IT-kurs
Du har valgt: Brøndbyvester
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Brøndbyvester ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Receive practical guidance on the processes and activities of Problem Management, including their roles in the service value chain. [+]
Understand the purpose and key concepts of Problem Management, including its role in identifying and managing the root causes of incidents to prevent recurrence.   This eLearning is: Interactive   Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn best practices for making new and changed services available for use, in line with your organisation's policies and any agreements between the organisation and its ... [+]
Understand the purpose and key concepts of Release Management, elucidating its significance in planning, scheduling, and controlling the build, test, and deployment of releases to ensure they deliver the expected outcomes. The eLearning course: Interactive Self-paced Device-friendly 2-3 hour content Mobile-optimised Practical exercises   Exam:   20 questions Multiple choise Closed book 30 minutes Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course teaches developers how to create end-to-end solutions in Microsoft Azure [+]
. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.   TARGET AUDIENCE Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam.   COURSE CONTENT Module 1: Creating Azure App Service Web Apps Students will learn how to build a web application on the Azure App Service platform. They will learn how the platform functions and how to create, configure, scale, secure, and deploy to the App Service platform. Azure App Service core concepts Creating an Azure App Service Web App Configuring and Monitoring App Service apps Scaling App Service apps Azure App Service staging environments Module 2: Implement Azure functions This module covers creating Functions apps, and how to integrate triggers and inputs/outputs in to the app. Azure Functions overview Developing Azure Functions Implement Durable Functions Module 3: Develop solutions that use blob storage Students will learn how Azure Blob storage works, how to manage data through the hot/cold/archive blob storage lifecycle, and how to use the Azure Blob storage client library to manage data and metadata. Azure Blob storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Module 4: Develop solutions that use Cosmos DB storage Students will learn how Cosmos DB is structured and how data consistency is managed. Students will also learn how to create Cosmos DB accounts and create databases, containers, and items by using a mix of the Azure Portal and the .NET SDK. Azure Cosmos DB overview Azure Cosmos DB data structure Working with Azure Cosmos DB resources and data Module 5: Implement IaaS solutions This module instructs students on how to use create VMs and container images to use in their solutions. It covers creating VMs, using ARM templates to automate resource deployment, create and manage Docker images, publishing an image to the Azure Container Registry, and running a container in Azure Container Instances. Provisioning VMs in Azure Create and deploy ARM templates Create container images for solutions Publish a container image to Azure Container Registry Create and run container images in Azure Container Instances Module 6: Implement user authentication and authorization Students will learn how to leverage the Microsoft Identity Platform v2.0 to manage authentication and access to resources. Students will also learn how to use the Microsoft Authentication Library and Microsoft Graph to authenticate a user and retrieve information stored in Azure, and how and when to use Shared Access Signatures. Microsoft Identity Platform v2.0 Authentication using the Microsoft Authentication Library Using Microsoft Graph Authorizing data operations in Azure Storage Module 7: Implement secure cloud solutions This module covers how to secure the information (keys, secrets, certificates) an application uses to access resources. It also covers securing application configuration information. Manage keys, secrets, and certificates by using the KeyVault API Implement Managed Identities for Azure resources Secure app configuration data by using Azure App Configuration Module 8: Implement API Management Students will learn how to publish APIs, create policies to manage information shared through the API, and to manage access to their APIs by using the Azure API Management service. API Management overview Defining policies for APIs Securing your APIs Module 9: Develop App Service Logic Apps This module teaches students how to use Azure Logic Apps to schedule, automate, and orchestrate tasks, business processes, workflows, and services across enterprises or organizations. Azure Logic Apps overview Creating custom connectors for Logic Apps Module 10: Develop event-based solutions Students will learn how to build applications with event-based architectures. Implement