IT-kurs
Viken
Du har valgt: Indre Østfold
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Indre Østfold ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Learn how to move new or changed hardware, software, documentation, processes, or any other component to live environments, and how to deploy components to other environm... [+]
Understand the purpose and key concepts of Deployment Management, highlighting its importance in managing the deployment of new or changed services into the live environment. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours of content   Mobile-optimised   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Relationship Management, Supplier Management, Service Level Management, Continual Improvement and Info... [+]
Understand the key concepts of Relationship Management, Supplier Management, Service Level Management, Continual Improvement, and Information Security Management, elucidating their significance in fostering collaboration, ensuring service quality, driving continual improvement, and maintaining information security. This eLearning is: Interactive Self-paced   Device-friendly   12 hours content   Mobile-optimised   Practical exercises   Exam: 60 questions Multiple choise 90 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of the Service Level Management Practice, elucidating its significance in defining, negotiating, and managing service levels to meet customer expectations. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Virtuelt klasserom 4 dager 30 000 kr
29 Sep
In this course, the student will learn about the data engineering patterns and practices as it pertains to working with batch and real-time analytical solutions using Azu... [+]
The students will learn how to interactively explore data stored in files in a data lake. They will learn the various ingestion techniques that can be used to load data using the Apache Spark capability found in Azure Synapse Analytics or Azure Databricks, or how to ingest using Azure Data Factory or Azure Synapse pipelines. The students will also learn the various ways they can transform the data using the same technologies that is used to ingest data. The student will spend time on the course learning how to monitor and analyze the performance of analytical system so that they can optimize the performance of data loads, or queries that are issued against the systems. They will understand the importance of implementing security to ensure that the data is protected at rest or in transit. The student will then show how the data in an analytical system can be used to create dashboards, or build predictive models in Azure Synapse Analytics. After completing this course, students will be able to: Explore compute and storage options for data engineering workloads in Azure Design and Implement the serving layer Understand data engineering considerations Run interactive queries using serverless SQL pools Explore, transform, and load data into the Data Warehouse using Apache Spark Perform data Exploration and Transformation in Azure Databricks Ingest and load Data into the Data Warehouse Transform Data with Azure Data Factory or Azure Synapse Pipelines Integrate Data from Notebooks with Azure Data Factory or Azure Synapse Pipelines Optimize Query Performance with Dedicated SQL Pools in Azure Synapse Analyze and Optimize Data Warehouse Storage Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link Perform end-to-end security with Azure Synapse Analytics Perform real-time Stream Processing with Stream Analytics Create a Stream Processing Solution with Event Hubs and Azure Databricks Build reports using Power BI integration with Azure Synpase Analytics Perform Integrated Machine Learning Processes in Azure Synapse Analytics Course prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions.Recommended prerequisites:M-DP900 - Microsoft Azure Data FundamentalsM-AZ900 - Microsoft Azure Fundamentals Agenda Module 1: Explore compute and storage options for data engineering workloads This module provides an overview of the Azure compute and storage technology options that are available to data engineers building analytical workloads. This module teaches ways to structure the data lake, and to optimize the files for exploration, streaming, and batch workloads. The student will learn how to organize the data lake into levels of data refinement as they transform files through batch and stream processing. Then they will learn how to create indexes on their