IT-kurs
Du har valgt: Gryta
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Gryta ) i IT-kurs
 

1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Strategist: Direct, Plan and improve er en modul innen ITIL®. Modulen er en nøkkelkomponenten i både ITIL® 4 Managing Professional og ITIL® 4 Strategic Leader-løp... [+]
Modulen dekker bruk og effekt av Lean og agile arbeidsmåter, og hvordan dette kan utnyttes til fordel for organisasjonen. Kurset vil gi kandidatene en praktisk og strategisk metode for å planlegge og levere kontinuerlig forbedring med nødvendig smidighet.  E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 12 moduler. Les mer om ITIL® 4 på AXELOS sine websider Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert.   [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Specialist: Drive Stakeholder Value dekker alle typer engasjement og interaksjon mellom en tjenesteleverandør og deres kunder, brukere, leverandører og partnere. [+]
Kurset fokuserer på konvertering av etterspørsel til verdi via IT-relaterte tjenester. Modulen dekker sentrale emner som SLA-design, styring av flere leverandører, kommunikasjon, relasjonsstyring, CX- og UX-design, kartlegging av kunder og mer. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på  AXELOS sine websider. Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. [-]
Les mer
Nettkurs 365 dager 2 995 kr
Excelfunksjoner - elæringskurs [+]
Excelfunksjoner - elæringskurs [-]
Les mer
Oslo 2 dager 16 900 kr
11 Sep
11 Sep
11 Dec
UX Foundation [+]
UX Foundation [-]
Les mer
Nettstudie 6 måneder 8 000 kr
Dette kurset gir deg en grunnleggende innføring i to-dimensjonal Datamaskin Assistert Konstruksjon (DAK). [+]
Dette kurset gir deg en grunnleggende innføring i to-dimensjonal Datamaskin Assistert Konstruksjon (DAK). Du får et grunnlag for videre studier, og kompetanse som gjør tegnearbeidet både utfordrende og interessant. Du lærer å bli fortrolig med å bruke denne type hjelpemiddel til tegnearbeid, teknisk tegning og revidering av tegninger.   Studentlisens for AutoCAD og Revit Structure/Architecture er inkludert. Kurset er på norsk, men AutoCAD-programmet er på engelsk. Programvaren er gratis. Du lærer å bruke de grunnleggende kommandoene slik at du kan utføre enklere tegnearbeid. Du blir fortrolig med å bruke denne type hjelpemiddel til tegnearbeid, teknisk tegning og revidering av tegninger. Du lærer å jobbe rasjonelt og å velge enkle løsninger. Bruk av flere lag med ulike farger gir god visualisering og bedre lesing av tegningene. Målsetting og teksting er viktig, og må utføres tydelig og på en riktig måte. Flater fylles med skravur og elementer kan lagres separat for senere bruk i andre tegninger. Kurset gir deg inngående informasjon gjennom studieveiledningen om hvordan du skal bruke de enkelte kommandoene. Det stilles krav til 100 % nøyaktighet, noe du oppnår når du jobber riktig. Du får øvelser med tegneoppgaver innen bygg, elektro, elkraft og maskin.   [-]
Les mer
3 dager 8 200 kr
Vil du lære å lage visittkort, annonser, brosjyrer og plakater i InDesign? Enten du jobber i en markedsavdeling, grafisk bedrift, avis eller magasin, er InDesign det pr..... [+]
Vil du lære å lage visittkort, annonser, brosjyrer og plakater i InDesign? Enten du jobber i en markedsavdeling, grafisk bedrift, avis eller magasin, er dette det profesjonelle programmet du bruker til jobben.  Arbeider du med markedsføring og layout, vil du ha stor nytte av å kunne sette sammen tekst og bilder selv. Du slipper å sette ut arbeidet,  får større kontroll på layouten og mer ut av markedsbudsjettet. Du velger dette kurset for å lære alt du trenger for å komme igang med programmet InDesign. Hvem passer kurset for? Kurset passer for deg som har liten eller ingen erfaring med å jobbe i InDesign. InDesign er bransjestandarden for å lage annonser, brosjyrer, magasiner, plakater, DM, rapporter og bøker. Uansett hva du skal bruke programme til, så passer dette kurset for deg! Dette lærer du: Bli kjent med menyer og verktøy Effektiv jobbing med tekst- og sidemaler Grunnleggende typografi Importere og tilpasse bilder og tekst Plassere bilder med tekst rundt Lage egne farger Bruk av effekter Kontroll av dokumenter og eksport til pdf https://igm.no/indesign-grunnkurs/ [-]
Les mer
Oslo 2 dager 14 000 kr
14 Aug
14 Aug
MB-300: Microsoft Dynamics 365: Core Finance and Operations [+]
MB-300: Microsoft Dynamics 365: Core Finance and Operations [-]
Les mer
Virtuelt klasserom 4 dager 28 000 kr
TOGAF® V9.2 is the foremost generic framework in the field of Enterprise Architecture (EA). [+]
