IT-kurs
Du har valgt: Aksdal
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Aksdal ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of Information Security Management, elucidating its significance in safeguarding the confidentiality, integrity, and availability of organisational information assets. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Bedriftsintern 1 dag 7 500 kr
Data science og maskinlæring er blitt en viktig drivkraft bak mange forretnings beslutninger. Men fortsatt er mange usikre på hva begrepene innebærer og hvilke muligheter... [+]
Dette kurset tilbys som bedriftsinternt kurs   Maskinlæring handler om sette datamaskiner i stand til å lære fra og utvikle atferd basert på data. Det vil si at en datamaskin kan løse en oppgave den ikke er eksplisitt programmert for å håndtere. I stedet er den i stand til å automatisk lære gjenkjenning av komplekse mønstre i data og gjøre beslutninger basert på dette disse. Maskinlæring gir store muligheter, men mange bedrifter har problemer med å ta teknologien i bruk. Nøyaktig hvilke oppgaver kan maskinlæring utføre, og hvordan kommer man i gang? Dette kurset gir oversikt over mulighetene som ligger i maskinlæring, og hvordan i tillegg til kunnskap om hvordan teknologien kan løse oppgaver og skape resultater i praksis. Hva er maskinlæring, datavitenskap og kunstig intelligens og hvordan det er relatert til statistikk og dataanalyse? Hvordan å utvinne kunnskap fra dataene dine? Hva betyr Big data og hvordan analyseres det? Hvor og hvordan skal du bruke maskinlæring til dine daglige forretningsproblemer? Hvordan bruke datamønstre til å ta avgjørelser og spådommer med eksempler fra den virkelige verden? Hvilke typer forretningsproblemer kan en maskinen lære å håndtere Muligheter som maskinlæring gir din bedrift Hva er de teoretiske aspekter på metoder innen maskinlæring? Hvilke ML-metoder som er relevante for ulike problemstillinger innen dataanalyse? Hvordan evaluere styrker og svakheter mellom disse algoritmene og velge den beste? Anvendt data science og konkrete kunde eksempler i praksis   Målsetning Kurset gir kunnskap om hvordan maskinlæring kan løse et bestemt problem og hvilke metoder som egner seg i en gitt situasjon. Du blir i stand til å kan skaffe deg innsikt i data, og vil kunne identifisere egenskapene som representerer dem best. Du kjenner de viktigste maskinlæringsalgoritmene og hvilke metoder som evaluerer ytelsen deres best. Dette gir grunnlag for kontinuerlig forbedring av løsninger basert på maskinlæring.   [-]
Les mer
Nettstudie 11 800 kr
Med utgangspunkt i automasjon i bygg lærere du I denne utdanningen lærer du om grunnleggende programmering i HTML, Python, og JavaScript, mobilapp-utvikling, samt prosjek... [+]
Koding automasjon i bygg Denne fagskole utdanningens innhold tilsvarer 5 studiepoeng og utdanning er på nettet.  Maksimalt antall studieplasser er 25. Utdanningen er praktisk tilrettelagt, slik at du kan anvende teori og kunnskap i praksis. Du vil få mulighet til å jobbe med reelle og aktuelle problemstillinger, og du vil få tilbakemelding fra erfarne fagfolk. Læremateriellet består av video, podkaster, resyme av fagstoff, artikler, forskningsrapporter, foredrag, presentasjon av fagstoff, samt quizer og annet. Læremateriellet du får tilgang til er på en LMS som er under kontinuerlig utvikling og oppdatering. Du får ett års tilgang til læremateriell, etter at utdanningen er ferdig, på Learning Management System (LMS) I denne utdanningen lærer du om: Installere Python på egen PC (Spyder): Veiledning for hvordan du installerer Python og Spyder IDE for å utvikle Python-programmer. Introduksjon til programmering i: HTML: Grunnleggende om HTML-strukturer og webutvikling. Python: Introduksjon til grunnleggende programmeringskonsepter, inkludert: Variabler og Datatyper: Opprettelse og bruk av variabler med ulike datatyper som heltall (integers), desimaltall (floats), strenger (strings), lister (lists), tupler (tuples), og dictionaries (dictionaries). Operatorer: Bruk av matematiske, sammenlignings-, og logiske operatorer for beregninger og verdikomparasjoner. Løkker: Implementering av kontrollstrukturer som if-setninger, for- og while-løkker, samt avvikshantering med try og except for å styre programflyten. Funksjoner: Definisjon og anvendelse av funksjoner for å organisere koden i moduler og forbedre lesbarheten og vedlikeholdbarheten. Input og Output: Håndtering av datainnlesning fra bruker og datavisning til skjermen. Moduler og Biblioteker: Utforsking av innebygde og tredjepartsmoduler for å utvide programmets funksjonalitet. Filstyring: Åpning, lesing, skriving, og lukking av filer. Strukturering av kode: Organisering av kode ved hjelp av funksjoner, klasser, og moduler for bedre lesbarhet og vedlikehold. JavaScript: Grunnleggende programmeringskonsepter for å utvikle interaktive webapplikasjoner. Programmere App til mobil telefon: Introduksjon til å kunne programmere Android-apps. Fra sensor til web: Utvikling av programmer fra grunnen av, fra å programmere Arduino UNO som en Modbus RTU slave til å utvikle en Modbus RTU master i Python. Konfigurasjon av egen PC som webserver (IIS) for å støtte webapplikasjoner. Integrert prosjektarbeid som involverer programmering fra sensor til web, som kombinerer hardware og software for å samle, behandle, og presentere data. Inkluderer API-er (Application Programming Interfaces) og tekniske beskrivelser. Du velger selv prosjektoppgave: Oppgaven kan for eksempel innebære å innhente data via API fra https://www.yr.no/ eller en annen nettressurs. Ved å anvende Modbus for I/O på Arduino, er det mulig å utvikle et system som både overvåker og regulerer energiforbruket ditt. Brukergrensesnittet kan være basert på web, og konfigureres på din egen datamaskin. Denne utdanningen danner et solid fundament for videre læring og anvendelse av disse konseptene i automasjon i bygg. Bedriftsinterne utdanning tilpasset din bedrift Denne utdanningen kan tilbys som en bedriftsintern utdanning. Det faglige innholdet er fastsatt, men den faglige tilnærmingen kan tilpasses den enkelte bedrifts behov og ønsker. Ta kontakt for en prat, så kan vi sammen lage et utdanningsløp som passer for deg og din bedrift. Kontaktpersoner er Hans Gunnar Hansen (tlf. 91101824) og Vidar Luth-Hanssen (tlf. 91373153) [-]
Les mer
Oslo 1 dag 9 900 kr
22 Sep
22 Sep
01 Dec
ITIL® 4 Practitioner: Change enablement [+]
ITIL® 4 Practitioner: Change Enablement [-]
Les mer
2 dager 15 000 kr
This 2-day course is identical to the 1-day M-AZ-900T01 course.  However this course lasts two days because of the hands-on parts. This course will prepare students for t... [+]