datasets, such as CSV, JSON, and Parquet files, and use them for potential query and workload acceleration. Module 2: Design and implement the serving layer This module teaches how to design and implement data stores in a modern data warehouse to optimize analytical workloads. The student will learn how to design a multidimensional schema to store fact and dimension data. Then the student will learn how to populate slowly changing dimensions through incremental data loading from Azure Data Factory. Module 3: Data engineering considerations for source files This module explores data engineering considerations that are common when loading data into a modern data warehouse analytical from files stored in an Azure Data Lake, and understanding the security consideration associated with storing files stored in the data lake. Module 4: Run interactive queries using Azure Synapse Analytics serverless SQL pools In this module, students will learn how to work with files stored in the data lake and external file sources, through T-SQL statements executed by a serverless SQL pool in Azure Synapse Analytics. Students will query Parquet files stored in a data lake, as well as CSV files stored in an external data store. Next, they will create Azure Active Directory security groups and enforce access to files in the data lake through Role-Based Access Control (RBAC) and Access Control Lists (ACLs). Module 5: Explore, transform, and load data into the Data Warehouse using Apache Spark This module teaches how to explore data stored in a data lake, transform the data, and load data into a relational data store. The student will explore Parquet and JSON files and use techniques to query and transform JSON files with hierarchical structures. Then the student will use Apache Spark to load data into the data warehouse and join Parquet data in the data lake with data in the dedicated SQL pool. Module 6: Data exploration and transformation in Azure Databricks This module teaches how to use various Apache Spark DataFrame methods to explore and transform data in Azure Databricks. The student will learn how to perform standard DataFrame methods to explore and transform data. They will also learn how to perform more advanced tasks, such as removing duplicate data, manipulate date/time values, rename columns, and aggregate data. Module 7: Ingest and load data into the data warehouse This module teaches students how to ingest data into the data warehouse through T-SQL scripts and Synapse Analytics integration pipelines. The student will learn how to load data into Synapse dedicated SQL pools with PolyBase and COPY using T-SQL. The student will also learn how to use workload management along with a Copy activity in a Azure Synapse pipeline for petabyte-scale data ingestion. Module 8: Transform data with Azure Data Factory or Azure Synapse Pipelines This module teaches students how to build data integration pipelines to ingest from multiple data sources, transform data using mapping data flowss, and perform data movement into one or more data sinks. Module 9: Orchestrate data movement and transformation in Azure Synapse Pipelines In this module, you will learn how to create linked services, and orchestrate data movement and transformation using notebooks in Azure Synapse Pipelines. Module 10: Optimize query performance with dedicated SQL pools in Azure Synapse In this module, students will learn strategies to optimize data storage and processing when using dedicated SQL pools in Azure Synapse Analytics. The student will know how to use developer features, such as windowing and HyperLogLog functions, use data loading best practices, and optimize and improve query performance. Module 11: Analyze and Optimize Data Warehouse Storage In this module, students will learn how to analyze then optimize the data storage of the Azure Synapse dedicated SQL pools. The student will know techniques to understand table space usage and column store storage details. Next the student will know how to compare storage requirements between identical tables that use different data types. Finally, the student will observe the impact materialized views have when executed in place of complex queries and learn how to avoid extensive logging by optimizing delete operations. Module 12: Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link In this module, students will learn how Azure Synapse Link enables seamless connectivity of an Azure Cosmos DB account to a Synapse workspace. The student will