COURSE OVERVIEW TOGAF® V9.2  is the foremost generic framework in the field of Enterprise Architecture (EA). This course provides guidance on what to do to establish an architecture practice and how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support and sustain the transformation. This course will benefit: Practicing architects from complex organizations looking for a set of defined processes to help in the organization, governance and management of architecture teams and multiple architecture projects. Experienced architects looking for details on the elements of sound architectural process and practice. Senior managers, such as Project Managers and Service Managers, who wish to gain a full appreciation of architecture practice. Aspiring architects commencing their career wishing to obtain recognized EA certification. This TOGAF® accredited course examines how practitioners can base their activities on a set of well-defined processes. It examines the framework as a whole, including the numerous techniques to assist in organizing, governing and now in this version, describing, architecture. It incorporates recommendations on how to adapt the framework to deal with issues such as Security and Service-oriented Architecture. The course prepares participants to take the combined TOGAF® 9.2 Foundation and Certified exams (Level 1 & 2). During the course, delegates will be helped to prepare for this combined exam. This TOGAF® for Practitioners Level 1&2 course is being run by Global Knowledge and is accredited by The Open Group. For full details of the TOGAF® certification scheme, visit the following link: www.opengroup.org COURSE OBJECTIVES This workshop has been designed to enable participants to: Understand the basic concepts of enterprise architecture and TOGAF® Explain the features of TOGAF® and its methodology Implement TOGAF® in their work to maximum effect Develop an understanding of the necessary body of knowledge to achieve certification by examination for TOGAF® COURSE CONTENT Day 1 Introduction TOGAF® Basic / Core Concepts Introduction to the ADM Enterprise Continuum ADM Phases ADM Guidelines Architecture Governance Daily Wrap up / Q&A Day Two Architecture Views, Viewpoints, and Stakeholders Building Blocks ADM Deliverables TOGAF® Reference Models Preliminary Phase The Architecture Governance Framework Architecture Content Framework TOGAF® Content Metamodel Stakeholder Management Architecture Implementation Techniques Daily Wrap up / Q&A Day Three Phase A: Architecture Business Scenarios Technique Phase B: Business Architecture Phase C: Information Systems Architectures – Data Architecture Phase C: Information Systems Architectures – Application Architecture TOGAF®Foundation Architecture: Technical Reference Model Integrated Information Infrastructure Reference Model Phase D: Technology Architecture Daily Wrap up / Q&A Day Four Phase E: Opportunities and Solutions Migration Planning Techniques Phase F: Migration Planning Phase G: Implementation Governance Phase H: Architecture Change Management ADM Requirements Management Architecture Partitioning Guidelines for Adapting the ADM: Iteration and Levels Guidelines for Adapting the ADM: Security Guidelines for Adapting the ADM: SOA Architecture Maturity Models Architecture Skills Framework Daily Wrap up / Q&A TEST CERTIFICATION Once you have completed the course and are ready to book your exam at a Test Centre, please contact Global Knowledge and we will email your exam voucher code so that you can redeem it.  Exams can also be sat online https://www.opengroup.org/certifications/online-proctored-exams Achieving this level of Certification also qualifies delegates to take the BCS Practitioner Certificate in Enterprise and Solution Architecture without the need for the BCS Intermediate Certificate. [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
OFFICIAL (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL TRAINING - INCLUDING EXAM [+]
COURSE OVERVIEW The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the cybersecurity market. CISSP validates a cybersecurity professional’s deep technical and managerial knowledge and experience to effectively design, engineer and manage an organization’s overall security posture. Please note an exam voucher is included as part of this course TARGET AUDIENCE Cybersecurity professionals with at least 5 years in the information security field. Member data has shown that amajority of CISSP holders are in middle management and a much smaller proportion are in senior or junior/entry-level positions. Roles include:• Chief Information Officer• Chief Information Security Officer• Chief Technology Officer• Compliance Manager / Officer• Director of Security• Information Architect• Information Manager / Information RiskManager or Consultant• IT Specialist / Director / Manager• Network / System Administrator• Security Administrator• Security Architect / Security Analyst• Security Consultant• Security Manager• Security Systems Engineer / Security EngineerSectorsCISSP is relevant across all sectors and industries, including:• Aerospace• Automotive• Banking, financial services, insurance (BFSI)• Construction• Cybersecurity• Energy• Engineering• Government• Healthcare, IT products, services, consulting• Manufacturing• Pharma• Retail• Telecom COURSE OBJECTIVESAfter completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age. Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections. Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function. List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7. Identify standard terms for applying physical and logical access controls to environments related to their security practice. Appraise various access control models to meet business security requirements. Name primary methods for designing and validating test and audit strategies that support business requirements. Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures. Recognize risks to an organization’s operational endeavours and assess specific threats, vulnerabilities and controls. Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security. COURSE CONTENT Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security Architecture and Engineering Domain 4: Communication and Network Security Domain 5: Identity and Access Management (IAM) Domain 6: Security Assessment and Testing Domain 7: Security Operations Domain 8: Software Development Security TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)2 Certified Information Systems Security Professional Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification Please note an exam voucher is included as part of this course   [-]
Les mer
Virtuelt eller personlig 1 dag 6 500 kr
Kurset passer for deg som har god erfaring i generell bruk av Revit og som skal prosjektere og utføre hydrauliske beregninger på sprinkleranlegg. [+]
Her er et utvalg av temaene du vil lære på kurset: Oppsett av nytt sprinklerprosjekt i Revit Prosjektering av sprinkleranlegg Behandling av rørtyper, systemer etc Lage egne produkter for sprinklerhoder og andre produkter Hydrauliske beregninger IFC-eksport Oppsett av tegninger [-]
Les mer
Virtuelt klasserom 3 timer 1 990 kr
02 Sep
21 Oct
02 Dec
Vi utforsker mulighetene med diagrammer i Excel, går gjennom de mest brukte diagramvariantene og utforsker mulighetene. Vi tar også en kort innføring i pivottabeller slik... [+]
Kursinnhold Hva slags data kan brukes som grunnlag for et diagram Stolpediagram Sektordiagram Kombinert diagram Formatering av diagrammer Tips og triks Smarte løsninger Sparkline Hurtiganalyse Bruk av Excels diagrammer i andre Office-programmer [-]
Les mer
Virtuelt klasserom 4 dager 20 000 kr
This four-day instructor-led course is designed for IT professionals who configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW These professionals manage and support an infrastructure that includes on-premises and Azure IaaS-hosted Windows Server-based workloads. The course teaches IT professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to manage and secure Azure VMs running Windows Server. The course also covers how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights various administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. COURSE OBJECTIVES After you complete this course you will be able to: Harden the security configuration of the Windows Server operating system environment. Enhance hybrid security using Azure Security Center, Azure Sentinel, and Windows Update Management. Apply security features to protect critical resources. Implement high availability and disaster recovery solutions. Implement recovery services in hybrid scenarios. Plan and implement hybrid and cloud-only migration, backup, and recovery scenarios. Perform upgrades and migration related to AD DS, and storage. Manage and monitor hybrid scenarios using WAC, Azure Arc, Azure Automation and Azure Monitor. Implement service monitoring and performance monitoring, and apply troubleshooting. COURSE CONTENT Module 1: Windows Server security This module discusses how to protect an Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. The module covers how to limit authentication scope and remediate potentially insecure accounts. The module also describes how to harden the security configuration of a Windows Server operating system environment. In addition, the module discusses the use of Windows Server Update Services to deploy operating system updates to computers on the network. Finally, the module covers how to secure Windows Server DNS to help protect the network name resolution infrastructure. Lessons for module 1 Secure Windows Sever user accounts Hardening Windows Server Windows Server Update Management Secure Windows Server DNS Lab : Configuring security in Windows Server Configuring Windows Defender Credential Guard Locating problematic accounts Implementing LAPS After completing module 1, students