  COURSE OVERVIEW This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses. The course will cover general cloud computing concepts as well as general cloud computing models and services such as Public, Private and Hybrid cloud and Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service (SaaS). It will also cover some core Azure services and solutions, as well as key Azure pillar services concerning security, privacy, compliance and trust. It will finally cover pricing and support services available with Azure.   COURSE CONTENT  Module 1: Cloud Concepts -Learning Objectives-Why Cloud Services?-Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)-Public, Private, and Hybrid cloud models Module 2: Core Azure Services -Core Azure architectural components-Core Azure Services and Products-Azure Solutions-Azure management tools Module 3: Security, Privacy, Compliance and Trust -Securing network connectivity in Azure-Core Azure Identity services-Security tools and features-Azure governance methodologies-Monitoring and Reporting in Azure-Privacy, Compliance and Data Protection standards in Azure Module 4: Azure Pricing and Support -Azure subscriptions-Planning and managing costs-Support options available with Azure-Service lifecycle in Azure     This course helps to prepare for exam AZ-900. [-]
Les mer
Virtuelt eller personlig 1 dag 3 120 kr
Målsetning for kurset: Opparbeide ferdigheter i å navigere, kommunisere og hente ut informasjon fra BIM-modeller i IFC-formatet med bruk av Solibri Anywhere. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt.NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Solibri Anywhere og Site   På kurset vil du lære å: Sammenstille flere IFC-modeller og navigere i disse Velge ut grupper av objekter for nærmere studier Legge inn snitt, måle, markere og opprette slides fra visninger av modellen Opprette rapporter og kommentere «issues» i Excel og BCF-format Se på resultatet av utførte regelsjekker i modellen Se på resultatet av utførte informasjons- og mengdeuttak fra modellen Høste informasjon og mengder fra modellen basert på eksisterende maler og klassifikasjoner Skape egne klassifikasjoner og definisjoner for megndeuttak   Dette er et populært kurs, meld deg på nå! Spesialtilpasset kurs: NTI anbefaler spesialtilpassede kurs for bedrifter som planlegger å sende to eller flere deltakere på Solibri-kurs. Grunnen til dette er at Solibri brukes av mange forskjellige aktører og profesjoner i BAE-bransjen, og følgelig blir de åpne kursene ofte for generelle for enkelte kursdeltakere. I et spesialtilpasset kurs vil vår kurskonsulent kartlegge fokusområdene i forkant av kurset, og gjennomføre kurset i henhold til selskapets behov, gjerne basert på kundens egne modeller. Utbyttet av kurset blir følgelig mye større.  Ta kontakt med oss på telefon 483 12 300, epost: salg-no@nti.biz eller les mer på www.nti.biz   [-]
Les mer
Virtuelt klasserom 3 dager 24 500 kr
In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilitie... [+]
Objectives Describe specialized data classifications on Azure Identify Azure data protection mechanisms Implement Azure data encryption methods Secure Internet protocols and how to implement them on Azure Describe Azure security services and features Agenda Module 1: Identity and Access -Configure Azure Active Directory for Azure workloads and subscriptions-Configure Azure AD Privileged Identity Management-Configure security for an Azure subscription Module 2: Platform Protection -Understand cloud security-Build a network-Secure network-Implement host security-Implement platform security-Implement subscription security Module 3: Security Operations -Configure security services-Configure security policies by using Azure Security Center-Manage security alerts-Respond to and remediate security issues-Create security baselines Module 4: Data and applications -Configure security policies to manage data-Configure security for data infrastructure-Configure encryption for data at rest-Understand application security-Implement security for application lifecycle-Secure applications-Configure and manage Azure Key Vault       [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
Nettkurs 4 timer 549 kr
Dette kurset er laget for deg som vil lære å bruke Google Analytics 4, og få innsikt i hvordan kundene dine bruker nettstedet eller appen din. Kurset varer i 4 timer og 5... [+]
Ønsker du å mestre Google Analytics 4 for å få dybdeinnsikt i kundeadferden på nettstedet eller appen din? Da er kurset "Google Analytics 4: Komplett", ledet av Espen Faugstad, perfekt for deg. Dette kurset er designet for å gi deg en helhetlig forståelse av Google Analytics 4, slik at du kan jobbe profesjonelt med dette kraftige analyseverktøyet. Kurset starter med grunnleggende om hvordan Google Analytics 4 fungerer og veileder deg gjennom installasjonen på din nettside. Du vil lære å konfigurere Google Analytics for å maksimere dets potensial, administrere brukere, spore nettstedsøk, og mye mer. I tillegg gir kurset deg en detaljert gjennomgang av standardrapporter og utforskninger som er tilgjengelige i Google Analytics 4. Mot slutten av kurset vil du dykke inn i mer avanserte temaer som opprettelse og sporing av egendefinerte hendelser, konverteringssporing, og hvordan du kan utnytte innsikter fra brukerdata for å forbedre dine digitale strategier. Dette kurset er din vei til å bli en ekspert i Google Analytics 4.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Installer Kapittel 3: Konfigurer Kapittel 4: Rapporter Kapittel 5: Utforsk Kapittel 6: Hendelser Kapittel 7: Avansert Kapittel 8: Avslutning   Varighet: 4 timer og 48 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Virtuelt eller personlig 3 dager 12 480 kr
Dagens byggebransje fokuserer på BIM. Autodesk Revit Architecture er det ledende systemet i Norge for arkitekter innen BIM prosjektering. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Revit Architecture Basis I Her er et utvalg av temaene du vil lære på kurset: Introduksjon til BIM Modellering av 3D-bygningsmodell i flere detaljeringsgrader (informasjonsnivåer) Samarbeid med andre fagmodeller Generering av planer, snitt, fasader, detaljer og perspektiver Skjemaer og mengdeuttrekk Oppsetning til print A Anvendelse av relevante NTItools Kurset gir deg innblikk i bruken av BIM-arbeidsmetoder med Revit som hovedverktøy. Det bygges opp en full, parametrisk 3D-modell, hvor de grunnleggende funksjonene i Revit benyttes. DU vil få en bred forståelse av både prinsipper og funksjoner i Revit og skal bli i stand til å øke detaljeringen av prosjektet ytterligere.   Dette er et populært kurs, meld deg på nå!   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Virtuelt klasserom 4 dager 20 000 kr