understand how to enable and configure Synapse link, then how to query the Azure Cosmos DB analytical store using Apache Spark and SQL serverless. Module 13: End-to-end security with Azure Synapse Analytics In this module, students will learn how to secure a Synapse Analytics workspace and its supporting infrastructure. The student will observe the SQL Active Directory Admin, manage IP firewall rules, manage secrets with Azure Key Vault and access those secrets through a Key Vault linked service and pipeline activities. The student will understand how to implement column-level security, row-level security, and dynamic data masking when using dedicated SQL pools. Module 14: Real-time Stream Processing with Stream Analytics In this module, students will learn how to process streaming data with Azure Stream Analytics. The student will ingest vehicle telemetry data into Event Hubs, then process that data in real time, using various windowing functions in Azure Stream Analytics. They will output the data to Azure Synapse Analytics. Finally, the student will learn how to scale the Stream Analytics job to increase throughput. Module 15: Create a Stream Processing Solution with Event Hubs and Azure Databricks In this module, students will learn how to ingest and process streaming data at scale with Event Hubs and Spark Structured Streaming in Azure Databricks. The student will learn the key features and uses of Structured Streaming. The student will implement sliding windows to aggregate over chunks of data and apply watermarking to remove stale data. Finally, the student will connect to Event Hubs to read and write streams. Module 16: Build reports using Power BI integration with Azure Synapase Analytics In this module, the student will learn how to integrate Power BI with their Synapse workspace to build reports in Power BI. The student will create a new data source and Power BI report in Synapse Studio. Then the student will learn how to improve query performance with materialized views and result-set caching. Finally, the student will explore the data lake with serverless SQL pools and create visualizations against that data in Power BI. Module 17: Perform Integrated Machine Learning Processes in Azure Synapse Analytics This module explores the integrated, end-to-end Azure Machine Learning and Azure Cognitive Services experience in Azure Synapse Analytics. You will learn how to connect an Azure Synapse Analytics workspace to an Azure Machine Learning workspace using a Linked Service and then trigger an Automated ML experiment that uses data from a Spark table. You will also learn how to use trained models from Azure Machine Learning or Azure Cognitive Services to enrich data in a SQL pool table and then serve prediction results using Power BI. [-]
Les mer
Bedriftsintern 1 dag 11 000 kr
This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform. [+]
Through a combination of presentations, demos, and hands-on labs, participants get an overview of the Google Cloud platform and a detailed view of the data processing and machine learning capabilities. This course showcases the ease, flexibility, and power of big data solutions on Google Cloud Platform. Learning Objectives This course teaches participants the following skills: Identify the purpose and value of the key Big Data and Machine Learning products in the Google Cloud Platform Use Cloud SQL and Cloud Dataproc to migrate existing MySQL and Hadoop/Pig/Spark/Hive workloads to Google Cloud Platform Employ BigQuery and Cloud Datalab to carry out interactive data analysis Train and use a neural network using TensorFlow Employ ML APIs Choose between different data processing products on the Google Cloud Platform Course Outline Module 1: Introducing Google Cloud Platform -Google Platform Fundamentals Overview-Google Cloud Platform Big Data Products Module 2: Compute and Storage Fundamentals -CPUs on demand (Compute Engine)-A global filesystem (Cloud Storage)-CloudShell-Lab: Set up an Ingest-Transform-Publish data processing pipeline Module 3: Data Analytics on the Cloud -Stepping-stones to the cloud-CloudSQL: your SQL database on the cloud-Lab: Importing data into CloudSQL and running queries-Spark on Dataproc-Lab: Machine Learning Recommendations with Spark on Dataproc Module 4: Scaling Data Analysis -Fast random access-Datalab-BigQuery-Lab: Build machine learning dataset Module 5: Machine Learning -Machine Learning with TensorFlow-Lab: Carry out ML with TensorFlow-Pre-built models for common needs-Lab: Employ ML APIs Module 6: Data Processing Architectures -Message-oriented architectures with Pub/Sub-Creating pipelines with Dataflow-Reference architecture for real-time and batch data processing Module 7: Summary -Why GCP?-Where to go from here-Additional Resources [-]
