution. Lessons M2 Secure Azure AD user with MFA Manage user authentication Plan, implement, and administer conditional access Manage Azure AD identity protection Lab 2a: Enable Azure AD MFA Lab 2b: Configure and deploy self-service password reset (SSPR) Lab 2c: Work with security defaults Lab 2d: Implement conditional access policies, roles, and assignments Lab 2e: Configure authentication session controls Lab 2f: Manage Azure AD smart lockout values Lab 2g: Enable sign-in risk policy Lab 2h: Configure Azure AD MFA authentication registration policy After completing module 2, students will be able to: Configure and manage user authentication including MFA Control access to resources using conditional access Use Azure AD Identity Protection to protect your organization Module 3: Implement access management for Apps Explore how applications can and should be added to your identity and access solution with application registration in Azure AD. Lessons M3 Plan and design the integration of enterprise for SSO Implement and monitor the integration of enterprise apps for SSO Implement app registration Lab 3a: Implement access management for apps Lab 3b: Create a custom role to management app registration Lab 3c: Register an application Lab 3d: Grant tenant-wide admin consent to an application Lab 3e: Add app roles to applications and recieve tokens After completing module 3, students will be able to: Register a new application to your Azure AD Plan and implement SSO for enterprise application Monitor and maintain enterprise applications Module 4: Plan and implement an identity governancy strategy Design and implement identity governance for your identity solution using entitlement, access reviews, privileged access, and monitoring your Azure Active Directory (Azure AD). Lessons M4 Plan and implement entitlement management Plan, implement, and manage access reviews Plan and implement privileged access Monitor and maintain Azure AD Lab 4a: Creat and manage a resource catalog with Azure AD entitlement Lab 4b: Add terms of use acceptance report Lab 4c: Manage the lifecycle of external users with Azure AD identity governance Lab 4d: Create access reviews for groups and apps Lab 4e: Configure PIM for Azure AD roles Lab 4f: Assign Azure AD role in PIM Lab 4g: Assign Azure resource roles in PIM Lab 4h: Connect data from Azure AD to Azure Sentinel After completing module 4, students will be able to: Mange and maintain Azure AD from creation to solution Use access reviews to maintain your Azure AD Grant access to users with entitlement management [-]
Les mer
3 dager 12 550 kr
Lær å bruke AutoCAD [+]
UTDANNINGSMÅLKursdeltakerne skal etter endt kurs kunne bruke AutoCAD til å: Opprette nye tegninger Gjøre forandringer i eksisterende tegninger Bruke og forstå de vanligste tegne- og editeringskommandoer Målsette og påføre tekst i en tegning Bruke og forstå lagoppbyggingen i AutoCAD Symbol- og blokkhåndtering Enkel layout/plotting Lagre tegninger KURSINNHOLD: Introduksjon av AutoCAD 2-dimensjonal tegning Zoom og skjermbehandlingsteknikk Redigeringsfunksjoner Målsettingsfunksjoner Laghåndtering Symbol- og blokkhåndtering Hente symboler og parametere (målsettings- og tekststiler, osv.) fra eksisterende tegninger Layout/plotting av tegninger Lagrings- og avslutningsrutiner [-]
Les mer
Oslo 2 dager 12 900 kr
Automatisering i Microsoft 365 med Power Automate [+]
Automatisering i Microsoft 365 med Power Automate [-]
Les mer