IT-kurs
Città Metropolitana di Firenze
Du har valgt: Castelfiorentino
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Castelfiorentino ) i IT-kurs
 

Nettkurs 12 måneder 9 000 kr
ITIL® 4 Specialist: Create, Deliver and Support dekker «kjernen» i ITIL®, aktiviteter rundt administrasjon av tjenester, og utvider omfanget av ITIL® til å omfatte «oppre... [+]
Kurset fokuserer på integrering av forskjellige verdistrømmer og aktiviteter for å lage, levere og støtte IT-aktiverte produkter og tjenester, samtidig som den dekker støtte for praksis, metoder og verktøy. Kurset gir kandidatene forståelse for tjenestekvalitet og forbedringsmetoder. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Specialist: Create, Deliver and Support e-læring (engelsk) i 12 måneder. ITIL® 4 Specialist: Create, Deliver and Support online voucher til sertifiseringstest.   ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 40 minutter 5 600 kr
MoP®, er et rammeverk og en veiledning for styring av prosjekter og programmer i en portefølje. Sertifiseringen MoP Foundation gir deg en innføring i porteføljestyring me... [+]
Du vil få tilsendt en «Core guidance» bok og sertifiserings-voucher slik at du kan ta sertifiseringstesten for eksempel hjemme eller på jobb. Denne vil være gyldig i ett år. Tid for sertifiseringstest avtales som beskrevet i e-post med voucher. Eksamen overvåkes av en web-basert eksamensvakt.   Eksamen er på engelsk. Eksamensformen er multiple choice - 50 spørsmål skal besvares, og du består ved 50% korrekte svar (dvs 25 av 50 spørsmål). Deltakerne har 40 minutter til rådighet på eksamen.  Ingen hjelpemidler er tillatt.   Nødvendige forkunnskaper: Ingen [-]
Les mer
Nettkurs 12 måneder 8 000 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 6 timer 349 kr
InDesign er et profesjonelt publiseringsverktøy som inneholder alt du trenger for å lage og publisere alt fra trykte bøker og brosjyrer til digitale tidsskrifter, iPad-ap... [+]
Bli en mester i Adobe InDesign, et ledende verktøy for profesjonell publisering, med kurset "InDesign: Komplett", ledet av Espen Faugstad hos Utdannet.no. InDesign er essensielt for alle som jobber med grafisk design, fra trykte materialer som bøker og brosjyrer til digitale formater som e-bøker og interaktive PDF-dokumenter. Dette kurset er ideelt for alle som ønsker å lære InDesign fra bunnen av, uavhengig av tidligere erfaring. Kurset gir deg en grundig gjennomgang av InDesign, fra organisering og tilgjengelige verktøy og paneler, til opprettelse av dokumenter og optimalisering av arbeidsflyten. Du vil lære å bruke grunnleggende og avanserte verktøy, arbeide effektivt med tekst og grafiske elementer, forstå mastersider, og håndtere farger og stiler. Kurset dekker også hvordan du effektivt kan bruke tabeller, pakke sammen, eksportere, og skrive ut prosjekter. Ved kursets slutt vil du ha en dyp forståelse av Adobe InDesign og være i stand til å produsere høykvalitets designmaterialer for en rekke formater og bruksområder. Kurset vil gi deg ferdighetene og kunnskapen som trengs for å bruke InDesign på et profesjonelt nivå.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Dokument Kapittel 3: Verktøy Kapittel 4: Sider Kapittel 5: Tekst Kapittel 6: Objekt Kapittel 7: Farger Kapittel 8: Stiler Kapittel 9: Tabeller Kapittel 10: Print Kapittel 11: Avslutning   Varighet: 5 timer og 54 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Oslo 2 dager 15 900 kr
30 May
30 May
04 Jul
ITIL® 4 Foundation - 2 days course for ITIL experienced [+]
ITIL® 4 Foundation - 2 days course for ITIL experienced [-]
Les mer
5 dager 30 000 kr
MCA: Microsoft 365 Modern Desktop Administrator Associate - Boot Camp [+]
MCA: Microsoft 365 Modern Desktop Administrator Associate - Boot Camp [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
The Implementing and Operating Cisco Enterprise Network Core Technologies course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterpri... [+]
