Buskerud
Du har valgt: Drammen
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Drammen )
 

1 dag 9 500 kr
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
1 time 889 kr
01 Sep
08 Sep
15 Sep
At NLS Norwegian Language School, we offer personalized one-on-one English tutoring for children and teenagers at all levels. Each session is tailored to strengthen your ... [+]
One-on-One English Homework Help – Primary, Lower Secondary, and Upper Secondary School At NLS Norwegian Language School, we offer personalized one-on-one English tutoring for children and teens at all school levels. Each lesson is adapted to your child’s academic needs, learning pace, and goals – helping them develop strong skills and greater confidence in English. Where can your child learn? Your child can receive tutoring at home, in our classrooms in Oslo, or online – whichever is most convenient for your family. What can your child expect? They will receive lessons tailored to their current level and pace of learning. Sessions cover reading, writing, grammar, pronunciation, and speaking, with a strong focus on comprehension and communication. Regardless of the format, your child will benefit from individual attention and support throughout the course. Who is this service for? This tutoring is ideal for students who want to improve their grades, need help understanding the curriculum, or want to feel more confident using English in school. Get started today Contact us to arrange tutoring and help your child succeed in English. [-]
Les mer
Oslo Trondheim Og 1 annet sted 5 dager 27 500 kr
20 Oct
27 Oct
27 Oct
AZ-104: Microsoft Azure Administrator [+]
AZ-104: Microsoft Azure Administrator [-]
Les mer
Virtuelt klasserom 4 dager 24 000 kr
MS-500 MICROSOFT 365 SECURITY ADMINISTRATOR [+]
COURSE OVERVIEW This course is comprised of the following Microsoft Official Curriculum modules: MS-500T01 Managing Microsoft 365 Identity and Access, MS-500T02 Implementing Microsoft 365 Threat Protection, MS-500T03 Implementing Microsoft 365 Information Protection and MS-500T04 Administering Microsoft 365 Built-in Compliance.   MS-500T01 Managing Microsoft 365 Identity and Access Help protect against credential compromise with identity and access management. In this course you will learn how to secure user access to your organization’s resources. Specifically, this course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to configure Active Directory federation services, how to setup and use Azure AD Connect, and introduces you to Conditional Access. You will also learn about solutions for managing external access to your Microsoft 365 system.   MS500T02 Implementing Microsoft 365 Threat Protection Threat protection helps stop damaging attacks with integrated and automated security. In this course you will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions for them. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and how to use Microsoft 365 Threat Intelligence. It also discusses securing mobile devices and applications. The goal of this course is to help you configure your Microsoft 365 deployment to achieve your desired security posture.   MS500T03 Implementing Microsoft 365 Information Protection Information protection is the concept of locating and classifying data anywhere it lives. In this course you will learn about information protection technologies that help secure your Microsoft 365 environment. Specifically, this course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, the course explains the deployment of Microsoft Cloud App Security.   MS500T04 Administering Microsoft 365 Built-in Compliance Internal policies and external requirements for data retention and investigation may be necessary for your organization. In this course you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. Specifically, this course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations. The course also helps your organization prepare for Global Data Protection Regulation (GDPR).   Virtual Learning   This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins. TARGET AUDIENCE This course is for the Microsoft 365 security administrator role. This role collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization. COURSE CONTENT Module 1: User and Group Security This module explains how to manage user accounts and groups in Microsoft 365. It introduces you to Privileged Identity Management in Azure AD as well as Identity Protection. The module sets the foundation for the remainder of the course.   