IT-kurs
Nordland
Du har valgt: Bodø
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Bodø ) i IT-kurs
 

Nettkurs 12 måneder 12 000 kr
ITIL® 4 Specialist: Drive Stakeholder Value dekker alle typer engasjement og interaksjon mellom en tjenesteleverandør og deres kunder, brukere, leverandører og partnere. [+]
Kurset fokuserer på konvertering av etterspørsel til verdi via IT-relaterte tjenester. Modulen dekker sentrale emner som SLA-design, styring av flere leverandører, kommunikasjon, relasjonsstyring, CX- og UX-design, kartlegging av kunder og mer. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på  AXELOS sine websider. Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Specialist: Create, Deliver and Support dekker «kjernen» i ITIL®, aktiviteter rundt administrasjon av tjenester, og utvider omfanget av ITIL® til å omfatte «oppre... [+]
Kurset fokuserer på integrering av forskjellige verdistrømmer og aktiviteter for å lage, levere og støtte IT-aktiverte produkter og tjenester, samtidig som den dekker støtte for praksis, metoder og verktøy. Kurset gir kandidatene forståelse for tjenestekvalitet og forbedringsmetoder. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Specialist: Create, Deliver and Support e-læring (engelsk) i 12 måneder. ITIL® 4 Specialist: Create, Deliver and Support online voucher til sertifiseringstest.  Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
OFFICIAL (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL TRAINING - INCLUDING EXAM [+]
COURSE OVERVIEW The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the cybersecurity market. CISSP validates a cybersecurity professional’s deep technical and managerial knowledge and experience to effectively design, engineer and manage an organization’s overall security posture. Please note an exam voucher is included as part of this course TARGET AUDIENCE Cybersecurity professionals with at least 5 years in the information security field. Member data has shown that amajority of CISSP holders are in middle management and a much smaller proportion are in senior or junior/entry-level positions. Roles include:• Chief Information Officer• Chief Information Security Officer• Chief Technology Officer• Compliance Manager / Officer• Director of Security• Information Architect• Information Manager / Information RiskManager or Consultant• IT Specialist / Director / Manager• Network / System Administrator• Security Administrator• Security Architect / Security Analyst• Security Consultant• Security Manager• Security Systems Engineer / Security EngineerSectorsCISSP is relevant across all sectors and industries, including:• Aerospace• Automotive• Banking, financial services, insurance (BFSI)• Construction• Cybersecurity• Energy• Engineering• Government• Healthcare, IT products, services, consulting• Manufacturing• Pharma• Retail• Telecom COURSE OBJECTIVESAfter completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age. Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections. Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function. List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7. Identify standard terms for applying physical and logical access controls to environments related to their security practice. Appraise various access control models to meet business security requirements. Name primary methods for designing and validating test and audit strategies that support business requirements. Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures. Recognize risks to an organization’s operational endeavours and assess specific threats, vulnerabilities and controls. Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security. COURSE CONTENT Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security Architecture and Engineering Domain 4: Communication and Network Security Domain 5: Identity and Access Management (IAM) Domain 6: Security Assessment and Testing Domain 7: Security Operations Domain 8: Software Development Security TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)2 Certified Information Systems Security Professional Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification Please note an exam voucher is included as part of this course   [-]
Les mer
1 dag 12 500 kr
Google Cloud Fundamentals: Core Infrastructure [+]
Google Cloud Fundamentals: Core Infrastructure [-]
Les mer
Oslo 1 dag 9 900 kr
22 Sep
22 Sep
01 Dec
ITIL® 4 Practitioner: Change enablement [+]
ITIL® 4 Practitioner: Change Enablement [-]
Les mer
Virtuelt klasserom 3 dager 20 000 kr
Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. [+]