solutions that use Azure Event Grid Implement solutions that use Azure Event Hubs Implement solutions that use Azure Notification Hubs Module 11: Develop message-based solutions Students will learn how to build applications with message-based architectures. Implement solutions that use Azure Service Bus Implement solutions that use Azure Queue Storage queues Module 12: Monitor and optimize Azure solutions This module teaches students how to instrument their code for telemetry and how to analyze and troubleshoot their apps. Overview of monitoring in Azure Instrument an app for monitoring Analyzing and troubleshooting apps Implement code that handles transient faults Module 13: Integrate caching and content delivery within solutions Students will learn how to use different caching services to improve the performance of their apps. Develop for Azure Cache for Redis Develop for storage on CDNs [-]
Les mer
Oslo 2 dager 16 900 kr
11 Sep
11 Sep
08 Dec
SAFe® 6.0 for Teams [+]
SAFe® for Teams Certification [-]
Les mer
Oslo 2 dager 16 900 kr
11 Sep
11 Sep
11 Dec
UX Foundation [+]
UX Foundation [-]
Les mer
Oslo 1 dag 9 900 kr
12 Sep
12 Sep
21 Nov
ITIL® 4 Practitioner: Monitoring and Event Management [+]
ITIL® 4 Practitioner: Monitoring and Event Management [-]
Les mer
Virtuelt klasserom 2 timer 1 990 kr
Excel – Du trodde du kunne det? [+]
Excel – Du trodde du kunne det? [-]
Les mer
Nettstudie 1 dag 5 900 kr
Hvordan fylle rollen som personvernombud, og hva må du kunne. Ett kurs for deg som DPO og vil bli bedriftens kompetanse person på GDPR [+]
Personvernforordningen / General Data Protection Regulation (GDPR) Vi går gjennom de deler du må ha kompetanse om, og du får fyldig kursmateriale med deg hjem, slik at du enklere kan mester fagområdet etter kurset. Men på ettdagskurs er det ikke dybdegejnnomgang av områder som DPIA, teknologi og prosess rundt GAP planer. Du får alikevel med deg materiale så du kan lese etterpå. Hva er formålet med forordninga og hvordan forordningen er strukturert. Vi går gjennom  tilsynsmyndighet og hvilke innvirkninger den loven har på Norge, EU og andre land.  Du får kompetanse om hovedpunkter i forordningen med de viktige nøkkelkonsepter, kategorier for personlig informasjon og prinsipper for databeskyttelse. Den registrertes rettigheter og hvordan analyser utfordringer og problemer En viktig kompetanse som mange ikke kjenner godt nok er hvilke roller, forpliktelser og behandlingsaktiviteter som må mestres, så vi ser på personvernombudets betegnelser  Konsekvensanalyse av databeskyttelse og personvernombudet Behandlingsaktiviteter og personvernombudet  Kontrollers ansvar Personvernombudet sitt ansvarRegistrering av behandlingsaktiviteterSamarbeid med tilsynsmyndighetHvordan starte program for å etterleve personvernforordningenHvem må forholde seg til personvernforordningenMetoder og tilnærmingForbered program for personvernforordningenHvordan avdekke mangler  og i dentifiser strategiske målLedelsens ansvar og godkjenning [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
OFFICIAL (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL TRAINING - INCLUDING EXAM [+]
COURSE OVERVIEW The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the cybersecurity market. CISSP validates a cybersecurity professional’s deep technical and managerial knowledge and experience to effectively design, engineer and manage an organization’s overall security posture. Please note an exam voucher is included as part of this course TARGET AUDIENCE Cybersecurity professionals with at least 5 years in the information security field. Member data has shown that amajority of CISSP holders are in middle management and a much smaller proportion are in senior or junior/entry-level positions. Roles include:• Chief Information Officer• Chief Information Security Officer• Chief Technology Officer• Compliance Manager / Officer• Director of Security• Information Architect• Information Manager / Information RiskManager or Consultant• IT Specialist / Director / Manager• Network / System Administrator• Security Administrator• Security Architect / Security Analyst• Security Consultant• Security Manager• Security Systems Engineer / Security EngineerSectorsCISSP is relevant across all sectors and industries, including:• Aerospace• Automotive• Banking, financial services, insurance (BFSI)• Construction• Cybersecurity• Energy• Engineering• Government• Healthcare, IT products, services, consulting• Manufacturing• Pharma• Retail• Telecom COURSE OBJECTIVESAfter completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age. Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections. Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function. List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7. Identify standard terms for applying physical and logical access controls to environments related to their security practice. Appraise various access control models to meet business security requirements. Name primary methods for designing and validating test and audit strategies that support business requirements. Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures. Recognize risks to an organization’s operational endeavours and assess specific threats, vulnerabilities and controls. Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security. COURSE CONTENT Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security Architecture and Engineering Domain 4: Communication and Network Security Domain 5: Identity and Access Management (IAM) Domain 6: Security Assessment and Testing Domain 7: Security Operations Domain 8: Software Development Security TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)2 Certified Information Systems Security Professional Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification Please note an exam voucher is included as part of this course   [-]
Les mer
Klasserom + nettkurs Sentrum 1 dag 4 490 kr
Dette kurset passer fro deg som ikke har jobbet med Word tidligere, men ønsker å komme i gang! [+]
Har du lite eller ingen erfaring med Word og ønsker en innføring i programmet? På dette kurset lærer du hvordan du kan sette opp, skrive/redigere og formatere dokumenter på en fornuftig måte i Word. Du jobber i ditt eget tempo via et e-læringsprogram, med instruktør tilstede i rommet som hjelper deg om du står fast.   Kursinnhold:   Bli kjent med Word Oppstart Åpning Visninger Navigering Nye dokumenter Innskriving Lagring og lukking Alternativer Egenskaper Hjelpemuligheter   Redigering Merking Sletting og erstatting Symboler og spesialtegn Angremuligheter Sammenslåing og deling av avsnitt Flytting og kopiering Søking og erstatting   Formatering Hva er formatering? Tegnformatering Avstand mellom tegn Avsnittsformatering Avstand mellom linjer og avsnitt Justering Innrykk Punktlister og nummererte lister Tabulatorer Kantlinjer og skyggelegging Kopiering av format Stiler   Sideformatering Inndelinger Marger Papirretning og størrelse Spalter Topptekst og bunntekst Sidetall og dokumentinformasjon Forsider og tomme sider Hardt sideskift Dokumenttema   Språkverktøy Autokorrektur Byggeblokker Stave- og grammatikkontroll Synonymordbok Orddeling Ordtelling Dato og klokkeslett   Utskrift Utskriftsformat Forhåndsvisning Utskrift Konvolutter og etiketter   Tabeller Utforming av tabeller Merking Innsetting og sletting Flytting og kopiering Tabellstiler Radhøyde og kolonnebredde Justering Kantlinjer og skyggefarge   Bilder og objekter Bruk av bilder Utklipp og bildefiler Tekstbryting og plassering Formatering av bilder Figurer Tekstbokser Arbeid med objekter WordArt SmartArt Diagram   Fletting Utskriftsfletting Hoveddokument Datakilde Innsetting av flettefelt Fletting Fletteveiviseren   Internett og distribusjon Websider Hyperkoblinger Elektronisk post PDF- og XPS-format Dokumentinspeksjon Endelig versjon [-]
Les mer
Oslo 1 dag 9 900 kr
22 Sep
22 Sep
01 Dec
ITIL® 4 Practitioner: Change enablement [+]
ITIL® 4 Practitioner: Change Enablement [-]
Les mer
2 dager 14 900 kr
ISO/IEC 27701 Foundation [+]
ISO/IEC 27701 Foundation [-]
Les mer
Virtuelt klasserom 3 dager 20 000 kr
This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. [+]
COURSE OVERVIEW  This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure. TARGET AUDIENCE This course is aimed at Network Engineers looking to specialize in Azure networking solutions. An Azure Network engineer designs and implements core Azure networking infrastructure, hybrid networking connections, load balance traffic, network routing, private access to Azure services, network security and monitoring. The azure network engineer will manage networking solutions for optimal performance, resiliency, scale, and security. COURSE CONTENT Module 1: Azure Virtual Networks In this module you will learn how to design and implement fundamental Azure Networking resources such as virtual networks, public and private IPs, DNS, virtual network peering, routing, and Azure Virtual NAT. Azure Virtual Networks Public IP Services Public and Private DNS Cross-VNet connectivity Virtual Network Routing Azure virtual Network NAT Lab 1: Design and implement a Virtual Network in Azure Lab 2: Configure DNS settings in Azure Lab 3: Connect Virtual Networks with Peering After completing module 1, students will be able to: Implement virtual networks Configure public IP services Configure private and public DNS zones Design and implement cross-VNET connectivity Implement virtual network routing Design and implement an Azure Virtual Network NAT   Module 2: Design and Implement Hybrid Networking In this module you will learn how to design and implement hybrid networking solutions such as Site-to-Site VPN connections, Point-to-Site VPN connections, Azure Virtual WAN and Virtual WAN hubs. Site-to-site VPN connection Point-to-Site VP connections Azure Virtual WAN Lab 4: Create and configure a local gateway Create and configure a virtual network gateway Create a Virtual WAN by using Azure Portal Design and implement