Les mer
Bedriftsintern 1 dag 11 000 kr
This one-day instructor-led class provides an overview of Google Cloud Platform products and services. Through a combination of presentations and hands-on labs, participa... [+]
Objectives This course teaches participants the following skills: Identify the purpose and value of each of the Google Cloud Platform products and services Interact with Google Cloud Platform services Describe ways in which customers have used Google Cloud Platform Choose among and use application deployment environments on Google Cloud Platform: Google App Engine, Google Kubernetes Engine, and Google Compute Engine Choose among and use Google Cloud Platform storage options: Google Cloud Storage, Google Cloud SQL, Google Cloud Bigtable, and Google Cloud Datastore Make basic use of BigQuery, Google’s managed data warehouse for analytics Make basic use of Cloud Deployment Manager, Google’s tool for creating and managing cloud resources through templates Make basic use of Google Stackdriver, Google’s monitoring, logging, and diagnostics system All courses will be delivered in partnership with ROI Training, Google Cloud Premier Partner, using a Google Authorized Trainer. Course Outline Module 1: Introducing Google Cloud Platform -Explain the advantages of Google Cloud Platform-Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones-Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) Module 2: Getting Started with Google Cloud Platform -Identify the purpose of projects on Google Cloud Platform-Understand the purpose of and use cases for Identity and Access Management-List the methods of interacting with Google Cloud Platform-Lab: Getting Started with Google Cloud Platform Module 3: Virtual Machines and Networks in the Cloud -Identify the purpose of and use cases for Google Compute Engine.-Understand the various Google Cloud Platform networking and operational tools and services.-Lab: Compute Engine Module 4: Storage in the Cloud -Understand the purpose of and use cases for: Google Cloud Storage, Google Cloud SQL, Google Cloud Bigtable, and Google Cloud Datastore.-Learn how to choose between the various storage options on Google Cloud Platform.-Lab: Cloud Storage and Cloud SQL Module 5: Containers in the Cloud -Define the concept of a container and identify uses for containers.-Identify the purpose of and use cases for Google Kubernetes Engine and Kubernetes.-Lab: Kubernetes Engine Module 6: Applications in the Cloud -Understand the purpose of and use cases for Google App Engine.-Contrast the App Engine Standard environment with the App Engine Flexible environment.-Understand the purpose of and use cases for Google Cloud Endpoints.-Lab: App Engine Module 7: Developing, Deploying, and Monitoring in the Cloud -Understand options for software developers to host their source code.-Understand the purpose of template-based creation and management of resources.-Understand the purpose of integrated monitoring, alerting, and debugging.-Lab: Deployment Manager and Stackdriver Module 8: Big Data and Machine Learning in the Cloud -Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms.-Lab: BigQuery [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
NET-arkitekturen. Utviklingsmiljøet. Grunnleggende C#-syntaks. Objektorientert programmering med arv og polymorfi. GUI. Datafiler. Programmering mot databaser. ADO.NET, L... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Grunnleggende objektorientert programmering i for eksempel Java eller C++ Innleveringer: Øvinger: 8 av 11 må være godkjent.  