Alle kategorier
Du har valgt: IT-kurs
Nullstill
Filter
Ferdig

-

Mer enn 100 treff i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of Information Security Management, elucidating its significance in safeguarding the confidentiality, integrity, and availability of organisational information assets. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Strategist: Direct, Plan and improve er en modul innen ITIL®. Modulen er en nøkkelkomponenten i både ITIL® 4 Managing Professional og ITIL® 4 Strategic Leader-løp... [+]
Modulen dekker bruk og effekt av Lean og agile arbeidsmåter, og hvordan dette kan utnyttes til fordel for organisasjonen. Kurset vil gi kandidatene en praktisk og strategisk metode for å planlegge og levere kontinuerlig forbedring med nødvendig smidighet.  E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 12 moduler. Les mer om ITIL® 4 på AXELOS sine websider Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert.   [-]
Les mer
Nettstudie 12 måneder 5 000 kr
The purpose of this module is to ensure that the organisation’s suppliers and their performances are managed appropriately to support the seamless provision of quality pr... [+]
Understand the purpose and key concepts of the Supplier Management Practice, elucidating its importance in managing supplier relationships and ensuring value delivery from third-party services. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn how to move new or changed hardware, software, documentation, processes, or any other component to live environments, and how to deploy components to other environm... [+]
Understand the purpose and key concepts of Deployment Management, highlighting its importance in managing the deployment of new or changed services into the live environment. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours of content   Mobile-optimised   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to provide accurate and reliable information about the configuration of services and configuration support items when and where it is needed. [+]
Understand the purpose and key concepts of Service Configuration Management, including its role in maintaining accurate and reliable information about configuration items (CIs) within the IT infrastructure. This eLearning is: Interactive Self-paced Device-friendly 2-3 hours content Mobile-optimised Practical exercises   Exam: 20 questions Multiple Choice 30 Minutes Closed book Pass Mark: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to maximise the number of successful service and product changes by ensuring that risks have been accurately assessed, authorising changes, and managing change sche... [+]
Understand the purpose and key concepts of Change Enablement, highlighting its importance in managing changes effectively to minimise risk and ensure business continuity.   This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours of content   Mobile-optimised   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
4 dager 21 000 kr
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azur... [+]
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.   TARGET AUDIENCE This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. COURSE OBJECTIVES After completing this course you should be able to: Secure and manage identities with Azure Active Directory. Implement and manage users and groups. Implement and manage Azure subscriptions and accounts. Implement Azure Policy, including custom policies. Use RBAC to assign permissions. Leverage Azure Resource Manager to organize resources. Use the Azure Portal and Cloud Shell. Use Azure PowerShell and CLI. Use ARM Templates to deploy resources. Implement virtual networks and subnets. Configure public and private IP addressing. Configure network security groups. Configure Azure Firewall. Configure private and public DNS zones Configure VNet Peering. Configure VPN gateways. Choose the appropriate intersite connectivity solution. Configure network routing including custom routes and service endpoints. Configure an Azure Load Balancer. Configure and Azure Application Gateway. Choose the appropriate network traffic solution. Create Azure storage accounts. Configure blob containers. Secure Azure storage. Configure Azure files shares and file sync. Manage storage with tools such as Storage Explorer Plan for virtual machine implementations. Create virtual machines. Configure virtual machine availability, including scale sets. Use virtual machine extensions. Create an app service plan. Create a web app. Implement Azure Container Instances. Implement Azure Kubernetes Service. Backup and restore file and folders. Backup and restore virtual machines. Use Azure Monitor. Create Azure alerts. Query using Log Analytics. Use Network Watcher.   