IT-kurs
Nordland
Du har valgt: Dønna
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Dønna ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of Information Security Management, elucidating its significance in safeguarding the confidentiality, integrity, and availability of organisational information assets. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Klasserom + nettkurs 5 dager 31 000 kr
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availabili... [+]
COURSE OVERVIEW  You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway.  This course includes an exam. TARGET AUDIENCE Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. COURSE OBJECTIVES  Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components COURSE CONTENT Module 1: Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Module 2: Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists Module 3: ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX Module 4: High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Module 5: Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting Module 6: SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Module 7: Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Module 8: Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Module 9: Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments Module 10: AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Module 11: Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Module 12: Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Module 13: Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Module 14: Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA [-]
Les mer
2 dager 15 000 kr
This 2-day course is identical to the 1-day M-AZ-900T01 course.  However this course lasts two days because of the hands-on parts. This course will prepare students for t... [+]
  COURSE OVERVIEW This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses. The course will cover general cloud computing concepts as well as general cloud computing models and services such as Public, Private and Hybrid cloud and Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service (SaaS). It will also cover some core Azure services and solutions, as well as key Azure pillar services concerning security, privacy, compliance and trust. It will finally cover pricing and support services available with Azure.   COURSE CONTENT  Module 1: Cloud Concepts -Learning Objectives-Why Cloud Services?-Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)-Public, Private, and Hybrid cloud models Module 2: Core Azure Services -Core Azure architectural components-Core Azure Services and Products-Azure Solutions-Azure management tools Module 3: Security, Privacy, Compliance and Trust -Securing network connectivity in Azure-Core Azure Identity services-Security tools and features-Azure governance methodologies-Monitoring and Reporting in Azure-Privacy, Compliance and Data Protection standards in Azure Module 4: Azure Pricing and Support -Azure subscriptions-Planning and managing costs-Support options available with Azure-Service lifecycle in Azure     This course helps to prepare for exam AZ-900. [-]
Les mer
Oslo Bergen 3 dager 20 900 kr
10 Sep
10 Sep
22 Sep
Implementing REST Services using Web API [+]
Implementing REST Services using Web API [-]
Les mer
Nettkurs 2 timer 1 990 kr
Er du på jakt etter mer avansert funksjonalitet på forsidene dine? På dette webinaret lærer du mer om å sette inn innhold fra andre kilder og å sy sammen komponente... [+]
Er du på jakt etter mer avansert funksjonalitet på forsidene dine? På dette webinaret lærer du mer om å sette inn innhold fra andre kilder og å sy sammen komponentene på siden. Webinaret varer i 2 timer og består av to økter à 45 min. Etter hver økt er det 10 min spørsmålsrunde. Mellom øktene er det 10 min pause. Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.   Kursinnhold:   Sider og sideoppsett Bli kjent med Webdel-sider og oppsett Hvordan legge til skriptsnutter og elementer fra andre nettsider   Bygg inn innhold Legg inn embed-kode Forberede og presentere en PowerPoint-presentasjon på forsiden ved hjelp av Office Web Apps/Office Online   Forsider og dashboards Forberede og presentere en Excel-bok på forsiden med Excel Services Forberede og presentere en Visio-tegning som forsidemeny med Visio Services   Dynamiske sider Målgrupper Koble sammen webdeler og la innhold i en webdel påvirke innholdet i en annen   3 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Gratis support [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
5 dager 45 000 kr
28 Jul
01 Sep
29 Sep
RH294: Red Hat System Administration III: Linux Automation with Ansible [+]
RH294: Red Hat System Administration III: Linux Automation with Ansible [-]
Les mer
5 dager 20 000 kr
Machine Learning and Data Science in R with Microsoft SQL Server - with Rafal Lukawiecki [+]
Machine Learning and Data Science in R with Microsoft SQL Server - with Rafal Lukawiecki [-]
Les mer
4 dager 25 000 kr
AI-102 Designing and Implementing an Azure AI Solution is intended for software developers wanting to build AI infused applications that leverage Azure Cognitive Services... [+]