Module 2: Identity Synchronization This module explains concepts related to synchronizing identities. Specifically, it focuses on Azure AD Connect and managing directory synchronization to ensure the right people are connecting to your Microsoft 365 system.   Module 3: Federated Identities This module is all about Active Directory Federation Services (AD FS). Specifically, you will learn how to plan and manage AD FS to achieve the level of access you want to provide users from other directories.   Module 4: Access Management This module describes Conditional Access for Microsoft 365 and how it can be used to control access to resources in your organization. The module also explains Role Based Access Control (RBAC) and solutions for external access.   Module 5: Security in Microsoft 365 This module starts by explaining the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions to thwart those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture.   Module 6: Advanced Threat Protection This module explains the various threat protection technologies and services available in Microsoft 365. Specifically, the module covers message protection through Exchange Online Protection, Azure Advanced Threat Protection and Windows Defender Advanced Threat Protection.   Module 7: Threat Intelligence This module explains Microsoft Threat Intelligence which provides you with the tools to evaluate and address cyber threats. You will learn how to use the Security Dashboard in the Microsoft 365 Security and Compliance Center. It also explains and configures Microsoft Advanced Threat Analytics.   Module 8: Mobility This module is all about securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications.   Module 9: Information Protection This module explains information rights management in Exchange and SharePoint. It also describes encryption technologies used to secure messages. The module introduces how to implement Azure Information Protection and Windows Information Protection.   Module 10: Data Loss Prevention This module is all about data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications.   Module 11: Cloud Application Security This module is all about cloud app security for Microsoft 365. The module will explain cloud discovery, app connectors, policies, and alerts.     [-]
Les mer
4 dager 45 000 kr
01 Sep
29 Sep
20 Oct
DO180: Red Hat OpenShift Administration I: Operating a Production Cluster [+]
DO180: Red Hat OpenShift Administration I: Operating a Production Cluster [-]
Les mer
Oslo 5 dager 32 500 kr
08 Dec
08 Dec
Oracle Database 23ai: Administration Workshop [+]
Oracle Database: Administration Workshop [-]
Les mer
1 dag 9 500 kr
26 Sep
07 Nov
Develop dynamic reports with Microsoft Power BI [+]
Develop dynamic reports with Microsoft Power BI [-]
Les mer
Virtuelt klasserom 5 dager 28 000 kr
The Implementing and Administering Cisco Solutions course provides a broad range of fundamental knowledge for all IT careers. [+]
COURSE OVERVIEW  Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network. The course covers configuring network components such as switches, routers, and Wireless LAN Controllers; managing network devices; and identifying basic security threats. Network programmability, automation, and software-defined networking are also covered at a foundational level.   This course helps you prepare to take the 200-301 Cisco Certified Network Associate (CCNA) exam.   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you recieve at the beginning of the course and should be part of your preparation for the exam. Lab access is provided for both the class and the self- study sections, lab access is valid for 60 hours or 90 days whichever is the shorter, so please ensure you exit the lab exercises when not in use. TARGET AUDIENCE Anyone looking to start a career in networking or wishing to achieve the Cisco CCNA Certification. COURSE OBJECTIVES After completing this course you should be able to: Identify the components of a computer network and describe their basic characteristics Understand the model of host-to-host communication Describe the features and functions of the Cisco IOS Software Describe LANs and the role of switches within LANs Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches Install a switch and perform the initial configuration Describe the TCP/IP internet Layer, IPv4, its addressing scheme, and subnetting Describe the TCP/IP Transport layer and Application layer Explore functions of routing Implement basic configuration on a Cisco router Explain host-to-host communications across