This four-day instructor-led course is designed for IT professionals who configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW These professionals manage and support an infrastructure that includes on-premises and Azure IaaS-hosted Windows Server-based workloads. The course teaches IT professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to manage and secure Azure VMs running Windows Server. The course also covers how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights various administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. COURSE OBJECTIVES After you complete this course you will be able to: Harden the security configuration of the Windows Server operating system environment. Enhance hybrid security using Azure Security Center, Azure Sentinel, and Windows Update Management. Apply security features to protect critical resources. Implement high availability and disaster recovery solutions. Implement recovery services in hybrid scenarios. Plan and implement hybrid and cloud-only migration, backup, and recovery scenarios. Perform upgrades and migration related to AD DS, and storage. Manage and monitor hybrid scenarios using WAC, Azure Arc, Azure Automation and Azure Monitor. Implement service monitoring and performance monitoring, and apply troubleshooting. COURSE CONTENT Module 1: Windows Server security This module discusses how to protect an Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. The module covers how to limit authentication scope and remediate potentially insecure accounts. The module also describes how to harden the security configuration of a Windows Server operating system environment. In addition, the module discusses the use of Windows Server Update Services to deploy operating system updates to computers on the network. Finally, the module covers how to secure Windows Server DNS to help protect the network name resolution infrastructure. Lessons for module 1 Secure Windows Sever user accounts Hardening Windows Server Windows Server Update Management Secure Windows Server DNS Lab : Configuring security in Windows Server Configuring Windows Defender Credential Guard Locating problematic accounts Implementing LAPS After completing module 1, students will be able to: Diagnose and remediate potential security vulnerabilities in Windows Server resources. Harden the security configuration of the Windows Server operating system environment. Deploy operating system updates to computers on a network by using Windows Server Update Services. Secure Windows Server DNS to help protect the network name resolution infrastructure. Implement DNS policies. Module 2: Implementing security solutions in hybrid scenarios This module describes how to secure on-premises Windows Server resources and Azure IaaS workloads. The module covers how to improve the network security for Windows Server infrastructure as a service (IaaS) virtual machines (VMs) and how to diagnose network security issues with those VMs. In addition, the module introduces Azure Security Center and explains how to onboard Windows Server computers to Security Center. The module also describes how to enable Azure Update Management, deploy updates, review an update assessment, and manage updates for Azure VMs. The modules explains how Adaptive application controls and BitLocker disk encryption are used to protect Windows Server IaaS VMs. Finally, the module explains how to monitor Windows Server Azure IaaS VMs for changes in files and the registry, as well as monitoring modifications made to application software. Lessons for module 2 Implement Windows Server IaaS VM network security. Audit the security of Windows Server IaaS Virtual Machines Manage Azure updates Create and implement application allowlists with adaptive application control Configure BitLocker disk encryption for Windows IaaS Virtual Machines Implement change tracking and file integrity monitoring for Windows Server IaaS VMs Lab : Using Azure Security Center in hybrid scenarios Provisioning Azure VMs running Windows Server Configuring Azure Security Center Onboarding on-premises Windows Server into Azure Security Center Verifying the hybrid capabilities of Azure Security Center Configuring Windows Server 2019 security in Azure VMs After completing module 2, students will be able to: Diagnose network security issues in Windows Server IaaS virtual machines. Onboard Windows Server computers to Azure Security Center. Deploy and manage updates for Azure VMs by enabling Azure Automation Update Management. Implement Adaptive application controls to protect Windows Server IaaS VMs. Configure Azure Disk Encryption for Windows IaaS virtual machines (VMs). Back up and recover encrypted data. Monitor Windows Server Azure IaaS VMs for changes in files and the registry. Module 3: Implementing high availability This module describes technologies and options to create a highly available Windows Server environment. The module introduces Clustered Shared Volumes for shared storage access across multiple cluster nodes. The module also highlights failover clustering, stretch clusters, and cluster sets for implementing high availability of Windows Server workloads. The module then discusses high availability provisions for Hyper-V and Windows Server VMs, such as network load balancing, live migration, and storage migration. The module also covers high availability options for shares hosted on Windows Server file servers. Finally, the module describes how to implement scaling for virtual machine scale sets and load-balanced VMs, and how to implement Azure Site Recovery. Lessons for module 3 Introduction to Cluster Shared Volumes. Implement Windows Server failover clustering. Implement high availability of Windows Server VMs. Implement Windows Server File Server high availability. Implement scale and high availability with Windows Server VMs. Lab : Implementing failover clustering Configuring iSCSI storage Configuring a failover cluster Deploying and configuring a highly available file server Validating the deployment of the highly available file server After completing module 3, students will be able to: Implement highly available storage volumes by using Clustered Share Volumes. Implement highly available Windows Server workloads using failover clustering. Describe Hyper-V VMs load balancing. Implement Hyper-V VMs live migration and Hyper-V VMs storage migration. Describe Windows Server File Server high availablity options. Implement scaling for virtual machine scale sets and load-balanced VMs. Implement Azure Site Recovery. Module 4: Disaster recovery in Windows Server This module introduces Hyper-V Replica as a business continuity and disaster recovery solution for a virtual environment. The module discusses Hyper-V Replica scenarios and use cases, and prerequisites to use it. The module also discusses how to implement Azure Site Recovery in on-premises scenarios to recover from disasters. Lessons for module 4 Implement Hyper-V Replica Protect your on-premises infrastructure from disasters with Azure Site Recovery Lab : Implementing Hyper-V Replica and Windows Server Backup Implementing Hyper-V Replica Implementing backup and restore with Windows Server Backup After completing module 4, students will be able to: Describe Hyper-V Replica, pre-requisites for its use, and its high-level architecture and components Describe Hyper-V Replica use cases and security considerations. Configure Hyper-V Replica settings, health monitoring, and failover options. Describe extended replication. Replicate, failover, and failback virtual machines and physical servers with Azure Site Recovery. Module 5: Implementing recovery services in hybrid scenarios This module covers tools and technologies for implementing disaster recovery in hybrid scenarios, whereas the previous module focus on BCDR solutions for on-premises scenarios. The module begins with Azure Backup as a service to protect files and folders before highlighting how to implementRecovery Vaults and Azure Backup Policies. The module describes how to recover Windows IaaS virtual machines, perform backup and restore of on-premises workloads, and manage Azure VM backups. The modules also covers how to provide disaster