a site-to-site VPN connection Design and implement a point-to-site VPN connection Design and implement authentication Design and implement Azure Virtual WAN Resources   Module 3: Design and implement Azure ExpressRoute In this module you will learn how to design and implement Azure ExpressRoute, ExpressRoute Global Reach, ExpressRoute FastPath and ExpressRoute Peering options. ExpressRoute ExpressRoute Direct ExpressRoute FastPath ExpressRoute Peering Lab 5: Create and configure ExpressRoute Design and implement Expressroute Design and implement Expressroute Direct Design and implement Expressroute FastPath   Module 4: load balancing non-HTTP(S) traffic in Azure In this module you will learn how to design and implement load balancing solutions for non-HTTP(S) traffic in Azure with Azure Load balancer and Traffic Manager. Content Delivery and Load Blancing Azure Load balancer Azure Traffic Manager Azure Monitor Network Watcher Lab 6: Create and configure a public load balancer to load balance VMs using the Azure portal Lab:7 Create a Traffic Manager Profile using the Azure portal Lab 8: Create, view, and manage metric alerts in Azure Monitor Design and implement Azure Laod Balancers Design and implement Azure Traffic Manager Monitor Networks with Azure Monitor Use Network Watcher   Module 5: Load balancing HTTP(S) traffic in Azure In this module you will learn how to design and implement load balancing solutions for HTTP(S) traffic in Azure with Azure Application gateway and Azure Front Door. Azure Application Gateway Azure Front Door Lab 9: Create a Front Door for a highly available web application using the Azure portal Lab 10: Create and Configure an Application Gateway Design and implement Azure Application Gateway Implement Azure Front Door   Module 6: Design and implement network security In this module you will learn to design and imponent network security solutions such as Azure DDoS, Azure Firewalls, Network Security Groups, and Web Application Firewall. Azure DDoS Protection Azure Firewall Network Security Groups Web Application Firewall on Azure Front Door Lab 11: Create a Virtual Network with DDoS protection plan Lab 12: Deploy and Configure Azure Firewall Lab 13: Create a Web Application Firewall policy on Azure Front Door Configure and monitor an Azure DDoS protection plan implement and manage Azure Firewall Implement network security groups Implement a web application firewall (WAF) on Azure Front Door   Module 7: Design and implement private access to Azure Services In this module you will learn to design and implement private access to Azure Services with Azure Private Link, and virtual network service endpoints. Define Azure Private Link and private endpoints Design and Configure Private Endpoints Integrate a Private Link with DNS and on-premises clients Create, configure, and provide access to Service Endpoints Configure VNET integration for App Service Lab 14: restrict network access to PaaS resources with virtual network service endpoints Lab 15: create an Azure private endpoint Define the difference between Private Link Service and private endpoints Design and configure private endpoints Explain virtual network service endpoints Design and configure access to service endpoints Integrate Private Link with DNS Integrate your App Service with Azure virtual networks   TEST CERTIFICATION This course helps to prepare for exam AZ-700 [-]
Les mer
Virtuelt eller personlig 1 dag 3 120 kr
Målsetning for kurset: Opparbeide ferdigheter i å navigere, kommunisere og hente ut informasjon fra BIM-modeller i IFC-formatet med bruk av Solibri Anywhere. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt.NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Solibri Anywhere og Site   På kurset vil du lære å: Sammenstille flere IFC-modeller og navigere i disse Velge ut grupper av objekter for nærmere studier Legge inn snitt, måle, markere og opprette slides fra visninger av modellen Opprette rapporter og kommentere «issues» i Excel og BCF-format Se på resultatet av utførte regelsjekker i modellen Se på resultatet av utførte informasjons- og mengdeuttak fra modellen Høste informasjon og mengder fra modellen basert på eksisterende maler og klassifikasjoner Skape egne klassifikasjoner og definisjoner for megndeuttak   Dette er et populært kurs, meld deg på nå! Spesialtilpasset kurs: NTI anbefaler spesialtilpassede kurs for bedrifter som planlegger å sende to eller flere deltakere på Solibri-kurs. Grunnen til dette er at Solibri brukes av mange forskjellige aktører og profesjoner i BAE-bransjen, og følgelig blir de åpne kursene ofte for generelle for enkelte kursdeltakere. I et spesialtilpasset kurs vil vår kurskonsulent kartlegge fokusområdene i forkant av kurset, og gjennomføre kurset i henhold til selskapets behov, gjerne basert på kundens egne modeller. Utbyttet av kurset blir følgelig mye større.  Ta kontakt med oss på telefon 483 12 300, epost: salg-no@nti.biz eller les mer på www.nti.biz   [-]
Les mer