COURSE OVERVIEW  Learn how to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. The automation and programmability of Enterprise networks is also incorporated in this course. This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 CE credits toward recertification   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 3 days of self study. The self-study content will be provided as part of the digital courseware that you receive at the beginning of the course and should be part of your preparation for the exam. Additional lab access will be provided at the end of the class, this will be valid for 60 hours or 90 days whichever is the shorter. It will be possible to complete all but 7 of the labs after the class. TARGET AUDIENCE Network engineers involved in the installation, support and troubleshooting of enterprise networks. COURSE OBJECTIVES After completing this course you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using EtherChannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Centre™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Centre and vManage COURSE CONTENT Examining Cisco Enterprise Network Architecture Cisco Enterprise Architecture Model Campus LAN Design Fundamentals Traditional Multilayer Campus Layer Design Campus Distribution Layer Design   Understanding Cisco Switching Paths Layer 2 Switch Operation Control and Data Plane Cisco Switching Mechanisms Implementing Campus LAN Connectivity Revisiting VLANs Trunking with 802.1Q Inter-VLAN Routing Building Redundant Switched Topology Spanning-Tree Protocol Overview Spanning-Tree Protocol Operation Spanning-Tree Protocols Types and Features Multiple Spanning Tree Protocol PortFast and BPDU Implementing Layer 2 Port Aggregation (Self-Study) Need for EtherChannel EtherChannel Mode Interactions Layer 2 EtherChannel Configuration Guidelines EtherChannel Load-Balancing Options Troubleshoot EtherChannel Issues Understanding EIGRP EIGRP Features EIGRP Reliable Transport Establishing EIGRP Neighbour Adjacency EIGRP Metrics EIGRP Path Selection Explore EIGRP Path Selection Explore EIGRP Load Balancing and Sharing EIGRP for IPv6 Compare EIGRP and OSPF Routing Protocols Implementing OSPF Describe OSPF The OSPF Process OSPF Neighbour Adjacencies Building a Link-State Database OSPF LSA Types Compare Single-Area and Multi-Area OSPF OSPF Area Structure OSPF Network Types Optimizing OSPF OSPF Cost OSPF Route Summarization Benefits OSPF Route Filtering Tools Compare OSPFv2 and OSPFv3 Exploring EBGP Interdomain Routing with BGP BGP Operations Types of BGP Neighbour Relationships BGP Path Selection BGP Path Attributes Implementing Network Redundancy Need for Default Gateway Redundancy Define FHRP HSRP Advanced Features Cisco Switch High Availability Features Implementing NAT Define Network Address Translation NAT Address Types Explore NAT Implementations NAT Virtual Interface Introducing Virtualisation Protocols and Techniques Server Virtualisation Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Introducing Virtualisation Protocols and Techniques Server Virualization Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Understanding Virtual Private Networks and Interfaces Site-to-Site VPN Technologies IPSec VPN Overview IPSec: IKE IPsec Modes IPsec VPN Types Cisco IOS VTI Understanding Wireless Principles Explain RF Principles Describe Watts and Decibels Describe Antenna Characteristics Describe IEEE Wireless Standards Identify Wireless Component Roles Examining Wireless Deployment Options Wireless Deployment Overview Describe Autonomous AP Deployment Describe Centralized Cisco WLC Deployment Describe FlexConnect Deployment Cloud Deployment and Its Effect on Enterprise Networks Describe the Cloud-Managed Meraki Solution Cisco Catalyst 9800 Series Controller Deployment Options Describe Cisco Mobility Express Understanding Wireless Roaming and Location Services Wireless Roaming Overview Mobility Groups and Domains Wireless Roaming Types Describe Location Services Examining Wireless AP Operation Universal AP Priming Explore the Controller Discovery Process Describe AP Failover Explain High Availability Explore AP Modes Understanding Wireless Client Authentication Authentication Methods Pre-Shared Key (PSK) Authentication 802.1X User Authentication Overview PKI and 802.1X Certificate Based Authentication Introduction to Extensible Authentication Protocol EAP-Transport Layer Security (EAP-TLS) Protected Extensible Authentication Protocol EAP-FAST Guest Access with Web Auth Troubleshooting Wireless Client Connectivity Wireless Troubleshooting Tools Overview Spectrum Analysis Wi-Fi Scanning Packet Analysis Cisco AireOS GUI and CLI Tools Cisco Wireless Config Analyzer Express Common Wireless Client Connectivity Issues Overview Client to AP Connectivity WLAN Configuration