switches and routers Identify and resolve common switched network issues and common problems associated with IPv4 addressing Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity Describe the operation, benefits, and limitations of static routing Describe, implement and verify VLANs and trunks Describe the application and configuration of inter-VLAN routing Explain the basics of dynamic routing protocols and describe components and terms of OSPF Explain how STP and RSTP work Configure link aggregation using EtherChannel Describe the purpose of Layer 3 redundancy protocols Describe basic WAN and VPN concepts Describe the operation of ACLs and their applications in the network Configure internet access using DHCP clients and explain and configure NAT on Cisco routers Describe the basic QoS concepts Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC Describe network and device architectures and introduce virtualization Introduce the concept of network programmability and SDN and describe the smart network management solutions like Cisco DNA Center, SD-Access and SD-WAN Configure basic IOS system monitoring tools Describe the management of Cisco devices Describe the current security threat landscape Describe threat defense technologies Implement a basic security configuration of the device management plane Implement basic steps to harden network devices COURSE CONTENT Exploring the Functions of Networking Introducing the Host-To-Host Communications Model Operating Cisco IOS Software Introducing LANs Exploring the TCP/IP Link Layer Starting a Switch Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets Explaining the TCP/IP Transport Layer and Application Layer Exploring the Functions of Routing Configuring a Cisco Router Exploring the Packet Delivery Process Troubleshooting a Simple Network Introducing Basic IPv6 Configuring Static Routing Implementing VLANs and Trunks Routing Between VLANs Introducing OSPF Building Redundant Switched Topologies (Self-Study) Improving Redundant Switched Topologies with EtherChannel Exploring Layer 3 Redundancy (Self-Study) Introducing WAN Technologies (Self-Study) Explaining Basics of ACL Enabling Internet Connectivity Introducing QoS (Self-Study) Explaining Wireless Fundamentals (Self-Study) Introducing Architectures and Virtualization (Self-Study) Explaining the Evolution of Intelligent Networks Introducing System Monitoring Managing Cisco Devices Examining the Security Threat Landscape (Self-Study) Implementing Threat Defense Technologies (Self-Study) Securing Administrative Access Implementing Device Hardening Labs: Get Started with Cisco CLI Observe How a Switch Operates Perform Basic Switch Configuration Inspect TCP/IP Applications Configure an Interface on a Cisco Router Configure and Verify Layer 2 Discovery Protocols Configure Default Gateway Explore Packet Forwarding Troubleshoot Switch Media and Port Issues Troubleshoot Port Duplex Issues Configure Basic IPv6 Connectivity Configure and Verify IPv4 Static Routes Configure IPv6 Static Routes Configure VLAN and Trunk Configure a Router on a Stick Configure and Verify Single-Area OSPF Configure and Verify EtherChannel Configure and Verify IPv4 ACLs Configure a Provider-Assigned IPv4 Address Configure Static NAT Configure Dynamic NAT and PAT Log into the WLC Monitor the WLC Configure a Dynamic (VLAN) Interface Configure a DHCP Scope Configure a WLAN Define a RADIUS Server Explore Management Options Explore the Cisco DNA Center Configure and Verify NTP Create the Cisco IOS Image Backup Upgrade Cisco IOS Image Configure WLAN Using WPA2 PSK Using the GUI Secure Console and Remote Access Enable and Limit Remote Access Connectivity Secure Device Administrative Access Configure and Verify Port Security Implement Device Hardening TEST CERTIFICATION Recommended as preparation for the following exams:  200-301 -  Cisco Certified Network Associate Exam (CCNA) [-]
Les mer
1 dag 9 900 kr
Jira Project Administration (Cloud) [+]
Jira Project Administration (Cloud) [-]
Les mer
5 dager 25 500 kr
MS-500: Microsoft 365 Security Administrator [+]
MS-500: Microsoft 365 Security Administrator [-]
Les mer
Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Incident Management, Service Desk, Service Request Management, Monitoring and Event Management and Pro... [+]
Understand the purpose and key concepts of the Monitor, Support, and Fulfil practices, elucidating their importance in maintaining, supporting, and delivering IT services effectively.InteractiveOur eLearning:Self-pacedDevice-friendly12 hour contentMobile-optimised Exam:60 questionsMultiple Choice90 minutesClosed bookMinimum required score to pass: 65%  [-]