will be able to: Diagnose and remediate potential security vulnerabilities in Windows Server resources. Harden the security configuration of the Windows Server operating system environment. Deploy operating system updates to computers on a network by using Windows Server Update Services. Secure Windows Server DNS to help protect the network name resolution infrastructure. Implement DNS policies. Module 2: Implementing security solutions in hybrid scenarios This module describes how to secure on-premises Windows Server resources and Azure IaaS workloads. The module covers how to improve the network security for Windows Server infrastructure as a service (IaaS) virtual machines (VMs) and how to diagnose network security issues with those VMs. In addition, the module introduces Azure Security Center and explains how to onboard Windows Server computers to Security Center. The module also describes how to enable Azure Update Management, deploy updates, review an update assessment, and manage updates for Azure VMs. The modules explains how Adaptive application controls and BitLocker disk encryption are used to protect Windows Server IaaS VMs. Finally, the module explains how to monitor Windows Server Azure IaaS VMs for changes in files and the registry, as well as monitoring modifications made to application software. Lessons for module 2 Implement Windows Server IaaS VM network security. Audit the security of Windows Server IaaS Virtual Machines Manage Azure updates Create and implement application allowlists with adaptive application control Configure BitLocker disk encryption for Windows IaaS Virtual Machines Implement change tracking and file integrity monitoring for Windows Server IaaS VMs Lab : Using Azure Security Center in hybrid scenarios Provisioning Azure VMs running Windows Server Configuring Azure Security Center Onboarding on-premises Windows Server into Azure Security Center Verifying the hybrid capabilities of Azure Security Center Configuring Windows Server 2019 security in Azure VMs After completing module 2, students will be able to: Diagnose network security issues in Windows Server IaaS virtual machines. Onboard Windows Server computers to Azure Security Center. Deploy and manage updates for Azure VMs by enabling Azure Automation Update Management. Implement Adaptive application controls to protect Windows Server IaaS VMs. Configure Azure Disk Encryption for Windows IaaS virtual machines (VMs). Back up and recover encrypted data. Monitor Windows Server Azure IaaS VMs for changes in files and the registry. Module 3: Implementing high availability This module describes technologies and options to create a highly available Windows Server environment. The module introduces Clustered Shared Volumes for shared storage access across multiple cluster nodes. The module also highlights failover clustering, stretch clusters, and cluster sets for implementing high availability of Windows Server workloads. The module then discusses high availability provisions for Hyper-V and Windows Server VMs, such as network load balancing, live migration, and storage migration. The module also covers high availability options for shares hosted on Windows Server file servers. Finally, the module describes how to implement scaling for virtual machine scale sets and load-balanced VMs, and how to implement Azure Site Recovery. Lessons for module 3 Introduction to Cluster Shared Volumes. Implement Windows Server failover clustering. Implement high availability of Windows Server VMs. Implement Windows Server File Server high availability. Implement scale and high availability with Windows Server VMs. Lab : Implementing failover clustering Configuring iSCSI storage Configuring a failover cluster Deploying and configuring a highly available file server Validating the deployment of the highly available file server After completing module 3, students will be able to: Implement highly available storage volumes by using Clustered Share Volumes. Implement highly available Windows Server workloads using failover clustering. Describe Hyper-V VMs load balancing. Implement Hyper-V VMs live migration and Hyper-V VMs storage migration. Describe Windows Server File Server high availablity options. Implement scaling for virtual machine scale sets and load-balanced VMs. Implement Azure Site Recovery. Module 4: Disaster recovery in Windows Server This module introduces Hyper-V Replica as a business continuity and disaster recovery solution for a virtual environment. The module discusses Hyper-V Replica scenarios and use cases, and prerequisites to use it. The module also discusses how to implement Azure Site Recovery in on-premises scenarios to recover from disasters. Lessons for module 4 Implement Hyper-V Replica Protect your on-premises infrastructure from disasters with Azure Site