Infrastructure Configuration Introducing Multicast Protocols (Self-study) Multicast Overview Internet Group Management Protocol Multicast Distribution Trees IP Multicasting Routing Rendezvous Point Introducing QoS (Self-study) Understand the Impact of User Applications on the Network Need for Quality of Service (QoS) Describe QoS Mechanisms Define and Interpret a QoS Policy Implementing Network Services Understanding Network Time Protocol Logging Services Simple Network Management Protocol Introducing NetFlow Flexible NetFlow Understanding Cisco IOS Embedded Event Manager Using Network Analysis Tools Troubleshooting Concepts Network Troubleshooting Procedures: Overview Network Troubleshooting Procedures: Case Study Basic Hardware Diagnostics Filtered Show Commands Cisco IOS IP SLAs Switched Port Analyzer(SPAN) Overview Remote SPAN (RSPAN) Encapsulated Remote Switched Port Analyzer(ERSAPN) Cisco Packet Capture Tools Overview Implementing Infrastructure Security ACL Overview ACL Wildcard Masking Types of ACLs Configure Numbered Access Lists Use ACLs to Filter Network Traffic Apply ACLs to Interfaces Configured Named Access Lists Control Plane Overview Control Plane Policing Implementing Secure Access Control Securing Device Access AAA Framework Overview Benefits of AAA Usage Authentication Options RADIUS and TACACS+ Enabling AAA and Configuring a Local User for Fallback Configuring RADIUS for Console and VTY Access Configuring TACACS+ for Console and VTY Access Configure Authorization and Accounting Understanding Enterprise Network Security Architecture (Self-study) Explore Threatscape Cisco Intrusion Prevention Systems Virtual Private Networks Content Security Logging Endpoint Security Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Firewall Concepts TrustSec MACsec Identity Management 802.1X for Wired and Wireless Endpoint Authentication MAC Authentication Bypass Web Authentication Exploring Automation and Assurance Using Cisco DNA Centre (Self-study) Need for Digital Transformation Cisco Digital Network Architecture Cisco Intent-Based Networking Cisco DNA Centre Automation Overview Cisco DNA Centre Platform Overview Cisco DNA Centre Design Cisco DNA Centre Inventory Overview Cisco DNA Centre Configuration and Management Overview Onboarding of Network Devices Using Cisco DNA Centre Cisco DNA Centre Software Image Management Overview Cisco DNA Assurance Key Features and Use Cases Cisco DNA Centre Assurance Implementation Workflow Examining the Cisco SD-Access Solution (Self-study) Need for Cisco SD-Access Cisco SD Access Overview Cisco SD-Access Fabric Components Cisco SD-Access Fabric Control Plane Based on LISP Cisco SD-Access Fabric Control Plane Based on VXLAN Cisco SD-Access Fabric Control Plane Based on Cisco TrustSec Role of Cisco ISE and Cisco DNA Centre in SD-Access Cisco SD-Access Wireless Integration Traditional Campus Interoperating with Cisco SD-Access Understanding the Working Principles of the Cisco SD-WAN Solution (Self-study) Need for Software Defined Networking for WAN Cisco SD-WAN Components and Functions Cisco SD-WAN Orchestration Plane Cisco SD-WAN Management Plane- vManage Cisco SD-WAN Control Plane - vSmart Cisco SD-WAN Data Plane - WAN Edge Cisco SD-WAN Programmatic APIs Cisco SD-WAN Automation and Analytics Cisco SD-WAN Terminology Cisco IOS XE and IOS XE SD-WAN Software Flexible Controller Deployment Options Cisco SD-WAN Security Understanding the Basics of Python Programming Describe Python Concepts String Data Types Numbers Data Types Boolean Data Types Script Writing and Execution Analyse Code Introducing Network Programmability Protocols Configuration Management Evolution of Device Management and Programmability Data Encoding Formats Understanding JSON Model Driven Programmability Stack Introduction to YANG Types of YANG Models Understanding NETCONF Explain NETCONF and YANG REST Understanding RESTCONF Protocol Introducing APIs in Cisco DNA Centre and vManage (Self-study) Application Programming Interfaces REST API Response Codes and Results REST API Security Cisco DNA Centre APIs Cisco SD-WAN REST API Overview Labs Lab 1: Investigate the CAM Lab 2: Analyse Cisco Express Forwarding Lab 3: Troubleshoot VLAN and Trunk Issues Lab 4: Tuning STP and Configuring RSTP Lab 5: Configure Multiple Spanning Tree Protocol Lab 6: Troubleshoot EtherChannel Lab 7: Implementing Multiarea