Personlig veileder: ja Vurderingsform: Skriftlig eksamen, 4 timer. Case-beskrivelser etc. legges ut i ItsLearning 24 timer før. (NB! Eksamensform kan bli endret under forutsetning av at ny teknologi gjør det mulig å arrangere eksamen elektronisk.) Ansvarlig: Grethe Sandstrak Eksamensdato: 05.12.13 / 08.05.14         Læremål: Etter å ha gjennomført emnet skal kandidaten ha følgende samlete læringsutbytte: KUNNSKAPER:Kandidaten:- kan gjøre rede for sentrale begreper innen objektorientering- kan konstruere et objektorientert C#. NET-program ut fra en gitt problemstilling- kan finne fram, sette seg inn i og anvende dokumentasjon om .NET Framework library- kjenner til ulike GUI-komponenter og hvordan de brukes i C#-programmer FERDIGHETER:Kandidaten kan:- sette opp programmiljø for å utvikle og kjøre C#. NET applikasjoner på egen pc- kan anvende klasser fra .NET Framework library- lage C#.NET program* med fordeling av oppgaver mellom objekter og der arv og polymorfi benyttes* med grafiske brukergrensesnitt* som kommuniserer med en database via SQL* med LINQ, delegater, templates GENERELL KOMPETANSEKandidaten kan:- kommunisere om objektorientert programmering og databaser med relevant begrepsapparat Innhold:NET-arkitekturen. Utviklingsmiljøet. Grunnleggende C#-syntaks. Objektorientert programmering med arv og polymorfi. GUI. Datafiler. Programmering mot databaser. ADO.NET, LINQ, Templates, Collections.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag C#.NET 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration: Microsoft 365 tenant and service management, Office 365 management, and Microsoft 36... [+]
COURSE OVERVIEW  In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management. This begins with an overview of Office 365 product functionality, including Exchange Online, SharePoint Online, Microsoft Teams, additional product resources, and device management. You will then transition to configuring Office 365, with a primary focus on configuring Office client connectivity to Office 365. Finally, you will examine how to manage Office 365 ProPlus deployments, from user-driven client installations to centralized Office 365 ProPlus deployments. You will wrap up this section by learning how to configure Office Telemetry and Microsoft Analytics. The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multi-factor authentication and self-service password management. This section wraps up with a comprehensive look at implementing application and external access. You will learn how to add and manage applications in Azure Active Directory, including how to configure multi-tenant applications. You will then examine how to configure Azure AD Application Proxy, including how to install and register a connector and how to publish an on-premises app for remote access. Finally, you will examine how to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths. COURSE OBJECTIVES Designing, configuring, and managing your Microsoft 365 tenant Office 365 product functionality Configuring Office 365 Managing Office 365 ProPlus deployments Planning and implementing identity synchronization Implementing application and external access COURSE CONTENT Module 1: Designing Your Microsoft 365 Tenant Planning Microsoft 365 in your On-premises Infrastructure Planning Your Identity and Authentication Solution Planning Your Service Setup Planning Your Hybrid Enviroment Planning Your Migration to Office 365 Module 2: Configuring Your Microsoft 365 Tenant Planning  Your Microsoft 365 Experience Configuring  Your Microsoft 365 Experience Managing User Accounts and Licenses in Microsoft 365 Managing Security Groups in Microsoft 365 Implementing Your Domain Services Leveraging FastTrack and Partner Services Module 3: Lab 1 - Configuring your Microsoft 365 Tenant Exercise 1 - Set up a Microsoft 365 Trial Tenant Module 4: Managing Your Microsoft 365 Tenant Configuring Tenant Roles Managing Tenant Health and Services Module 5: Lab 2 - Managing your Microsoft 365 Tenant Exercise 1 - Manage Administration Delegation Exercise 2 - Configure Office 365 Message Encryption (OME) Exercise 3 - Monitor and Troubleshoot Office 365 Module 6: Office 365 Overview Exchange Online Overview SharePoint Online Overview Teams Overview Additional Resources Overview Device Management Overview Module 7: Lab 3 - Office 365 Overview Exercise 1 - Exchange Online Overview Exercise 2 - SharePoint Online Overview Exercise 3 - Teams Overview Module 8: Configuring  Office 365 Office 365 Client Overview Configuring Office Client Connectivity to Office 365 Module 9: Managing Office 365 ProPlus Deployments Managing User-Driven Client Installations Managing Centralized Office 365 ProPlus Deployments Configuring Office Telemetry Configuring Microsoft Analytics Module 10: Lab 4 - Managing Office 365 ProPlus installations Exercise 1 - Prepare an Office 365 ProPlus Managed Installation Exercise 2 - Manage a Centralized Office 365 ProPlus Installation Exercise 3 - Deploy and Configure Office Telemetry Components Module 11: Planning and Implementing Identity Synchronization Introduction to Identity Synchronization Planning for Azure AD Connect Implementing Azure AD Connect