TARGET AUDIENCE Software engineers concerned with building, managing and deploying AI solutions that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework. They are familiar with C#, Python, or JavaScript and have knowledge on using REST-based APIs to build computer vision, language analysis, knowledge mining, intelligent search, and conversational AI solutions on Azure. COURSE OBJECTIVES After completing this course you should be able to: Describe considerations for creating AI-enabled applications Identify Azure services for AI application development Provision and consume cognitive services in Azure Manage cognitive services security Monitor cognitive services Use a cognitive services container Use the Text Analytics cognitive service to analyze text Use the Translator cognitive service to translate text Use the Speech cognitive service to recognize and synthesize speech Use the Speech cognitive service to translate speech Create a Language Understanding app Create a client application for Language Understanding Integrate Language Understanding and Speech Use QnA Maker to create a knowledge base Use a QnA knowledge base in an app or bot Use the Bot Framework SDK to create a bot Use the Bot Framework Composer to create a bot Use the Computer Vision service to analyze images Use Video Indexer to analyze videos Use the Custom Vision service to implement image classification Use the Custom Vision service to implement object detection Detect faces with the Computer Vision service Detect, analyze, and recognize faces with the Face service Use the Computer Vision service to read text in images and documents Use the Form Recognizer service to extract data from digital forms Create an intelligent search solution with Azure Cognitive Search Implement a custom skill in an Azure Cognitive Search enrichment pipeline Use Azure Cognitive Search to create a knowledge store   COURSE CONTENT Module 1: Introduction to AI on Azure Artificial Intelligence (AI) is increasingly at the core of modern apps and services. In this module, you'll learn about some common AI capabilities that you can leverage in your apps, and how those capabilities are implemented in Microsoft Azure. You'll also learn about some considerations for designing and implementing AI solutions responsibly. Introduction to Artificial Intelligence Artificial Intelligence in Azure Module 2: Developing AI Apps with Cognitive Services Cognitive Services are the core building blocks for integrating AI capabilities into your apps. In this module, you'll learn how to provision, secure, monitor, and deploy cognitive services. Getting Started with Cognitive Services Using Cognitive Services for Enterprise Applications Lab: Get Started with Cognitive Services Lab: Get Started with Cognitive Services Lab: Monitor Cognitive Services Lab: Use a Cognitive Services Container Module 3: Getting Started with Natural Language Processing  Natural Language processing (NLP) is a branch of artificial intelligence that deals with extracting insights from written or spoken language. In this module, you'll learn how to use cognitive services to analyze and translate text. Analyzing Text Translating Text Lab: Analyze Text Lab: Translate Text Module 4: Building Speech-Enabled Applications Many modern apps and services accept spoken input and can respond by synthesizing text. In this module, you'll continue your exploration of natural language processing capabilities by learning how to build speech-enabled applications. Speech Recognition and Synthesis Speech Translation Lab: Recognize and Synthesize Speech Lab: Translate Speech Module 5: Creating Language Understanding Solutions To build an application that can intelligently understand and respond to natural language input, you must define and train a model for language understanding. In this module, you'll learn how to use the Language Understanding service to create an app that can identify user intent from natural language input. Creating a Language Understanding App Publishing and Using a Language Understanding App Using Language Understanding with Speech Lab: Create a Language Understanding App Lab: Create a Language Understanding Client Application Use the Speech and Language Understanding Services Module 6: Building a QnA Solution One of the most common kinds of interaction between users and AI software agents is for users to submit questions in natural language, and for the AI agent to respond intelligently with an appropriate answer. In this module, you'll explore how the QnA Maker service enables the development of this kind of solution. Creating a QnA Knowledge Base Publishing and Using a QnA Knowledge Base Lab: Create a QnA Solution Module 7: Conversational AI and the Azure Bot Service Bots are the basis for an increasingly common kind of AI application in which users engage in conversations with AI agents, often as they would with a human agent. In this module, you'll explore the Microsoft Bot Framework and the Azure Bot Service, which together provide a platform for creating and delivering conversational experiences. Bot Basics Implementing a Conversational Bot Lab: Create a Bot with the Bot Framework SDK Lab: Create a Bot with a Bot Freamwork Composer Module 8: Getting Started with Computer Vision Computer vision is an area of artificial intelligence in which software applications interpret visual input from images or video. In this module, you'll start your exploration of computer vision by learning how to use cognitive services to analyze images and video. Analyzing Images Analyzing Videos Lab: Analyse Images with Computer Vision Lab: Analyze Images with Video Indexer Module 9: Developing Custom