OSPF Lab 8: Implement OSPF Tuning Lab 9: Apply OSPF Optimization Lab 10: Implement OSPFv3 Lab 11: Configure and Verify Single-Homed EBGP Lab 12: Implementing HSRP Lab 13: Configure VRRP Lab 14: Implement NAT Lab 15: Configure and Verify VRF Lab 16: Configure and Verify a GRE Tunnel Lab 17: Configure Static VTI Point-to-Point Tunnels Lab 18: Configure Wireless Client Authentication in a Centralized Deployment (No Extended Access) Lab 19: Troubleshoot Wireless Client Connectivity Issues (No Extended Access) Lab 20: Configure Syslog Lab 21: Configure and Verify Flexible NetFlow Lab 22: Configuring Cisco IOS Embedded Event Manager (EEM) Lab 23: Troubleshoot Connectivity and Analyse Traffic with Ping, Traceroute and Debug Lab 24: Configure and Verify Cisco IP SLA's Lab 25: Configure Standard and Extended ACLs Lab 26: Configure Control Plane Policing Lab 27: Implement Local and Server-Based AAA (No Extended Access) Lab 28: Writing and Troubleshooting Python Scripts (No Extended Access) Lab 29: Explore JSON Objects and Scripts in Python (No Extended Access) Lab 30: Use NETCONF via SSH (No Extended Access) Lab 31: Use RESTCONF with Cisco IOS XE Software (No Extended Access) [-]
Les mer
Nettkurs 9 timer 349 kr
Kreativitet er overalt. Og med dette kurset får du verdens beste programvare for kreativitet, bildebehandling og grafisk design i fingerspissene. Adobe Photoshop setter i... [+]
Bli en ekspert i verdens ledende programvare for digital bildebehandling og grafisk design med kurset "Photoshop: Komplett". Ledet av sertifisert Photoshop-ekspert Espen Faugstad hos Utdannet.no, er dette kurset perfekt for alle som ønsker å utforske og mestre Adobe Photoshop, et verktøy sentralt i nesten alle kreative prosjekter. Dette omfattende kurset tar deg gjennom alle aspekter av Photoshop, fra grunnleggende til avanserte teknikker. Du vil lære alt fra å åpne og håndtere dokumenter, jobbe med lag, utføre markeringer og beskjæringer, til avansert retusjering og redigering. Kurset dekker også bruk av justeringer, masker, effekter, blend modes og filtre. Med praktiske prosjekter og eksempler vil du utvikle ferdigheter som gjør deg i stand til å løse komplekse og kreative utfordringer, og ved kursets slutt vil du ha oppnådd en dyptgående forståelse og kompetanse i Photoshop. Dette kurset vil utruste deg med kunnskapen og ferdighetene som trengs for å utnytte Photoshop i full skala, enten for personlig bruk eller i en profesjonell sammenheng.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Åpne Kapittel 3: Dokument Kapittel 4: Image Kapittel 5: Layers Kapittel 6: Markere Kapittel 7: Beskjære Kapittel 8: Retusjere Kapittel 9: Verktøy Kapittel 10: Adjustments Kapittel 11: Masker Kapittel 12: Effekter Kapittel 13: Blend Modes Kapittel 14: Filter Kapittel 15: Prosjekter Kapittel 16: Eksportere Kapittel 17: Avslutning   Varighet: 8 timer og 59 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Nettkurs
Har du brukt Excel en stund og tenkt at du ønsker å komme litt videre. I dette kurset ser vi på en rekke funksjoner, tips og muligheter som vil gjøre deg til en mer effek... [+]
I kurset finner du en rekke videoklipp som viser i programmet hvordan man utfører de ulike oppgavene og presenterer resultatet av dette. Du får innsendingsoppgaver underveis som vil bli fulgt opp av en faglærer, og du har tilgang til faglærer i hele kursperioden. Du kan du stille spørsmål, både til faglærer, men også i et forum som er tilgjengelig for deltakere i kurset.Du får tilgang til vår e-læringsportal som vil gi deg god oversikt over progresjonen i kurset i et brukervennlig og enkelt system.I kurset ser vi blant annet på følgende temaer:Funksjoner: ANTALL og ANTALLA HVIS-funksjonen FINN.RAD og FINN.KOLONNE ANTALL.HVIS og SUMMERHVIS AVRUND Formatering: Dato- og tidfunksjoner Tekstfunksjoner Formatering av datoer Betinget formatering Kopiering av formatering Avansert tallformatering Beskyttelse av celler Formler og navngivning: Låsing av celler Navngivning av celler Målsøking og scenariobehandling Jobbe med lister og database: Sortering og filtrering Fjerne duplikater Pivottabeller: Datagrunnlaget og datakilder Oppsett av felt Delsummer og totalsummer Gruppere på dato Velge beregning i verdifelt Vis verdier som Formatere tall Formatere tabell Diagrammer Kurset består av tekst, bilder og en rekke videoklipp i leksjonene i kurset. Det er ikke behov for noe ytterligere dokumentasjon. Du får tilbakemeldinger fra faglærer på innsendingsoppgaver og du har tilgang til hjelp i hele kursperioden (ett år). Mer informasjon om kurset her. [-]