Managing Synchronized Identities Password Management in Microsoft 365 Module 12: Lab 5 - Implementing Identity Synchronization Exercise 1 - Set up your organization for identity synchronization Exercise 2 - Implement Identity Synchronization Module 13: Implementing Application and External Access Implementing Applications in Azure AD Configuring Azure AD App Proxy Designing Solutions for External Access TEST CERTIFICATION This course helps you to prepare for exam MS100. But as this is part of an expert certification you should already own one of the Microsoft 365 Associate certifications:  Modern Desktop Teamwork Administrator Security Administrator Messaging Administrator. [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microso... [+]
 In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. Global Knowledge will introduce you to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths. COURSE OBJECTIVES By actively participating in this course, you will learn about the following: Microsoft 365 Security Metrics Microsoft 365 Security Services Microsoft 365 Threat Intelligence Data Governance in Microsoft 365 Archiving and Retention in Office 365 Data Governance in Microsoft 365 Intelligence Search and Investigations Device Management Windows 10 Deployment Strategies Mobile Device Management COURSE CONTENT Module 1: Introduction to Microsoft 365 Security Metrics Threat Vectors and Data Breaches Security Solutions in Microsoft 365 Introduction to the Secure Score Introduction to Azure Active Directory Identity Protection Module 2: Managing Your Microsoft 365 Security Services Introduction to Exchange Online Protection Introduction to Advanced Threat Protection Managing Safe Attachments Managing Safe Links Monitoring and Reports Module 3: Lab 1 - Manage Microsoft 365 Security Services Exercise 1 - Set up a Microsoft 365 Trial Tenant Exercise 2 - Implement an ATP Safe Links policy and Safe Attachment policy Module 4: Microsoft 365 Threat Intelligence Overview of Microsoft 365 Threat Intelligence Using the Security Dashboard Configuring Advanced Threat Analytics Implementing Your Cloud Application Security Module 5: Lab 2 - Implement Alert Notifications Using the Security Dashboard Exercise 1 - Prepare for implementing Alert Policies Exercise 2 - Implement Security Alert Notifications Exercise 3 - Implement Group Alerts Exercise 4 - Implement eDiscovery Alerts Module 6: Introduction to Data Governance in Microsoft 365 Introduction to Archiving in Microsoft 365 Introduction to Retention in Microsoft 365 Introduction to Information Rights Management Introduction to Secure Multipurpose Internet Mail Extension Introduction to Office 365 Message Encryption Introduction to Data Loss Prevention Module 7: Archiving and Retention in Office 365 In-Place Records Management in SharePoint Archiving and Retention in Exchange Retention Policies in the SCC Module 8: Lab 3 - Implement Archiving and Retention Exercise 1 - Initialize Compliance in Your Organization Exercise 2 - Configure Retention Tags and Policies Exercise 3 - Implement Retention Policies Module 9: Implementing Data Governance in Microsoft 365 Intelligence Planning Your Security and Complaince Needs Building Ethical Walls in Exchange Online Creating a Simple DLP Policy from a Built-in Template Creating a Custom DLP Policy Creating a DLP Policy to Protect Documents Working with Policy Tips Module 10: Lab 4 - Implement DLP Policies Exercise 1 - Manage DLP Policies Exercise 2 - Test MRM and DLP Policies Module 11: Managing Data Governance in Microsoft 365 Managing Retention in Email Troubleshooting Data Governance Implementing Azure Information Protection Implementing Advanced Features of AIP Implementing Windows Information Protection Module 12: Lab 5 - Implement AIP and WIP Exercise 1 - Implement Azure Information Protection Exercise 2 - Implement Windows Information Protection Module 13: Managing Search and Investigations Searching for Content in the Security and Compliance Center Auditing Log Investigations Managing Advanced eDiscovery Module 14: Lab 6 - Manage Search and Investigations Exercise 1 - Investigate Your Microsoft 365 Data Exercise 2 - Configure and Deploy a Data Subject Request Module 15: Planning for Device Management Introduction to Co-management Preparing Your Windows 10 Devices for Co-management Transitioning from Configuration Manager to Intune Introduction to Microsoft Store for Business Planning for Mobile Application Management Module 16: Lab 7 - Implement the Microsoft