Recovery Lab : Implementing Hyper-V Replica and Windows Server Backup Implementing Hyper-V Replica Implementing backup and restore with Windows Server Backup After completing module 4, students will be able to: Describe Hyper-V Replica, pre-requisites for its use, and its high-level architecture and components Describe Hyper-V Replica use cases and security considerations. Configure Hyper-V Replica settings, health monitoring, and failover options. Describe extended replication. Replicate, failover, and failback virtual machines and physical servers with Azure Site Recovery. Module 5: Implementing recovery services in hybrid scenarios This module covers tools and technologies for implementing disaster recovery in hybrid scenarios, whereas the previous module focus on BCDR solutions for on-premises scenarios. The module begins with Azure Backup as a service to protect files and folders before highlighting how to implementRecovery Vaults and Azure Backup Policies. The module describes how to recover Windows IaaS virtual machines, perform backup and restore of on-premises workloads, and manage Azure VM backups. The modules also covers how to provide disaster recovery for Azure infrastructure by managing and orchestrating replication, failover, and failback of Azure virtual machines with Azure Site Recovery. Lessons for module 5 Implement hybrid backup and recovery with Windows Server IaaS Protect your Azure infrastructure with Azure Site Recovery Protect your virtual machines by using Azure Backup Lab : Implementing Azure-based recovery services Implementing the lab environment Creating and configuring an Azure Site Recovery vault Implementing Hyper-V VM protection by using Azure Site Recovery vault Implementing Azure Backup After completing module 5, students will be able to: Recover Windows Server IaaS virtual machines by using Azure Backup. Use Azure Backup to help protect the data for on-premises servers and virtualized workloads. Implement Recovery Vaults and Azure Backup policies. Protect Azure VMs with Azure Site Recovery. Run a disaster recovery drill to validate protection. Failover and failback Azure virtual machines. Module 6: Upgrade and migrate in Windows Server This module discusses approaches to migrating Windows Server workloads running in earlier versions of Windows Server to more current versions. The module covers the necessary strategies needed to move domain controllers to Windows Server 2022 and describes how the Active Directory Migration Tool can consolidate domains within a forest or migrate domains to a new AD DS forest. The module also discusses the use of Storage Migration Service to migrate files and files shares from existing file servers to new servers running Windows Server 2022. Finally, the module covers how to install and use the Windows Server Migration Tools cmdlets to migrate commonly used server roles from earlier versions of Windows Server. Lessons for module 6 Active Directory Domain Services migration Migrate file server workloads using Storage Migration Service Migrate Windows Server roles Lab : Migrating Windows Server workloads to IaaS VMs Deploying AD DS domain controllers in Azure Migrating file server shares by using Storage Migration Service After completing module 6, students will be able to: Compare upgrading an AD DS forest and migrating to a new AD DS forest. Describe the Active Directory Migration Tool (ADMT). Identify the requirements and considerations for using Storage Migration Service. Describe how to migrate a server with storage migration. Use the Windows Server Migration Tools to migrate specific Windows Server roles. Module 7: Implementing migration in hybrid scenarios This module discusses approaches to migrating workloads running in Windows Server to an infrastructure as a service (IaaS) virtual machine. The module introduces using Azure Migrate to assess and migrate on-premises Windows Server instances to Microsoft Azure. The module also covers how migrate a workload running in Windows Server to an infrastructure as a service (IaaS) virtual machine (VM) and to Windows Server 2022 by using Windows Server migration tools or the Storage Migration Service. Finally, this module describes how to use the Azure Migrate App Containerization tool to containerize and migrate ASP.NET applications to Azure App Service. Lessons for module 7 Migrate on-premises Windows Server instances to Azure IaaS virtual machines Upgrade and migrate Windows Server IaaS virtual machines Containerize and migrate ASP.NET applications to Azure App Service Lab : Migrating on-premises VMs servers to IaaS VMs Implementing assessment and discovery of Hyper-V VMs using Azure Migrate Implementing migration of Hyper-V workloads using Azure Migrate After completing module 7, students will be able to: Plan a migration strategy and choose