Les mer
Virtuelt klasserom 150 minutter 7 990 kr
27 Nov
Bli med oss for å løse opp knuter og finne veien videre i casen konflikter og rolleutfordringer i styrereommet! [+]
Case kveld Del 1: Geronimo Management AS   Deltakelse på denne CASE-kvelden er inkludert i prisen for alle som er med i styrenettverksgrupper arrangert av Styreforeningen. For andre deltakere som er medlemmer av Styreforeningen koster seminaret kr. 4.990,-.For deltakere som ikke er med i styrenettverksgrupper og som ikke er medlemmer av Styreforeningen er prisen kr. 5.990,-   Overskriften for kvelden er: Konflikter og rolleutfordringer i styrerommet   Denne kvelden beveger vi oss inn i kulissene for selskapet: Gerinomo Management AS som er et SMB selskap, opprinnelig grundet og eiet av 2 tidligere kamerater: Halvor og Jonas. De to har hatt 30 års fartstid sammen i og med oppbyggingen av selskapet. I løpet av kort tid oppstår to situasjoner: Halvor får akutt hjerteproblemer på vei hjem fra arbeid og dør kort tid etter. Det kommer videre frem at Jonas sin tilstand de siste månedene har vært holdt skjult, men det blir nå klart at han har hurtig eskalerende demens og ikke er istand til å ta vare på seg selv eller selskapet. Vedtektene og aksjonæravtalen har noen bestemmelser om situasjoner som her oppstår, men er ikke dekkende nå som begge eiere er «ute av bildet». Neste generasjon på begge sider ønsker å «rykke inn» for å overta den veldrevne virksomheten. Et styre må på plass og håndtere både utfordringer og muligheter som står foran selskapet. Her må vi inn å analysere: hva som skjer, hva som burde gjøres, hvordan vi kan gå frem for å håndtere ulike situasjoner etc?   Bli med oss for å løse opp knuter og finne veien videre!   [-]
Les mer
Virtuelt klasserom 150 minutter 7 990 kr
06 Nov
Case: Denne kvelden skal vi planlegge, innkalle og gjennomføre en krevende generalforsamling i selskapet Extender AS. [+]
Case samling 2: «Konflikter og rolleutfordringer på generalforsamlingen»    Deltakelse på denne CASE-kvelden er inkludert i prisen for alle som er med i styrenettverksgrupper arrangert av Styreforeningen. For andre deltakere som er medlemmer av Styreforeningen koster seminaret kr. 4.990,-.For deltakere som ikke er med i styrenettverksgrupper og som ikke er medlemmer av Styreforeningen er prisen kr. 5.990,-   Overskriften for kvelden er: Konflikter og rolleutfordringer på generalforsamlingen Denne kvelden skal vi planlegge, innkalle og gjennomføre en krevende generalforsamling i selskapet Extender AS.   Selskapet har 122 aksjonærer og aksjer fordelt mellom 3 klasser. Det er opprør blant en gruppe av aksjonærene som mener at en av de større aksjonærene med 36% eierskap skaper urimelige fordeler for egne nærstående på de andre aksjonærers bekostning. Det er videre kommet inn ulike forslag til vedtektsendringer som styret må fremme til behandling, herunder utradisjonelle varianter som styret er i tvil om kan innføres i et selskapsvedtekter. Det er krasse fronter hva gjelder styresammensettingen i selskapet, og det har kommet forslag til ny styresammensetting fra valgkomiteen, samt fra hele 3 andre aksjonærgrupperinger. Det er også varslet at det kan komme benkeforslag på enkeltkandidater. En emisjon bør komme i orden og det bør fremlegges en instruks for valgkomiteen da denne føler det vanskelig å vite sitt mandat og sine mulige måter og rammer og arbeide på, eller innenfor. Bli med oss for å løse opp knuter og finne fornuftige løsninger for hvordan håndtere de ulike situasjonene og sakene.   [-]
Les mer
5 dager 45 000 kr
01 Sep
29 Sep
13 Oct
RH294: Red Hat System Administration III: Linux Automation with Ansible [+]
RH294: Red Hat System Administration III: Linux Automation with Ansible [-]
Les mer
Virtuelt klasserom 3 timer 2 500 kr
15 Sep
27 Oct
08 Dec
Analyserer du store datamengder? Gjør du samme import hver dag/uke/måned? Importerer du data til Excel som ikke alltid har rett format? Har du lurt på hvordan det nye ver... [+]
Kursinnhold Import av .csv Import av tekstfiler (.txt) Import fra internett Transformering av data Rette opp feil Lage beregnede kolonner Regelmessig import Analyse av store datamengder   Det er fordelaktig å ha to skjermer - en til å følge kurset og en til å gjøre det kursholder demonstrerer. Kurset gjennomføres i sanntid med nettundervisning via Teams. Det blir mulighet for å stille spørsmål, ha diskusjoner, demonstrasjoner og øvelser. Du vil motta en invitasjon til Teams fra kursholder.   [-]
Les mer