Vision Solutions While there are many scenarios where pre-defined general computer vision capabilities can be useful, sometimes you need to train a custom model with your own visual data. In this module, you'll explore the Custom Vision service, and how to use it to create custom image classification and object detection models. Image Classification Object Detection Lab: Classify Images with Custom Vision Lab: Detect Objects in Images with Custom Vision Module 10: Detecting, Analyzing, and Recognizing Faces Facial detection, analysis, and recognition are common computer vision scenarios. In this module, you'll explore the user of cognitive services to identify human faces. Detecting Faces with the Computer Vision Service Using the Face Service Lab:Destect, Analyze and Recognize Faces Module 11: Reading Text in Images and Documents Optical character recognition (OCR) is another common computer vision scenario, in which software extracts text from images or documents. In this module, you'll explore cognitive services that can be used to detect and read text in images, documents, and forms. Reading text with the Computer Vision Service Extracting Information from Forms with the Form Recognizer service Lab: Read Text in IMages Lab: Extract Data from Forms Module 12: Creating a Knowledge Mining Solution Ultimately, many AI scenarios involve intelligently searching for information based on user queries. AI-powered knowledge mining is an increasingly important way to build intelligent search solutions that use AI to extract insights from large repositories of digital data and enable users to find and analyze those insights. Implementing an Intelligent Search Solution Developing Custom Skills for an Enrichment Pipeline Creating a Knowledge Store Lab: Create and Azure Cognitive Search Solution Create a Custom Skill for Azure Cognitive Search Create a Knowledge Store with Azure Cognitive Search   TEST CERTIFICATION Recommended as preparation for the following exams: AI-102 - Designing and Implementing a Microsoft Azure AI Solution - Part of the requirements for the Microsoft Certified Azure AI Engineer Associate Certification.   HVORFOR VELGE SG PARTNER AS:  Flest kurs med Startgaranti Rimeligste kurs Beste service og personlig oppfølgning Tilgang til opptak etter endt kurs Partner med flere av verdens beste kursleverandører [-]
Les mer
Oslo Trondheim Og 1 annet sted 2 dager 20 900 kr
18 Aug
25 Aug
25 Aug
TOGAF® EA Training Foundation [+]
TOGAF® EA Training Foundation [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration: Microsoft 365 tenant and service management, Office 365 management, and Microsoft 36... [+]
COURSE OVERVIEW  In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management. This begins with an overview of Office 365 product functionality, including Exchange Online, SharePoint Online, Microsoft Teams, additional product resources, and device management. You will then transition to configuring Office 365, with a primary focus on configuring Office client connectivity to Office 365. Finally, you will examine how to manage Office 365 ProPlus deployments, from user-driven client installations to centralized Office 365 ProPlus deployments. You will wrap up this section by learning how to configure Office Telemetry and Microsoft Analytics. The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multi-factor authentication and self-service password management. This section wraps up with a comprehensive look at implementing application and external access. You will learn how to add and manage applications in Azure Active Directory, including how to configure multi-tenant applications. You will then examine how to configure Azure AD Application Proxy, including how to install and register a connector and how to publish an on-premises app for remote access. Finally, you will examine how to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths. COURSE OBJECTIVES Designing, configuring, and managing your Microsoft 365 tenant Office 365 product functionality Configuring Office 365 Managing Office 365 ProPlus deployments Planning and implementing identity synchronization Implementing application and external access COURSE CONTENT Module 1: Designing Your Microsoft 365 Tenant Planning Microsoft 365 in your On-premises Infrastructure Planning Your Identity and Authentication Solution Planning Your Service Setup Planning Your Hybrid Enviroment Planning Your Migration to Office 365 Module 2: Configuring Your Microsoft 365 Tenant Planning  Your Microsoft 365 Experience Configuring  Your Microsoft 365 Experience Managing User Accounts and Licenses in Microsoft 365 Managing Security Groups in Microsoft 365 Implementing Your Domain Services Leveraging FastTrack and Partner Services Module 3: Lab 1 - Configuring your Microsoft 365 Tenant Exercise 1 - Set up a Microsoft 365 Trial Tenant Module 4: Managing Your Microsoft 365 Tenant Configuring Tenant Roles Managing Tenant Health and Services Module 5: Lab 2 - Managing your Microsoft 365 Tenant Exercise 1 - Manage Administration Delegation Exercise 2 - Configure Office 365 Message Encryption (OME) Exercise 3 - Monitor and Troubleshoot Office 365 Module 6: Office 365 Overview Exchange Online Overview SharePoint Online Overview Teams Overview Additional Resources Overview Device Management Overview Module 7: Lab 3 - Office 365 Overview Exercise 1 - Exchange Online Overview Exercise 2 - SharePoint Online