Store for Business Exercise 1 - Configure the Microsoft Store for Business Exercise 2 - Manage the Microsoft Store for Business Module 17: Planning Your Windows 10 Deployment Strategy Windows 10 Deployment Scenarios Implementing Windows Autopilot Planning Your Windows 10 Subscription Activation Strategy Resolving Windows 10 Upgrade Errors Introduction to Windows Analytics Module 18: Implementing Mobile Device Management Planning Mobile Device Management Deploying Mobile Device Management Enrolling Devices to MDM Managing Device Compliance Module 19: Lab 8 - Manage Devices with Intune Exercise 1 - Enable Device Management Exercise 2 - Configure Azure AD for Intune Exercise 3 - Create Intune Policies Exercise 4 - Enroll a Windows 10 Device Exercise 5 - Manage and Monitor a Device in Intune TEST CERTIFICATION This course helps you to prepare for exam MS101. [-]
Les mer
Nettstudie 11 800 kr
Med utgangspunkt i automasjon i bygg lærere du I denne utdanningen lærer du om grunnleggende programmering i HTML, Python, og JavaScript, mobilapp-utvikling, samt prosjek... [+]
Koding automasjon i bygg Denne fagskole utdanningens innhold tilsvarer 5 studiepoeng og utdanning er på nettet.  Maksimalt antall studieplasser er 25. Utdanningen er praktisk tilrettelagt, slik at du kan anvende teori og kunnskap i praksis. Du vil få mulighet til å jobbe med reelle og aktuelle problemstillinger, og du vil få tilbakemelding fra erfarne fagfolk. Læremateriellet består av video, podkaster, resyme av fagstoff, artikler, forskningsrapporter, foredrag, presentasjon av fagstoff, samt quizer og annet. Læremateriellet du får tilgang til er på en LMS som er under kontinuerlig utvikling og oppdatering. Du får ett års tilgang til læremateriell, etter at utdanningen er ferdig, på Learning Management System (LMS) I denne utdanningen lærer du om: Installere Python på egen PC (Spyder): Veiledning for hvordan du installerer Python og Spyder IDE for å utvikle Python-programmer. Introduksjon til programmering i: HTML: Grunnleggende om HTML-strukturer og webutvikling. Python: Introduksjon til grunnleggende programmeringskonsepter, inkludert: Variabler og Datatyper: Opprettelse og bruk av variabler med ulike datatyper som heltall (integers), desimaltall (floats), strenger (strings), lister (lists), tupler (tuples), og dictionaries (dictionaries). Operatorer: Bruk av matematiske, sammenlignings-, og logiske operatorer for beregninger og verdikomparasjoner. Løkker: Implementering av kontrollstrukturer som if-setninger, for- og while-løkker, samt avvikshantering med try og except for å styre programflyten. Funksjoner: Definisjon og anvendelse av funksjoner for å organisere koden i moduler og forbedre lesbarheten og vedlikeholdbarheten. Input og Output: Håndtering av datainnlesning fra bruker og datavisning til skjermen. Moduler og Biblioteker: Utforsking av innebygde og tredjepartsmoduler for å utvide programmets funksjonalitet. Filstyring: Åpning, lesing, skriving, og lukking av filer. Strukturering av kode: Organisering av kode ved hjelp av funksjoner, klasser, og moduler for bedre lesbarhet og vedlikehold. JavaScript: Grunnleggende programmeringskonsepter for å utvikle interaktive webapplikasjoner. Programmere App til mobil telefon: Introduksjon til å kunne programmere Android-apps. Fra sensor til web: Utvikling av programmer fra grunnen av, fra å programmere Arduino UNO som en Modbus RTU slave til å utvikle en Modbus RTU master i Python. Konfigurasjon av egen PC som webserver (IIS) for å støtte webapplikasjoner. Integrert prosjektarbeid som involverer programmering fra sensor til web, som kombinerer hardware og software for å samle, behandle, og presentere data. Inkluderer API-er (Application Programming Interfaces) og tekniske beskrivelser. Du velger selv prosjektoppgave: Oppgaven kan for eksempel innebære å innhente data via API fra https://www.yr.no/ eller en annen nettressurs. Ved å anvende Modbus for I/O på Arduino, er det mulig å utvikle et system som både overvåker og regulerer energiforbruket ditt. Brukergrensesnittet kan være basert på web, og konfigureres på din egen datamaskin. Denne utdanningen danner et solid fundament for videre læring og anvendelse av disse konseptene i automasjon i bygg. Bedriftsinterne utdanning tilpasset din bedrift Denne utdanningen kan tilbys som en bedriftsintern utdanning. Det faglige innholdet er fastsatt, men den faglige tilnærmingen kan tilpasses den enkelte bedrifts behov og ønsker. Ta kontakt for en prat, så kan vi sammen lage et utdanningsløp som passer for deg og din bedrift. Kontaktpersoner er Hans Gunnar Hansen (tlf. 91101824) og Vidar Luth-Hanssen (tlf. 91373153) [-]