recovery for Azure infrastructure by managing and orchestrating replication, failover, and failback of Azure virtual machines with Azure Site Recovery. Lessons for module 5 Implement hybrid backup and recovery with Windows Server IaaS Protect your Azure infrastructure with Azure Site Recovery Protect your virtual machines by using Azure Backup Lab : Implementing Azure-based recovery services Implementing the lab environment Creating and configuring an Azure Site Recovery vault Implementing Hyper-V VM protection by using Azure Site Recovery vault Implementing Azure Backup After completing module 5, students will be able to: Recover Windows Server IaaS virtual machines by using Azure Backup. Use Azure Backup to help protect the data for on-premises servers and virtualized workloads. Implement Recovery Vaults and Azure Backup policies. Protect Azure VMs with Azure Site Recovery. Run a disaster recovery drill to validate protection. Failover and failback Azure virtual machines. Module 6: Upgrade and migrate in Windows Server This module discusses approaches to migrating Windows Server workloads running in earlier versions of Windows Server to more current versions. The module covers the necessary strategies needed to move domain controllers to Windows Server 2022 and describes how the Active Directory Migration Tool can consolidate domains within a forest or migrate domains to a new AD DS forest. The module also discusses the use of Storage Migration Service to migrate files and files shares from existing file servers to new servers running Windows Server 2022. Finally, the module covers how to install and use the Windows Server Migration Tools cmdlets to migrate commonly used server roles from earlier versions of Windows Server. Lessons for module 6 Active Directory Domain Services migration Migrate file server workloads using Storage Migration Service Migrate Windows Server roles Lab : Migrating Windows Server workloads to IaaS VMs Deploying AD DS domain controllers in Azure Migrating file server shares by using Storage Migration Service After completing module 6, students will be able to: Compare upgrading an AD DS forest and migrating to a new AD DS forest. Describe the Active Directory Migration Tool (ADMT). Identify the requirements and considerations for using Storage Migration Service. Describe how to migrate a server with storage migration. Use the Windows Server Migration Tools to migrate specific Windows Server roles. Module 7: Implementing migration in hybrid scenarios This module discusses approaches to migrating workloads running in Windows Server to an infrastructure as a service (IaaS) virtual machine. The module introduces using Azure Migrate to assess and migrate on-premises Windows Server instances to Microsoft Azure. The module also covers how migrate a workload running in Windows Server to an infrastructure as a service (IaaS) virtual machine (VM) and to Windows Server 2022 by using Windows Server migration tools or the Storage Migration Service. Finally, this module describes how to use the Azure Migrate App Containerization tool to containerize and migrate ASP.NET applications to Azure App Service. Lessons for module 7 Migrate on-premises Windows Server instances to Azure IaaS virtual machines Upgrade and migrate Windows Server IaaS virtual machines Containerize and migrate ASP.NET applications to Azure App Service Lab : Migrating on-premises VMs servers to IaaS VMs Implementing assessment and discovery of Hyper-V VMs using Azure Migrate Implementing migration of Hyper-V workloads using Azure Migrate After completing module 7, students will be able to: Plan a migration strategy and choose the appropriate migration tools. Perform server assessment and discovery using Azure Migrate. Migrate Windows Server workloads to Azure VM workloads using Azure Migrate. Explain how to migrate workloads using Windows Server Migration tools. Migrate file servers by using the Storage Migration Service. Discover and containerize ASP.NET applcations running on Windows. Migrate a containerized application to Azure App Service. Module 8: Server and performance monitoring in Windows Server This module introduces a range of tools to monitor the operating system and applications on a Windows Server computer as well as describing how to configure a system to optimize efficiency and to troublshoot problems. The module covers how Event Viewer provides a convenient and accessible location for observing events that occur, and how to interpret the data in the event log. The module also covers how to audit and diagnose a Windows Server environment for regulatory compliance, user activity, and troubleshooting. Finally, the module explains how to troubleshoot AD DS service failures or degraded performance, including recovery of deleted objects and the AD DS database, and how to troubleshoot hybrid authentication issues. Lessons for module 8 Monitor Windows Server performance Manage and monitor Windows Server event logs Implement Windows Server auditing and diagnostics Troubleshoot Active Directory Lab : Monitoring and troubleshooting Windows Server Establishing a performance baseline Identifying the source of a performance problem Viewing and configuring centralized event logs After completing module 8, students will be able to: Explain the fundamentals of server performance tuning. Use built-in tools in Windows Server to monitor server performance. Use Server Manager and Windows Admin Center to review event logs. Implement custom views. Configure an event subscription. Audit Windows Server events. Configure Windows Server to record diagnostic information. Recover the AD DS database and objects in AD DS. Troubleshoot AD DS replication. Troubleshoot hybrid authentication issues. Module 9: Implementing operational monitoring in hybrid scenarios This module covers using monitoring and troubleshooing tools, processes, and best practices to streamline app performance and availabilty of Windows Server IaaS VMs and hybrid instances. The module describes how to implement Azure Monitor for IaaS VMs in Azure, implement Azure Monitor in on-premises environments, and use dependency maps. The module then explains how to enable diagnostics to get data about a VM, and how to view VM metrics in Azure Metrics Explorer, and how to create a metric alert to monitor VM performance. The module then covers how to monitor VM performance by using Azure Monitor VM Insights. The module then describes various aspects of troubleshooting on premises and hybrid network connectivity, including how to diagnose common issues with DHCP, name resolution, IP configuration, and routing. Finally, the module examines how to troubleshoot configuration issues that impact connectivity to Azure-hosted Windows Server virtual machines (VMs), as well as approaches to resolve issues with VM startup, extensions, performance, storage, and encryption. Lessons for module 9 Monitor Windows Server IaaS Virtual Machines and hybrid instances Monitor the health of your Azure virtual machines by using Azure Metrics Explorer and metric alerts Monitor performance of virtual machines by using Azure Monitor VM Insights Troubleshoot on-premises and hybrid networking Troubleshoot Windows Server Virtual Machines in Azure Lab : Monitoring and troubleshooting of IaaS VMs running Windows Server Enabling Azure Monitor for virtual machines Setting up a VM with boot diagnostics Setting up a Log Analytics workspace and Azure Monitor VM Insights After completing module 9, students will be able to: Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. View VM metrics in Azure Metrics Explorer. Use monitoring data to diagnose problems. Evaluate Azure Monitor Logs and configure Azure Monitor VM Insights. Configure a Log Analytics workspace. Troubleshoot on-premises connectivity and hybrid network connectivity. Troubleshoot AD DS service failures or degraded performance. Recover deleted security objects and the AD DS database. Troubleshoot hybrid authentication issues. [-]