 This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure. TARGET AUDIENCE This course is designed for data scientists with existing knowledge of Python and machine learning frameworks like Scikit-Learn, PyTorch, and Tensorflow, who want to build and operate machine learning solutions in the cloud. COURSE CONTENT Module 1: Introduction to Azure Machine Learning In this module, you will learn how to provision an Azure Machine Learning workspace and use it to manage machine learning assets such as data, compute, model training code, logged metrics, and trained models. You will learn how to use the web-based Azure Machine Learning studio interface as well as the Azure Machine Learning SDK and developer tools like Visual Studio Code and Jupyter Notebooks to work with the assets in your workspace. Getting Started with Azure Machine Learning Azure Machine Learning Tools Lab : Creating an Azure Machine Learning WorkspaceLab : Working with Azure Machine Learning Tools After completing this module, you will be able to Provision an Azure Machine Learning workspace Use tools and code to work with Azure Machine Learning Module 2: No-Code Machine Learning with Designer This module introduces the Designer tool, a drag and drop interface for creating machine learning models without writing any code. You will learn how to create a training pipeline that encapsulates data preparation and model training, and then convert that training pipeline to an inference pipeline that can be used to predict values from new data, before finally deploying the inference pipeline as a service for client applications to consume. Training Models with Designer Publishing Models with Designer Lab : Creating a Training Pipeline with the Azure ML DesignerLab : Deploying a Service with the Azure ML Designer After completing this module, you will be able to Use designer to train a machine learning model Deploy a Designer pipeline as a service Module 3: Running Experiments and Training Models In this module, you will get started with experiments that encapsulate data processing and model training code, and use them to train machine learning models. Introduction to Experiments Training and Registering Models Lab : Running ExperimentsLab : Training and Registering Models After completing this module, you will be able to Run code-based experiments in an Azure Machine Learning workspace Train and register machine learning models Module 4: Working with Data Data is a fundamental element in any machine learning workload, so in this module, you will learn how to create and manage datastores and datasets in an Azure Machine Learning workspace, and how to use them in model training experiments. Working with Datastores Working with Datasets Lab : Working with DatastoresLab : Working with Datasets After completing this module, you will be able to Create and consume datastores Create and consume datasets Module 5: Compute Contexts One of the key benefits of the cloud is the ability to leverage compute resources on demand, and use them to scale machine learning processes to an extent that would be infeasible on your own hardware. In this module, you'll learn how to manage experiment environments that ensure consistent runtime consistency for experiments, and how to create and use compute targets for experiment runs. Working with Environments Working with Compute Targets Lab : Working with EnvironmentsLab : Working with Compute Targets After completing this module, you will be able to Create and use environments Create and use compute targets Module 6: Orchestrating Operations with Pipelines Now that you understand the basics of running workloads as experiments that leverage data assets and compute resources, it's time to learn how to orchestrate these workloads as pipelines of connected steps. Pipelines are key to implementing an effective Machine Learning Operationalization (ML Ops) solution in Azure, so you'll explore how to define and run them in this module. Introduction to Pipelines Publishing and Running Pipelines Lab : Creating a PipelineLab : Publishing a Pipeline After completing this module, you will be able to Create pipelines to automate machine learning workflows Publish and run pipeline services Module 7: Deploying and Consuming Models Models are designed to help decision making through predictions, so they're only useful when deployed and available for an application to consume. In this module learn how to deploy models for real-time inferencing, and for batch inferencing. Real-time Inferencing Batch Inferencing Lab : Creating a Real-time Inferencing ServiceLab : Creating a Batch Inferencing Service After completing this module, you will be able to Publish a model as a real-time inference service Publish a model as a batch inference service Module 8: Training Optimal Models By this stage of the course, you've learned the end-to-end process for training, deploying, and consuming machine learning models; but how do you ensure your model produces the best predictive outputs for your data? In this module, you'll explore how you can use hyperparameter tuning and automated machine learning to take advantage of cloud-scale compute and find the best model for your data. Hyperparameter Tuning Automated Machine Learning Lab : Tuning HyperparametersLab : Using Automated Machine Learning After completing this module, you will be able to Optimize hyperparameters for model training Use automated machine learning to find the optimal model for your data Module 9: Interpreting Models Many of the decisions made by organizations and automated systems today are based on predictions made by machine learning models. It's increasingly important to be able to understand the factors that influence the predictions made by a model, and to be able to determine any unintended biases in the model's behavior. This module describes how you can interpret models to explain how feature importance determines their predictions. Introduction to Model Interpretation using Model Explainers Lab : Reviewing Automated Machine Learning ExplanationsLab : Interpreting Models After completing this module, you will be able to Generate model explanations with automated machine learning Use explainers to interpret machine learning models Module 10: Monitoring Models After a model has been deployed, it's important to understand how the model is being used in production, and to detect any degradation in its effectiveness due to data drift. This module describes techniques for monitoring models and their data. Monitoring Models with Application Insights Monitoring Data Drift Lab : Monitoring a Model with Application InsightsLab : Monitoring Data Drift After completing this module, you will be able to Use Application Insights to monitor a published model Monitor data drift   [-]
Les mer
4 dager 23 000 kr
This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. [+]
 Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments.Students for AZ-140: Configuring and Operating Windows Virtual Desktop on Microsoft Azure are interested in delivering applications on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments. As a Windows Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Windows Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Windows Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Windows Virtual Desktop performance, and automate Windows Virtual Desktop management tasks. COURSE OBJECTIVES   Select an appropriate licensing model for Windows Virtual Desktop Implement networking for Windows Virtual Desktop Manage Windows Virtual Desktop session hosts by using Azure Bastion Configure storage for FSLogix components Create and manage session host images Implement Azure roles and role-based access control (RBAC) for Windows Virtual Desktop Configure user Windows Virtual Desktop experience settings Install and configure apps on a session host Implement business continuity and disaster recovery Monitor and manage Windows Virtual Desktop performance     COURSE CONTENT Module 1: Plan a Windows Virtual Desktop Architecture In this module, you will learn how to assess existing physical and virtual desktop environments, plan and configure name resolution for Active Directory (AD) and Azure Active Directory Domain Services (Azure AD DS), and plan for Windows Virtual Desktop client deployments. LESSONS M1 Windows Virtual Desktop Architecture Design the WVD architecture Design for user identities and profiles LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AZURE AD DS) LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AD DS) After completing module 1, students will be able to: Understand Windows Virtual Desktop Components Understand personal and pooled desktops Recommend an operating system for a WVD implementation Plan a host pools architecture Module 2: Implement a WVD Infrastructure In this module, you will learn how to manage connectivity to the internet and on-premises networks, create a host pool by using the Azure portal, deploy host pools and hosts by using Azure Resource Manager templates, apply OS and application updates to a running WVD host, and create a master image. LESSONS M2 Implement and manage networking for WVD Implement and manage storage for WVD Create and configure host pools and session hosts Create and manage session host image LAB: CREATE AND CONFIGURE HOST POOLS AND SESSION HOSTS (AZURE AD DS) LAB: DEPLOY HOST POOLS AND SESSION HOSTS BY USING THE AZURE PORTAL (AD DS) LAB: IMPLEMENT AND MANAGE STORAGE FOR WVD (AZURE AD DS) LAB: DEPLOY HOST POOLS AND HOSTS BY USING AZURE RESOURCE MANAGER TEMPLATES LAB: DEPLOY AND MANAGE HOST POOLS AND HOSTS BY USING POWERSHELL After completing module 2, students will be able to: Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Windows Virtual Desktop network connectivity Configure WVD session hosts using Azure Bastion Configure storage for FSLogix components Configure disks and file shares Modify a session host image Create and use a Shared Image Gallery (SIG) Module 3: Manage Access and Security In this module, you will learn how to plan and implement Azure roles and RBAC for WVD, implement Conditional Access policies for connections, plan