Les mer
Oslo Trondheim Og 1 annet sted 5 dager 26 500 kr
22 Apr
03 Jun
03 Jun
AZ-204: Developing Solutions for Microsoft Azure [+]
AZ-204: Developing Solutions for Microsoft Azure [-]
Les mer
1 dag 8 000 kr
This one-day course will provide foundational level knowledge on Azure concepts; core Azure services; core solutions and management tools; general security and network se... [+]
COURSE OVERVIEW This course does not provide an Azure pass or time in the classroom for students to do any hands-on activities. TARGET AUDIENCE  This course is suitable for program managers and technical sales, with a general IT background. These students want to learn about our offerings, see how components are implemented, and ask questions about products and features. COURSE OBJECTIVES   Discuss the basics of cloud computing and Azure, and how to get started with Azure's subscriptions and accounts. Describe the advantages of using cloud computing services, learning to differentiate between the categories and types of cloud computing, and how to examine the various concepts, resources, and terminology that are necessary to work with Azure architecture. Outline the core services available with Microsoft Azure. Discuss the core solutions that encompass a wide array of tools and services from Microsoft Azure. Describe the general security and network security features, and how you can use the various Azure services to help ensure that your cloud resources are safe, secure, and trusted. Discuss the identity, governance, privacy, and compliance features, and how Azure can help you secure access to cloud resources, what it means to build a cloud governance strategy, and how Azure adheres to common regulatory and compliance standards. Discuss the factors that influence cost, tools you can use to help estimate and manage your cloud spend, and how Azure's service-level agreements (SLAs) can impact your application design decisions. COURSE CONTENT Module 1: Cloud Concepts In this module, you'll take an entry level end-to-end look at Azure and its capabilities, which will provide you with a solid foundation for completing the available modules for Azure Fundamentals. Introduction to Azure fundamentals Fundamental Azure concepts After completing this module, students will be able to: Understand the benefits of cloud computing in Azure and how it can save you time and money. Explain concepts such as high availability, scalability, elasticity, agility, and disaster recovery. Module 2: Core Azure Services In this module, you learn about core Azure services like Azure database, Azure compute, Azure storage, and Azure Networking. Core Azure architectural components Core Azure workload products Azure networking services Azure storage services Azure database services After completing this module, students will be able to: Describe core Azure architecture components such as subscriptions, management groups, and resources. Summarize geographic distribution concepts such as Azure regions, region pairs, and availability zones. Understand the services available in Azure including compute, network, storage, and databases. Identify virtualization services such as Azure VMs, Azure Container Instances, and Azure Kubernetes. Compare Azure's database services such as Azure Cosmos DB, Azure SQL, and Azure Database for MySQL. Examine Azure networking resources such as Virtual Networks, VPN Gateways, and Azure ExpressRoute. Summarize Azure storage services such Azure Blob Storage, Azure Disk Storage, and Azure File Storage. Module 3: Core Solutions In this module, you'll learn about AI machine learning, Azure DevOps, monitoring fundamentals, management fundamentals, serverless computing fundamentals. and IoT fundamentals. Choose the best Azure IoT service Choose the best AI service Choose the best Azure serverless technology Choose the best tools with DevOps and GitHub Choose the best management tools Choose the best Azure monitoring service After completing this module, students will be able to: Choose the correct Azure AI service to address different kinds of business challenges. Choose the best software development process tools and services for a given business