Les mer
4 dager 23 000 kr
This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. [+]
 Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments.Students for AZ-140: Configuring and Operating Windows Virtual Desktop on Microsoft Azure are interested in delivering applications on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments. As a Windows Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Windows Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Windows Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Windows Virtual Desktop performance, and automate Windows Virtual Desktop management tasks. COURSE OBJECTIVES   Select an appropriate licensing model for Windows Virtual Desktop Implement networking for Windows Virtual Desktop Manage Windows Virtual Desktop session hosts by using Azure Bastion Configure storage for FSLogix components Create and manage session host images Implement Azure roles and role-based access control (RBAC) for Windows Virtual Desktop Configure user Windows Virtual Desktop experience settings Install and configure apps on a session host Implement business continuity and disaster recovery Monitor and manage Windows Virtual Desktop performance     COURSE CONTENT Module 1: Plan a Windows Virtual Desktop Architecture In this module, you will learn how to assess existing physical and virtual desktop environments, plan and configure name resolution for Active Directory (AD) and Azure Active Directory Domain Services (Azure AD DS), and plan for Windows Virtual Desktop client deployments. LESSONS M1 Windows Virtual Desktop Architecture Design the WVD architecture Design for user identities and profiles LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AZURE AD DS) LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AD DS) After completing module 1, students will be able to: Understand Windows Virtual Desktop Components Understand personal and pooled desktops Recommend an operating system for a WVD implementation Plan a host pools architecture Module 2: Implement a WVD Infrastructure In this module, you will learn how to manage connectivity to the internet and on-premises networks, create a host pool by using the Azure portal, deploy host pools and hosts by using Azure Resource Manager templates, apply OS and application updates to a running WVD host, and create a master image. LESSONS M2 Implement and manage networking for WVD Implement and manage storage for WVD Create and configure host pools and session hosts Create and manage session host image LAB: CREATE AND CONFIGURE HOST POOLS AND SESSION HOSTS (AZURE AD DS) LAB: DEPLOY HOST POOLS AND SESSION HOSTS BY USING THE AZURE PORTAL (AD DS) LAB: IMPLEMENT AND MANAGE STORAGE FOR WVD (AZURE AD DS) LAB: DEPLOY HOST POOLS AND HOSTS BY USING AZURE RESOURCE MANAGER TEMPLATES LAB: DEPLOY AND MANAGE HOST POOLS AND HOSTS BY USING POWERSHELL After completing module 2, students will be able to: Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Windows Virtual Desktop network connectivity Configure WVD session hosts using Azure Bastion Configure storage for FSLogix components Configure disks and file shares Modify a session host image Create and use a Shared Image Gallery (SIG) Module 3: Manage Access and Security In this module, you will learn how to plan and implement Azure roles and RBAC for WVD, implement Conditional Access policies for connections, plan and implement MFA, and manage security by using Azure Security Center. LESSONS M3 Manage access Manage security LAB: CONFIGURE CONDITIONAL ACCESS POLICIES FOR CONNECTIONS TO WVD (AD DS) After completing module 3, students will be able to: Manage local roles, groups and rights assignment on WVD session hosts. Configure user restrictions by using AD group policies and Azure AD policies Understand Conditional Access policy components Prepare for Azure Active Directory (Azure AD)-based Conditional Access for Windows Virtual Desktop Implement Azure AD-based Conditional Access for Windows Virtual Desktop Module 4: Manage User Environments and Apps In this module, you will learn how to plan for FSLogix, install FSLogix, configure Cloud Cache, deploy an application as a RemoteApp, and implement and manage OneDrive for Business for a multi-session environment. LESSONS M4 Implement and manage FSLogix Configure user experience settings Install and configure apps on a session host LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AZURE AD DS) LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AD DS) LAB: WINDOWS VIRTUAL DESKTOP APPLICATION PACKAGING (AD DS) After completing module 4, students will be able to: Configure Profile Containers Configure Azure Files to store profile containers for WVD in an AAD DS environment Implement FSLogix based profiles for Windows Virtual Desktop in Azure AD DS environment Implement FSLogix based profiles for Windows Virtual Desktop Prepare for and create MSIX app packages Implement MSIX app attach container for Windows Virtual Desktop in AD DS environmen Module 5: Monitor and maintain a WVD infrastructure In this module, you will learn how to plan and implement a disaster recovery plan for WVD, configure automation for WVD, implement autoscaling in host pools, and optimize session host capacity and performance. LESSONS M5 Plan and implement business continuity and disaster recovery Automate WVD management tasks Monitor and manage performance and health LAB: IMPLEMENT AUTOSCALING IN HOST POOLS (AD DS) After completing module 5, students will be able to: Plan and implement a disaster recovery plan for WVD Configure automation for WVD Monitor WVD by using Azure Monitor Customize Azure Workbooks for WVD monitoring Configure autoscaling of Windows Virtual Desktop session hosts Verify autoscaling of Windows Virtual Desktop session host [-]
Les mer
Virtuelt klasserom 4 dager 25 000 kr
In this course, the student will learn about the data engineering patterns and practices as it pertains to working with batch and real-time analytical solutions using Azu... [+]