Overview Exercise 3 - Teams Overview Module 8: Configuring  Office 365 Office 365 Client Overview Configuring Office Client Connectivity to Office 365 Module 9: Managing Office 365 ProPlus Deployments Managing User-Driven Client Installations Managing Centralized Office 365 ProPlus Deployments Configuring Office Telemetry Configuring Microsoft Analytics Module 10: Lab 4 - Managing Office 365 ProPlus installations Exercise 1 - Prepare an Office 365 ProPlus Managed Installation Exercise 2 - Manage a Centralized Office 365 ProPlus Installation Exercise 3 - Deploy and Configure Office Telemetry Components Module 11: Planning and Implementing Identity Synchronization Introduction to Identity Synchronization Planning for Azure AD Connect Implementing Azure AD Connect Managing Synchronized Identities Password Management in Microsoft 365 Module 12: Lab 5 - Implementing Identity Synchronization Exercise 1 - Set up your organization for identity synchronization Exercise 2 - Implement Identity Synchronization Module 13: Implementing Application and External Access Implementing Applications in Azure AD Configuring Azure AD App Proxy Designing Solutions for External Access TEST CERTIFICATION This course helps you to prepare for exam MS100. But as this is part of an expert certification you should already own one of the Microsoft 365 Associate certifications:  Modern Desktop Teamwork Administrator Security Administrator Messaging Administrator. [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
NET-arkitekturen. Utviklingsmiljøet. Grunnleggende C#-syntaks. Objektorientert programmering med arv og polymorfi. GUI. Datafiler. Programmering mot databaser. ADO.NET, L... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Grunnleggende objektorientert programmering i for eksempel Java eller C++ Innleveringer: Øvinger: 8 av 11 må være godkjent.  Personlig veileder: ja Vurderingsform: Skriftlig eksamen, 4 timer. Case-beskrivelser etc. legges ut i ItsLearning 24 timer før. (NB! Eksamensform kan bli endret under forutsetning av at ny teknologi gjør det mulig å arrangere eksamen elektronisk.) Ansvarlig: Grethe Sandstrak Eksamensdato: 05.12.13 / 08.05.14         Læremål: Etter å ha gjennomført emnet skal kandidaten ha følgende samlete læringsutbytte: KUNNSKAPER:Kandidaten:- kan gjøre rede for sentrale begreper innen objektorientering- kan konstruere et objektorientert C#. NET-program ut fra en gitt problemstilling- kan finne fram, sette seg inn i og anvende dokumentasjon om .NET Framework library- kjenner til ulike GUI-komponenter og hvordan de brukes i C#-programmer FERDIGHETER:Kandidaten kan:- sette opp programmiljø for å utvikle og kjøre C#. NET applikasjoner på egen pc- kan anvende klasser fra .NET Framework library- lage C#.NET program* med fordeling av oppgaver mellom objekter og der arv og polymorfi benyttes* med grafiske brukergrensesnitt* som kommuniserer med en database via SQL* med LINQ, delegater, templates GENERELL KOMPETANSEKandidaten kan:- kommunisere om objektorientert programmering og databaser med relevant begrepsapparat Innhold:NET-arkitekturen. Utviklingsmiljøet. Grunnleggende C#-syntaks. Objektorientert programmering med arv og polymorfi. GUI. Datafiler. Programmering mot databaser. ADO.NET, LINQ, Templates, Collections.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag C#.NET 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Nettkurs 12 måneder 9 500 kr
Målet med kurset er å gi deg en forståelse for filosofien bak ITIL®. Kurset gir innføring i basis konseptet, prinsippene, prosessene og funksjonene som er definert som be... [+]
Kurset inneholder 12 timer med undervisning, er delt inn i moduler og er en blanding av video og interaktive øvelse. Du vil få en omfattende introduksjon til kjernekonseptene til ITIL® 4.   Les mer om ITIL® 4 på AXELOS sine websider    The ITIL®  4 Foundation Online course on this page is offered by ILX Group an ATO of AXELOS Limited. ITIL® 4 is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.   Dette inngår i kurset - 12 måneders tilgang til kurset fra kjøpsdato- Support service- En testmodul med spørsmål rettet mot sertifiseringseksamen Sertifiseringseksamen - Eksamens voucher er inklusive i kurset- Det er ingen hjelpemidler tillatt under eksamen- Varighet er 60 minutter, men et tillegg på 15 minutter for de som ikke har engelsk som morsmål- Eksamensformen er multiple choice - 40 spørsmål skal besvares, og du består ved 65% korrekte svar (dvs 26 av 40 spørsmål) Disse modulene inngår i kurset - Introduction and overview- Key concepts of service management- Four dimensions of service management- Service value system- Introduction to practices- Purpose of 11 practices and some definitions- Introduction to seven key practices in detail- Continual improvement- Change control- Incident management- Service request management- Service desk- Service level management- Exam simulator Etter endt kurs vil du - Forstå nøkkelkonseptene for ITIL-Service Management- Forstå hvordan ITIL-veiledende prinsipper kan hjelpe organisasjoner til å ta i bruk og tilpasse ITIL-Service Management- Forstå de fire dimensjonene i ITIL-Service Management- Forstå nøkkelbegrepene for kontinuerlig forbedring [-]
Les mer
Oslo Trondheim Og 1 annet sted 3 dager 21 900 kr
20 Aug
27 Aug
27 Aug
TOGAF® EA Training Practitioner [+]
TOGAF® EA Training Practitioner [-]
Les mer
Oslo 2 dager 16 900 kr
03 Nov
03 Nov
MoP® Foundation [+]
MoP® Foundation [-]
Les mer