and implement MFA, and manage security by using Azure Security Center. LESSONS M3 Manage access Manage security LAB: CONFIGURE CONDITIONAL ACCESS POLICIES FOR CONNECTIONS TO WVD (AD DS) After completing module 3, students will be able to: Manage local roles, groups and rights assignment on WVD session hosts. Configure user restrictions by using AD group policies and Azure AD policies Understand Conditional Access policy components Prepare for Azure Active Directory (Azure AD)-based Conditional Access for Windows Virtual Desktop Implement Azure AD-based Conditional Access for Windows Virtual Desktop Module 4: Manage User Environments and Apps In this module, you will learn how to plan for FSLogix, install FSLogix, configure Cloud Cache, deploy an application as a RemoteApp, and implement and manage OneDrive for Business for a multi-session environment. LESSONS M4 Implement and manage FSLogix Configure user experience settings Install and configure apps on a session host LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AZURE AD DS) LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AD DS) LAB: WINDOWS VIRTUAL DESKTOP APPLICATION PACKAGING (AD DS) After completing module 4, students will be able to: Configure Profile Containers Configure Azure Files to store profile containers for WVD in an AAD DS environment Implement FSLogix based profiles for Windows Virtual Desktop in Azure AD DS environment Implement FSLogix based profiles for Windows Virtual Desktop Prepare for and create MSIX app packages Implement MSIX app attach container for Windows Virtual Desktop in AD DS environmen Module 5: Monitor and maintain a WVD infrastructure In this module, you will learn how to plan and implement a disaster recovery plan for WVD, configure automation for WVD, implement autoscaling in host pools, and optimize session host capacity and performance. LESSONS M5 Plan and implement business continuity and disaster recovery Automate WVD management tasks Monitor and manage performance and health LAB: IMPLEMENT AUTOSCALING IN HOST POOLS (AD DS) After completing module 5, students will be able to: Plan and implement a disaster recovery plan for WVD Configure automation for WVD Monitor WVD by using Azure Monitor Customize Azure Workbooks for WVD monitoring Configure autoscaling of Windows Virtual Desktop session hosts Verify autoscaling of Windows Virtual Desktop session host [-]
Les mer
Nettkurs 5 dager 16 500 kr
ISO/IEC 27001 Lead Implementer [+]
ISO/IEC 27001 Lead Implementer [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Fi... [+]
COURSE OVERVIEW The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment TARGET AUDIENCE This course is aimed at Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff. COURSE OBJECTIVES After you complete this course, you will be able to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports COURSE CONTENT 1 - Palo Alto Networks Portfolio and Architecture 2 - Configuring Initial Firewall Settings 3 - Managing Firewall Configurations 4 - Managing Firewall Administrator Accounts 5 - Connecting the Firewall to Production Networks with Security Zones 6 - Creating and Managing Security Policy Rules 7 - Creating and Managing NAT Policy Rules 8 - Controlling Application Usage with App-ID 9 - Blocking Known Threats Using Security Profiles 10 - Blocking Inappropriate Web Traffic with URL Filtering 11 - Blocking Unknown Threats with Wildfire 12 - Controlling Access to Network Resources with User-ID 13 - Using Decryption to Block Threats in Encrypted Traffic 14 - Locating Valuable Information Using Logs and Reports 15 - What's Next in Your Training and Certification Journey Supplemental Materials Securing Endpoints with GlobalProtect Providing Firewall Redundancy with High Availability Connecting Remotes Sites using VPNs Blocking Common Attacks Using Zone Protection   FURTHER INFORMATION Level: Introductory Duration: 5 days Format: Lecture and hands-on labs Platform support: Palo Alto Networks next-generation firewalls running PAN-OS® operating system version 11.0     [-]
Les mer
1 dag 9 500 kr
07 Oct
25 Nov
AI-3003: Develop natural language processing solutions with Azure AI Services [+]
AI-3003: Develop natural language processing solution with Azure AI Services [-]
Les mer
1 dag 3 700 kr
Kurset i Google Analytics er for deg som ønsker å øke den relevante trafikken til dine nettsteder. Det holder ikke med å øke trafikken til nettsidene, om brukerne ik... [+]
Kursinnhold: De ulike begrepene som blir brukt i Google Analytics Segmentering av brukere i statistikken Hvordan lese relevant statistikk Hva du kan bruke tallene til videre i din markedsføring Hvordan nettsidene dine fungerer og hvor konverteringene kommer fra [-]
Les mer
Bergen Oslo 2 dager 9 900 kr
26 Aug
26 Aug
04 Sep
Excel Videregående [+]
Excel Videregående [-]
Les mer
1 dag 9 900 kr
Jira Project Administration (Cloud) [+]
Jira Project Administration (Cloud) [-]
Les mer