COURSE OVERVIEW Students will begin by understanding the core compute and storage technologies that are used to build an analytical solution. They will then explore how to design an analytical serving layers and focus on data engineering considerations for working with source files. The students will learn how to interactively explore data stored in files in a data lake. They will learn the various ingestion techniques that can be used to load data using the Apache Spark capability found in Azure Synapse Analytics or Azure Databricks, or how to ingest using Azure Data Factory or Azure Synapse pipelines. The students will also learn the various ways they can transform the data using the same technologies that is used to ingest data. The student will spend time on the course learning how to monitor and analyze the performance of analytical system so that they can optimize the performance of data loads, or queries that are issued against the systems. They will understand the importance of implementing security to ensure that the data is protected at rest or in transit. The student will then show how the data in an analytical system can be used to create dashboards, or build predictive models in Azure Synapse Analytics. TARGET AUDIENCE The primary audience for this course is data professionals, data architects, and business intelligence professionals who want to learn about data engineering and building analytical solutions using data platform technologies that exist on Microsoft Azure. The secondary audience for this course data analysts and data scientists who work with analytical solutions built on Microsoft Azure. COURSE OBJECTIVES   Explore compute and storage options for data engineering workloads in Azure Design and Implement the serving layer Understand data engineering considerations Run interactive queries using serverless SQL pools Explore, transform, and load data into the Data Warehouse using Apache Spark Perform data Exploration and Transformation in Azure Databricks Ingest and load Data into the Data Warehouse Transform Data with Azure Data Factory or Azure Synapse Pipelines Integrate Data from Notebooks with Azure Data Factory or Azure Synapse Pipelines Optimize Query Performance with Dedicated SQL Pools in Azure Synapse Analyze and Optimize Data Warehouse Storage Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link Perform end-to-end security with Azure Synapse Analytics Perform real-time Stream Processing with Stream Analytics Create a Stream Processing Solution with Event Hubs and Azure Databricks Build reports using Power BI integration with Azure Synpase Analytics Perform Integrated Machine Learning Processes in Azure Synapse Analytics COURSE CONTENT Module 1: Explore compute and storage options for data engineering workloads This module provides an overview of the Azure compute and storage technology options that are available to data engineers building analytical workloads. This module teaches ways to structure the data lake, and to optimize the files for exploration, streaming, and batch workloads. The student will learn how to organize the data lake into levels of data refinement as they transform files through batch and stream processing. Then they will learn how to create indexes on their datasets, such as CSV, JSON, and Parquet files, and use them for potential query and workload acceleration. Introduction to Azure Synapse Analytics Describe Azure Databricks Introduction to Azure Data Lake storage Describe Delta Lake architecture Work with data streams by using Azure Stream Analytics Lab 1: Explore compute and storage options for data engineering workloads Combine streaming and batch processing with a single pipeline Organize the data lake into levels of file transformation Index data lake storage for query and workload acceleration After completing module 1, students will be able to: Describe Azure Synapse Analytics Describe Azure Databricks Describe Azure Data Lake storage Describe Delta Lake architecture Describe Azure Stream Analytics Module 2: Design and implement the serving layer This module teaches how to design and implement data stores in a modern data warehouse to optimize analytical workloads. The student will learn how to design a multidimensional schema to store fact and dimension data. Then the student will learn how to populate slowly changing dimensions through incremental data loading from Azure Data Factory. Design a multidimensional schema to optimize analytical workloads Code-free transformation at scale with Azure Data Factory Populate slowly changing dimensions in Azure Synapse Analytics pipelines Lab 2: Designing and Implementing the Serving Layer Design a star schema for analytical workloads Populate slowly changing dimensions with Azure Data Factory and mapping data flows After completing module 2, students will be able to: Design a star schema for analytical workloads Populate a slowly changing dimensions with Azure Data Factory and mapping data flows Module 3: Data engineering considerations for source files This module explores data engineering considerations that are common when loading data into a modern data warehouse analytical from files stored in an Azure Data Lake, and understanding the security consideration associated with storing files stored in the data lake. Design a Modern Data Warehouse using Azure Synapse Analytics Secure a data warehouse in Azure Synapse Analytics Lab 3: Data engineering considerations Managing files in an Azure data lake Securing files stored in an Azure data lake After completing module 3, students will be able to: Design a Modern Data Warehouse using Azure Synapse Analytics Secure a data warehouse in Azure Synapse Analytics Module 4: Run interactive queries using Azure Synapse Analytics serverless SQL pools In this module, students will learn how to work with files stored in the data lake and external file sources, through T-SQL statements executed by a serverless SQL pool in Azure Synapse Analytics. Students will query Parquet files stored in a data lake, as well as CSV files stored in an external data store. Next, they will create Azure Active Directory security groups and enforce access to files in the data lake through Role-Based Access Control (RBAC) and Access Control Lists (ACLs). Explore Azure Synapse serverless SQL pools capabilities Query data in the lake using Azure Synapse serverless SQL pools Create metadata objects in Azure Synapse serverless SQL pools Secure data and manage users in Azure Synapse serverless SQL pools Lab 4: Run interactive queries using serverless SQL pools Query Parquet data with serverless SQL pools Create external tables for Parquet and CSV files Create views with serverless SQL pools Secure access to data in a data lake when using serverless SQL pools Configure data lake security using Role-Based Access Control (RBAC) and Access Control List After completing module 4, students will be able to: Understand Azure Synapse serverless SQL pools capabilities Query data in the lake using Azure Synapse serverless SQL pools Create metadata objects in Azure Synapse serverless SQL pools Secure data and manage users in Azure Synapse serverless SQL pools Module 5: Explore, transform, and load data into the Data Warehouse using Apache Spark This module teaches how to explore data stored in a data lake, transform the data, and load data into a relational data store. The student will explore Parquet and JSON files and use techniques to query and transform JSON files with hierarchical structures. Then the student will use Apache Spark to load data