Les mer
2 dager 12 900 kr
Ønsker du å jobbe med ulike tegninger i Visio, men føler du ikke mestrer programmet? Vil du i tillegg kunne lage egne maler for å jobbe mer effektivt? Da er ”Visio ... [+]
Ønsker du å jobbe med ulike tegninger i Visio, men føler du ikke mestrer programmet? Vil du i tillegg kunne lage egne maler for å jobbe mer effektivt? Da er ”Visio Grunnleggende” kurset for deg! Kurset kan også spesialtilpasses og holdes bedriftsinternt i deres eller våre lokaler.   Kursinnhold:   Dag 1    Hva er Visio? Få oversikt. Bli kjent med programvinduet og hvordan du kan tilpasse det etter dine behov. Mal. Hvordan er en mal bygd opp og hvordan jobbe med en tegning? Formatering. Lær å formatere og hva formateringsbegrepet betyr. Sjablonger og figurer. Hva er sjablonger og figurer?   Å jobbe effektivt med Visio Bygge opp en tegning. Lær å bygge opp en tegning fra bunnen av. Hurtigtaster. Effektiv bruk av tastatur og mus. Formatering. Bruk formatering for å gjøre tegningene oversiktlige og informasjonen mest mulig tilgjengelig. Ark. Lær å jobbe med flere ark, navngi dem, slette dem, bruke bakgrunner etc. Praktisk oppgaveløsing. Jobb med skreddersydde oppgaver innenfor dagens temaer. Andre Office-programmer. Lær å bruke Visio-tegninger i andre Office-programmer.   Flytskjema og organisasjonskart Koblinger. Lær å koble figurer på en effektiv måte. Oppsett. Hvordan sørge for at figurene står plassert på en nøyaktig og oversiktlig måte? Navigasjon. Bygge opp praktisk navigasjon mellom sidene i en større tegning.   Dag 2    Nettverksdiagram Figurdata. Knytt praktisk informasjon til figurene i tegningen. Rapporter. Hvordan hente ut rapporter fra en tegning?   Prosjektplaner Tidslinje. Illustrere faser i et prosjekt på en oversiktlig måte. Gantt-diagram. Vise prosjektinformasjon på en mer detaljert måte. Utskrift. Få oversikt over de vanligste problemstillingene ved utskrift.   Egne maler Maler. Hva er maler, deres styrke og hvordan kan jeg utnytte dem best mulig i mitt arbeid? Sjablonger. Bygge opp en egen samling med de figurene du skal bruke. Figurer. Lær å lage egne tilpassede figurer. Praktisk oppgaveløsing. Jobb med skreddersydde oppgaver innenfor dagens temaer.   4 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Små kursgrupper 4. Kvalitets- og startgaranti   [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
Oslo Bergen 3 dager 20 900 kr
10 Sep
10 Sep
22 Sep
Implementing REST Services using Web API [+]
Implementing REST Services using Web API [-]
Les mer
Nettkurs 9 timer 549 kr
Ta vårt videokurs i Lightroom CC fra din datamaskin. Lær så mye du vil, når du vil. Du får gratis hjelp. Du får kursbevis. Du får tilgang til alle kurs. Meld deg på her! [+]
Lightroom CC er et råflott bilderedigeringsverktøy for fotoentusiaster. Lightroom CC inneholder alt du trenger for å organisere, redigere, lagre og dele bildene dine på tvers av enheter - dette være seg datamaskin, nettbrett eller mobil. Det betyr at du kan redigere et bilde på datamaskinen og fortsette på mobilen. Bildene synkroniseres nemlig i skyen. I dette kurset kommer Espen Faugstad til å guide deg gjennom programmet fra A til Å. Du kommer til å lære å importere og organisere, redigere ved hjelp av enkle og avanserte verktøy, og eksportere og dele. Du kommer også til å lære hvordan den skybaserte lagringsplassen kommer til å påvirke, og ikke minst, forbedre din digitale arbeidsflyt.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Importere Kapittel 3: Organisere Kapittel 4: Redigere (enkel) Kapittel 5: Beskjære Kapittel 6: Redigere (avansert) Kapittel 7: Eksportere Kapittel 8: Avslutning   Varighet: 2 timer og 16 minutter.   Hørt om Netflix? Vi er som dem, bare at vi lager nettkurs. Utdannet.no AS er en norsk startup som utvikler nettkurs i datateknologi, kreative fagfelt og grunnleggende forretningsferdigheter. Med støtte fra Innovasjon Norge og Forskningsrådet utvikler vi nestegenerasjons kursplattform, med mål om å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle. Med over 1 million videovisninger, 20.000 registrerte medlemmer og en gjennomsnittlig årlig vekst på 45 % er vi godt i gang med å befeste vår posisjon i det norske markedet. Vi har kunder fra bedrifter som: Adresseavisen, Coca-Cola, Helsedirektoratet, IKEA, Joblearn, NAV, Nordea, NorgesGruppen, NRK, Oslo kommune, Securitas, Telenor og Utdanningsforbundet.   [-]
Les mer