scenario. Choose the correct cloud monitoring service to address different kinds of business challenges. Choose the correct Azure management tool to address different kinds of technical needs. Choose the right serverless computing technology for your business scenario. Choose the best Azure IoT service for a given business scenario. Module 4: General security and networking features In this module, you will learn how to protect yourself against security threats, and secure your networks with Azure. Security Tools and Features Secure Network Connectivity After completing this module, students will be able to: Strengthen your security posture and protect against threats by using Microsoft Defender for Cloud. Collect and act on security data from many different sources by using Microsoft Sentinel. Manage dedicated physical servers to host your Azure VMs for Windows and Linux. Identify the layers that make up a defense in depth strategy. Explain how Azure Firewall enables you to control what traffic is allowed on the network. Configure network security groups to filter network traffic to and from Azure resources. Explain how Azure DDoS Protection helps protect your Azure resources from DDoS attacks. Module 5: Identity, Governance, Privacy, and Compliance In this module, you will learn about Azure identity services, how to build a cloud governance strategy, and privacy, compliance and data protection standards on Azure. Core Azure identity services Azure Governance Methodologies Privacy, Compliance, and Data Protection standards After completing this module, students will be able to: Explain the difference between authentication and authorization. Describe how Azure Active Directory provides identity and access management. Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play. Make organizational decisions about your cloud environment by using the CAF for Azure. Define who can access cloud resources by using Azure role-based access control. Apply a resource lock to prevent accidental deletion of your Azure resources. Apply tags to your Azure resources to help describe their purpose. Control and audit how your resources are created by using Azure Policy. Enable governance at scale across multiple Azure subscriptions by using Azure Blueprints. Explain the types of compliance offerings that are available on Azure. Gain insight into regulatory standards and compliance on Azure. Explain Azure capabilities that are specific to government agencies. Module 6: Azure Pricing and Lifecycle In this module, you will learn how to plan and manage Azure costs, and how to choose the right Azure services though SLAs and service lifecycle. Planning and Cost Management Azure Service Level Agreements (SLAs) and Lifecycle After completing this module, students will be able to: Use the Total Cost of Ownership Calculator. Describe the different ways you can purchase Azure products and services. Use the Pricing calculator to estimate the monthly cost of running your cloud workloads. Define the major factors that affect total cost and apply recommended practices to minimize cost. Describe what a service-level agreement (SLA) is and why SLAs are important. Identify factors, such as the service tier you choose, that can affect an SLA. Combine SLAs to compute a composite SLA. Describe the service lifecycle in Azure. TEST CERTIFICATION This course helps to prepare for exam AZ-900. FOLLOW ON COURSES M-AZ104, Microsoft Azure Administrator M-AZ204, Developing Solutions for Microsoft Azure M-AZ303, Microsoft Azure Architect Technologies M-DP200, Implementing an Azure Data Solution (DP-200) [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Introduksjon til ITIL v3 med utgangspunkt i tjenestelivssyklusmodellen. Gjennomgang av livssyklusfasene tjenestestrategi, tjenestedesign, tjenesteovergang, tjenesteadmini... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Ingen Innleveringer: Av totalt 12 øvinger må 4 tekstbaserte øvinger og 4 flervalgstester (totalt 8 øvinger) være godkjent for å få gå opp til eksamen. Øvingene som blir godkjent må dekke et bredt spekter av de temaene som gjennomgås i emnet. Nærmere opplysninger ved studiestart. Personlig veileder: ja Vurderingsform: Skriftlig, individuell, 3 timer,  Ansvarlig: Knut Arne Strand Eksamensdato: 17.12.13 / 20.05.14         Læremål: KUNNSKAPER:Kandidaten kan:- tegne opp og forklare livssyklusmodellen til ITIL versjon 3- gjengi suksessfaktorer knyttet til innføring av ITIL- forklare hva som menes med begrepene tjenestestrategi, tjenestedesign, tjenesteovergang, tjenesteadministrasjon og kontinuerlig tjenesteforbedring- beskrive utvalgte prosesser som inngår i ITIL-standarden og hvilke arbeidsoppgaver som utføres av de aktuelle prosessene FERDIGHETER:Kandidaten kan:- redegjøre for hvordan utvalgte ITIL-prosesser typisk kan implementeres og forvaltes i en gitt organisasjon- redegjøre for hvordan utvalgte prosesser fungerer sammen og hvilken informasjon som flyter mellom dem- lage en plan for innføring av utvalgte ITIL-prosesser i en konkret bedrift- implementere utvalgte deler av ITIL-standarden i en konkret bedrift GENERELL KOMPETANSE:Kandidaten har:- grunnleggende forståelse av ITIL som beste praksis for drift av IT-systemer- forståelse for at ITIL kan implementeres i små trinn og med noen få prosesser, samt utvides til å være svært omfattende, med mange operative prosesser og funksjoner Innhold:Introduksjon til ITIL v3 med utgangspunkt i tjenestelivssyklusmodellen. Gjennomgang av livssyklusfasene tjenestestrategi, tjenestedesign, tjenesteovergang, tjenesteadministrasjon og kontinuerlig tjenesteforbedring med tilhørende prosesser og funksjoner.Les mer om faget herDemo: Her er en introduksjonsvideo for faget Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag ITIL v3 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.  [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Historien og filosofien bak åpen kildekode. Copyright, lisenser fri programvare. Praktisk bruk av verktøyer som make, diff, patch og versjonskontrollsystemer. Internasjon... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Studenten må kunne installere programvare, og programmere. Vanlige programmeringsspråk for opensource er C, C++, java, python, m.fl. Innleveringer:   Vurderingsform: Skriftlig eksamen, individuell, 3 timer, teller 60 %. Prosjektoppgave teller 40 %. Ansvarlig: Helge Hafting Eksamensdato: 02.12.13 / 05.05.14         Læremål: KUNNSKAPER:Kandidaten:- kan forklare bakgrunnen for open source, og forskjellen på de vanligste åpne lisensene.- kan beskrive bruk av flerspråklig programvare FERDIGHETER:Kandidaten:- kan bruke vanlige programmeringsverktøy GENERELL KOMPETANSE:Kandidaten:- kan delta i prosjekter som utvikler åpen programvare videre Innhold:Historien og filosofien bak åpen kildekode. Copyright, lisenser fri programvare. Praktisk bruk av verktøyer som make, diff, patch og versjonskontrollsystemer. Internasjonalisering, flerspråklig programvare. Prosjektarbeid med deltakelse i opensource-prosjekt.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Opensource-utvikling 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Virtuelt klasserom 3 dager 24 000 kr
The Veeam® Availability Suite™ v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to co... [+]
COURSE OVERVIEW . With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. TARGET AUDIENCE This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. COURSE OBJECTIVES After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization’s evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. COURSE CONTENT Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building Replication Capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary Backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced Repository Capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting Data in the Cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from Backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from Replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE™ Configuration Backup Locate, migrate or restore backup configuration   TEST CERTIFICATION Completion of this course satisfies the prerequisite for taking the Veeam Certified Engineer (VMCE) 2021 exam. [-]
Les mer
Virtuelt klasserom 3 timer 1 750 kr
07 May
04 Jun
18 Jun
Vi utforsker mulighetene med diagrammer i Excel, går gjennom de mest brukte diagramvariantene og utforsker mulighetene. Vi tar også en kort innføring i pivottabeller slik... [+]
Kursinnhold Hva slags data kan brukes som grunnlag for et diagram Stolpediagram Sektordiagram Kombinert diagram Formatering av diagrammer Tips og triks Smarte løsninger Sparkline Hurtiganalyse Bruk av Excels diagrammer i andre Office-programmer [-]
Les mer