into the data warehouse and join Parquet data in the data lake with data in the dedicated SQL pool. Understand big data engineering with Apache Spark in Azure Synapse Analytics Ingest data with Apache Spark notebooks in Azure Synapse Analytics Transform data with DataFrames in Apache Spark Pools in Azure Synapse Analytics Integrate SQL and Apache Spark pools in Azure Synapse Analytics Lab 5: Explore, transform, and load data into the Data Warehouse using Apache Spark Perform Data Exploration in Synapse Studio Ingest data with Spark notebooks in Azure Synapse Analytics Transform data with DataFrames in Spark pools in Azure Synapse Analytics Integrate SQL and Spark pools in Azure Synapse Analytics After completing module 5, students will be able to: Describe big data engineering with Apache Spark in Azure Synapse Analytics Ingest data with Apache Spark notebooks in Azure Synapse Analytics Transform data with DataFrames in Apache Spark Pools in Azure Synapse Analytics Integrate SQL and Apache Spark pools in Azure Synapse Analytics Module 6: Data exploration and transformation in Azure Databricks This module teaches how to use various Apache Spark DataFrame methods to explore and transform data in Azure Databricks. The student will learn how to perform standard DataFrame methods to explore and transform data. They will also learn how to perform more advanced tasks, such as removing duplicate data, manipulate date/time values, rename columns, and aggregate data. Describe Azure Databricks Read and write data in Azure Databricks Work with DataFrames in Azure Databricks Work with DataFrames advanced methods in Azure Databricks Lab 6: Data Exploration and Transformation in Azure Databricks Use DataFrames in Azure Databricks to explore and filter data Cache a DataFrame for faster subsequent queries Remove duplicate data Manipulate date/time values Remove and rename DataFrame columns Aggregate data stored in a DataFrame After completing module 6, students will be able to: Describe Azure Databricks Read and write data in Azure Databricks Work with DataFrames in Azure Databricks Work with DataFrames advanced methods in Azure Databricks Module 7: Ingest and load data into the data warehouse This module teaches students how to ingest data into the data warehouse through T-SQL scripts and Synapse Analytics integration pipelines. The student will learn how to load data into Synapse dedicated SQL pools with PolyBase and COPY using T-SQL. The student will also learn how to use workload management along with a Copy activity in a Azure Synapse pipeline for petabyte-scale data ingestion. Use data loading best practices in Azure Synapse Analytics Petabyte-scale ingestion with Azure Data Factory Lab 7: Ingest and load Data into the Data Warehouse Perform petabyte-scale ingestion with Azure Synapse Pipelines Import data with PolyBase and COPY using T-SQL Use data loading best practices in Azure Synapse Analytics After completing module 7, students will be able to: Use data loading best practices in Azure Synapse Analytics Petabyte-scale ingestion with Azure Data Factory Module 8: Transform data with Azure Data Factory or Azure Synapse Pipelines This module teaches students how to build data integration pipelines to ingest from multiple data sources, transform data using mapping data flowss, and perform data movement into one or more data sinks. Data integration with Azure Data Factory or Azure Synapse Pipelines Code-free transformation at scale with Azure Data Factory or Azure Synapse Pipelines Lab 8: Transform Data with Azure Data Factory or Azure Synapse Pipelines Execute code-free transformations at scale with Azure Synapse Pipelines Create data pipeline to import poorly formatted CSV files Create Mapping Data Flows After completing module 8, students will be able to: Perform data integration with Azure Data Factory Perform code-free transformation at scale with Azure Data Factory Module 9: Orchestrate data movement and transformation in Azure Synapse Pipelines In this module, you will learn how to create linked services, and orchestrate data movement and transformation using notebooks in Azure Synapse Pipelines. Orchestrate data movement and transformation in Azure Data Factory Lab 9: Orchestrate data movement and transformation in Azure Synapse Pipelines Integrate Data from Notebooks with Azure Data Factory or Azure Synapse Pipelines After completing module 9, students will be able to: Orchestrate data movement and transformation in Azure Synapse Pipelines Module 10: Optimize query performance with dedicated SQL pools in Azure Synapse In this module, students will learn strategies to optimize data storage and processing when using dedicated SQL pools in Azure Synapse Analytics. The student will know how to use developer features, such as windowing and HyperLogLog functions, use data loading best practices, and optimize and improve query performance. Optimize data warehouse query performance in Azure Synapse Analytics Understand data warehouse developer features of Azure Synapse Analytics Lab 10: Optimize Query Performance with Dedicated SQL Pools in Azure Synapse Understand developer features of Azure Synapse Analytics Optimize data warehouse query performance in Azure Synapse Analytics Improve query performance After completing module 10, students will be able to: Optimize data warehouse query performance in Azure Synapse Analytics Understand data warehouse developer features of Azure Synapse Analytics Module 11: Analyze and Optimize Data Warehouse Storage In this module, students will learn how to analyze then optimize the data storage of the Azure Synapse dedicated SQL pools. The student will know techniques to understand table space usage and column store storage details. Next the student will know how to compare storage requirements between identical tables that use different data types. Finally, the student will observe the impact materialized views have when executed in place of complex queries and learn how to avoid extensive logging by optimizing delete operations. Analyze and optimize data warehouse storage in Azure Synapse Analytics Lab 11: Analyze and Optimize Data Warehouse Storage Check for skewed data and space usage Understand column store storage details Study the impact of materialized views Explore rules for minimally logged operations After completing module 11, students will be able to: Analyze and optimize data warehouse storage in Azure Synapse Analytics Module 12: Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link In this module, students will learn how Azure Synapse Link enables seamless connectivity of an Azure Cosmos DB account to a Synapse workspace. The student will understand how to enable and configure Synapse link, then how to query the Azure Cosmos DB analytical store using Apache Spark and SQL serverless. Design hybrid transactional and analytical processing using Azure Synapse Analytics Configure Azure Synapse Link with Azure Cosmos DB Query Azure Cosmos DB with Apache Spark pools Query Azure Cosmos DB with serverless SQL pools Lab 12: Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link Configure Azure Synapse Link with Azure Cosmos DB Query Azure Cosmos DB