the appropriate migration tools. Perform server assessment and discovery using Azure Migrate. Migrate Windows Server workloads to Azure VM workloads using Azure Migrate. Explain how to migrate workloads using Windows Server Migration tools. Migrate file servers by using the Storage Migration Service. Discover and containerize ASP.NET applcations running on Windows. Migrate a containerized application to Azure App Service. Module 8: Server and performance monitoring in Windows Server This module introduces a range of tools to monitor the operating system and applications on a Windows Server computer as well as describing how to configure a system to optimize efficiency and to troublshoot problems. The module covers how Event Viewer provides a convenient and accessible location for observing events that occur, and how to interpret the data in the event log. The module also covers how to audit and diagnose a Windows Server environment for regulatory compliance, user activity, and troubleshooting. Finally, the module explains how to troubleshoot AD DS service failures or degraded performance, including recovery of deleted objects and the AD DS database, and how to troubleshoot hybrid authentication issues. Lessons for module 8 Monitor Windows Server performance Manage and monitor Windows Server event logs Implement Windows Server auditing and diagnostics Troubleshoot Active Directory Lab : Monitoring and troubleshooting Windows Server Establishing a performance baseline Identifying the source of a performance problem Viewing and configuring centralized event logs After completing module 8, students will be able to: Explain the fundamentals of server performance tuning. Use built-in tools in Windows Server to monitor server performance. Use Server Manager and Windows Admin Center to review event logs. Implement custom views. Configure an event subscription. Audit Windows Server events. Configure Windows Server to record diagnostic information. Recover the AD DS database and objects in AD DS. Troubleshoot AD DS replication. Troubleshoot hybrid authentication issues. Module 9: Implementing operational monitoring in hybrid scenarios This module covers using monitoring and troubleshooing tools, processes, and best practices to streamline app performance and availabilty of Windows Server IaaS VMs and hybrid instances. The module describes how to implement Azure Monitor for IaaS VMs in Azure, implement Azure Monitor in on-premises environments, and use dependency maps. The module then explains how to enable diagnostics to get data about a VM, and how to view VM metrics in Azure Metrics Explorer, and how to create a metric alert to monitor VM performance. The module then covers how to monitor VM performance by using Azure Monitor VM Insights. The module then describes various aspects of troubleshooting on premises and hybrid network connectivity, including how to diagnose common issues with DHCP, name resolution, IP configuration, and routing. Finally, the module examines how to troubleshoot configuration issues that impact connectivity to Azure-hosted Windows Server virtual machines (VMs), as well as approaches to resolve issues with VM startup, extensions, performance, storage, and encryption. Lessons for module 9 Monitor Windows Server IaaS Virtual Machines and hybrid instances Monitor the health of your Azure virtual machines by using Azure Metrics Explorer and metric alerts Monitor performance of virtual machines by using Azure Monitor VM Insights Troubleshoot on-premises and hybrid networking Troubleshoot Windows Server Virtual Machines in Azure Lab : Monitoring and troubleshooting of IaaS VMs running Windows Server Enabling Azure Monitor for virtual machines Setting up a VM with boot diagnostics Setting up a Log Analytics workspace and Azure Monitor VM Insights After completing module 9, students will be able to: Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. View VM metrics in Azure Metrics Explorer. Use monitoring data to diagnose problems. Evaluate Azure Monitor Logs and configure Azure Monitor VM Insights. Configure a Log Analytics workspace. Troubleshoot on-premises connectivity and hybrid network connectivity. Troubleshoot AD DS service failures or degraded performance. Recover deleted security objects and the AD DS database. Troubleshoot hybrid authentication issues. [-]
Les mer
Virtuelt klasserom 3 timer 3 400 kr
Å lage gode skjemaer er ikke lett. Både teknisk, pedagogisk og innholdsmessig må skjemaene arbeides med, slik at det blir forståelig for alle, og ikke minst enkelt å fyll... [+]
Kurset er rettet mot designere og utviklere. Vi er blant annet innom: Forståelige skjemaobjekter Beskrivelser og instruksjoner Obligatoriske felt Lesbarhet Vær konsekvent Grupperinger Viktige skjema Store, komplekse skjemaer Validering og feilhåndtering [-]
Les mer