with Apache Spark for Synapse Analytics Query Azure Cosmos DB with serverless SQL pool for Azure Synapse Analytics After completing module 12, students will be able to: Design hybrid transactional and analytical processing using Azure Synapse Analytics Configure Azure Synapse Link with Azure Cosmos DB Query Azure Cosmos DB with Apache Spark for Azure Synapse Analytics Query Azure Cosmos DB with SQL serverless for Azure Synapse Analytics Module 13: End-to-end security with Azure Synapse Analytics In this module, students will learn how to secure a Synapse Analytics workspace and its supporting infrastructure. The student will observe the SQL Active Directory Admin, manage IP firewall rules, manage secrets with Azure Key Vault and access those secrets through a Key Vault linked service and pipeline activities. The student will understand how to implement column-level security, row-level security, and dynamic data masking when using dedicated SQL pools. Secure a data warehouse in Azure Synapse Analytics Configure and manage secrets in Azure Key Vault Implement compliance controls for sensitive data Lab 13: End-to-end security with Azure Synapse Analytics Secure Azure Synapse Analytics supporting infrastructure Secure the Azure Synapse Analytics workspace and managed services Secure Azure Synapse Analytics workspace data After completing module 13, students will be able to: Secure a data warehouse in Azure Synapse Analytics Configure and manage secrets in Azure Key Vault Implement compliance controls for sensitive data Module 14: Real-time Stream Processing with Stream Analytics In this module, students will learn how to process streaming data with Azure Stream Analytics. The student will ingest vehicle telemetry data into Event Hubs, then process that data in real time, using various windowing functions in Azure Stream Analytics. They will output the data to Azure Synapse Analytics. Finally, the student will learn how to scale the Stream Analytics job to increase throughput. Enable reliable messaging for Big Data applications using Azure Event Hubs Work with data streams by using Azure Stream Analytics Ingest data streams with Azure Stream Analytics Lab 14: Real-time Stream Processing with Stream Analytics Use Stream Analytics to process real-time data from Event Hubs Use Stream Analytics windowing functions to build aggregates and output to Synapse Analytics Scale the Azure Stream Analytics job to increase throughput through partitioning Repartition the stream input to optimize parallelization After completing module 14, students will be able to: Enable reliable messaging for Big Data applications using Azure Event Hubs Work with data streams by using Azure Stream Analytics Ingest data streams with Azure Stream Analytics Module 15: Create a Stream Processing Solution with Event Hubs and Azure Databricks In this module, students will learn how to ingest and process streaming data at scale with Event Hubs and Spark Structured Streaming in Azure Databricks. The student will learn the key features and uses of Structured Streaming. The student will implement sliding windows to aggregate over chunks of data and apply watermarking to remove stale data. Finally, the student will connect to Event Hubs to read and write streams. Process streaming data with Azure Databricks structured streaming Lab 15: Create a Stream Processing Solution with Event Hubs and Azure Databricks Explore key features and uses of Structured Streaming Stream data from a file and write it out to a distributed file system Use sliding windows to aggregate over chunks of data rather than all data Apply watermarking to remove stale data Connect to Event Hubs read and write streams After completing module 15, students will be able to: Process streaming data with Azure Databricks structured streaming Module 16: Build reports using Power BI integration with Azure Synpase Analytics In this module, the student will learn how to integrate Power BI with their Synapse workspace to build reports in Power BI. The student will create a new data source and Power BI report in Synapse Studio. Then the student will learn how to improve query performance with materialized views and result-set caching. Finally, the student will explore the data lake with serverless SQL pools and create visualizations against that data in Power BI. Create reports with Power BI using its integration with Azure Synapse Analytics Lab 16: Build reports using Power BI integration with Azure Synpase Analytics Integrate an Azure Synapse workspace and Power BI Optimize integration with Power BI Improve query performance with materialized views and result-set caching Visualize data with SQL serverless and create a Power BI report After completing module 16, students will be able to: Create reports with Power BI using its integration with Azure Synapse Analytics Module 17: Perform Integrated Machine Learning Processes in Azure Synapse Analytics This module explores the integrated, end-to-end Azure Machine Learning and Azure Cognitive Services experience in Azure Synapse Analytics. You will learn how to connect an Azure Synapse Analytics workspace to an Azure Machine Learning workspace using a Linked Service and then trigger an Automated ML experiment that uses data from a Spark table. You will also learn how to use trained models from Azure Machine Learning or Azure Cognitive Services to enrich data in a SQL pool table and then serve prediction results using Power BI. Use the integrated machine learning process in Azure Synapse Analytics Lab 17: Perform Integrated Machine Learning Processes in Azure Synapse Analytics Create an Azure Machine Learning linked service Trigger an Auto ML experiment using data from a Spark table Enrich data using trained models Serve prediction results using Power BI After completing module 17, students will be able to: Use the integrated machine learning process in Azure Synapse Analytics     [-]
Les mer
Virtuelt klasserom 3 timer 1 990 kr
03 Sep
22 Oct
03 Dec
Du arver et regneark fra en kollega som har sluttet eller gått over i en annen stilling, eller andre har laget et regneark som du skal bruke og utvikle. Hvordan går du fr... [+]
Kursinnhold Enkle formler Cellereferanser Gi navn til celler og områder Feilkontroll og formelrevisjon Hente data fra andre ark og arbeidsbøker Egendefinerte tallformater Betinget formatering Utklippstavle og avansert innliming   Det er fordelaktig å ha to skjermer - en til å følge kurset og en til å gjøre det kursholder demonstrerer.   Kurset gjennomføres i sanntid med nettundervisning via Teams. Det blir mulighet for å stille spørsmål, ha diskusjoner, demonstrasjoner og øvelser. Du vil motta en invitasjon til Teams fra kursholder. [-]
Les mer
Virtuelt eller personlig 1 dag 6 500 kr
Kurset passer for deg som har god erfaring i generell bruk av Revit og som skal prosjektere og utføre hydrauliske beregninger på sprinkleranlegg. [+]
Her er et utvalg av temaene du vil lære på kurset: Oppsett av nytt sprinklerprosjekt i Revit Prosjektering av sprinkleranlegg Behandling av rørtyper, systemer etc Lage egne produkter for sprinklerhoder og andre produkter Hydrauliske beregninger IFC-eksport Oppsett av tegninger [-]
Les mer