COURSE CONTENT   Module 1: Identity Azure Active Directory Users and Groups Lab : Manage Azure Active Directory Identities Module 2: Governance and Compliance Subscriptions and Accounts Azure Policy Role-based Access Control (RBAC) Lab : Manage Subscriptions and RBAC Lab : Manage Governance via Azure Policy Module 3: Azure Administration Azure Resource Manager Azure Portal and Cloud Shell Azure PowerShell and CLI ARM Templates Lab : Manage Azure resources by Using the Azure Portal Lab : Manage Azure resources by Using ARM Templates Lab : Manage Azure resources by Using Azure PowerShell Lab : Manage Azure resources by Using Azure CLI Module 4: Virtual Networking Virtual Networks IP Addressing Network Security groups Azure Firewall Azure DNS Lab : Implement Virtual Networking Module 5: Intersite Connectivity VNet Peering VPN Gateway Connections ExpressRoute and Virtual WAN Lab : Implement Intersite Connectivity Module 6: Network Traffic Management Network Routing and Endpoints Azure Load Balancer Azure Application Gateway Traffic Manager Lab : Implement Traffic Management Module 7: Azure Storage Storage Accounts Blob Storage Storage Security Azure Files and File Sync Managing Storage Lab : Manage Azure storage Module 8: Azure Virtual Machines Virtual Machine Planning Creating Virtual Machines Virtual Machine Availability Virtual Machine Extensions Lab : Manage virtual machines Module 9: Serverless Computing Azure App Service Plans Azure App Service Container Services Azure Kubernetes Service Lab : Implement Web Apps Lab : Implement Azure Container Instances Lab : Implement Azure Kubernetes Service Module 10: Data Protection File and Folder Backups Virtual Machine Backups Lab : Implement Data Protection Module 11: Monitoring Azure Monitor Azure Alerts Log Analytics Network Watcher Lab : Implement Monitoring     [-]
Les mer
Oslo 1 dag 7 900 kr
14 Aug
14 Aug
PowerPoint med Presentasjonsteknikk [+]
PowerPoint med Presentasjonsteknikk [-]
Les mer
2 dager 16 900 kr
Elasticsearch [+]
Elasticsearch [-]
Les mer
Virtuelt klasserom 5 dager 38 000 kr
(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the re... [+]
COURSE OVERVIEW A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration. This professional competence is measured against a globally recognized body of knowledge. The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)²’s Certified Information Systems Security Professional (CISSP) and CSA’s Certificate of Cloud Security Knowledge (CCSK). As an (ISC)2 Official Training Provider, we use courseware developed by (ISC)² –creator of the CCSP CBK –to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CCSP and have completed intensive training to teach (ISC)² content. Please Note: An exam voucher is included with this course   TARGET AUDIENCE Experienced cybersecurity and IT/ICT professionals who are involved in transitioning to and maintaining cloud-basedsolutions and services. Roles include:• Cloud Architect• Chief Information Security Officer (CISO)• Chief Information Officer (CIO)• Chief Technology Officer (CTO)• Engineer/Developer/Manager• DevOps• Enterprise Architect• IT Contract Negotiator• IT Risk and Compliance Manager• Security Administrator• Security Analyst• Security Architect• Security Consultant• Security Engineer• Security Manager• Systems Architect• Systems Engineer• SecOps   COURSE OBJECTIVES After completing this course you should be able to:   Describe the physical and virtual components of and identify the principle technologies of cloud based systems Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations Contrast between forensic analysis in corporate data center and cloud computing environments Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing Identify and explain the six phases of the data lifecycle Explain strategies for protecting data at rest and data in motion Describe the role of encryption in protecting data and specific strategies for key management Compare a variety of cloud-based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements Contrast security aspects of Software Development Lifecycle (SDLC) in standard data center and cloud computing environments Describe how federated identity and access management solutions mitigate risks in cloud computing systems Conduct gap analysis between baseline and industry-standard best practices Develop Service Level Agreements (SLAs) for cloud computing environments Conduct risk assessments of existing and proposed cloud-based environments State the professional and ethical standards of (ISC)² and the Certified Cloud Security Professional COURSE CONTENT   Domain 1. Cloud Concepts, Architecture and Design Domain 2. Cloud Data Security Domain 3. Cloud Platform & Infrastructure Security Domain 4. Cloud Application Security Domain 5. Cloud Security Operations Domain 6. Legal, Risk and Compliance TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)² - Certified Cloud Security Professional  Gaining this accreditation is not just about passing the exam, there are a number of other criterias that need to be met including 5  years of cumulative, paid work experience in  information technology, of which 3 years must be in information security and 1 year in 1 or more of the 6 domains of the CCSP CBK. Earning CSA’s CCSK certificate can be substituted for 1 year of experience in 1 or more of the 6 domains of the CCSP CBK. Earning (ISC)²’s CISSP credential can be substituted for the entire CCSP experience requirement. Full details can be found at https://www.isc2.org/Certifications/CCSP Those without the required experience can take the exam to become an Associate of (ISC)²  . The Associate of (ISC)² will then have 6 years to earn the 5 years required experience.   [-]
Les mer
5 dager 39 000 kr
30 Jun
11 Aug
15 Sep
RH124: Red Hat System Administration I - Linux (RHEL) [+]
RH124: Red Hat System Administration I - Linux (RHEL) [-]
Les mer
Virtuelt eller personlig 3 dager 11 200 kr
Utvikle 3D-modeller og lage realistiske bilder og animasjoner av disse. [+]
AutoCAD 3D introduksjonskurs: Deltagerne skal kunne skille mellom ulike modelltyper, og kjenne til grunnprinsipper for 3D-modellering og bruk av koordinatsystem, samt beherske bruk av betraktningsvinkler og skjermnavigering. Koordinatsystemer Angivelse av punkter i rommet Solid modellering Surface modellering Mesh modellering Sette opp Layout i paperspace, projeksjoner og snitt Lagstruktur og lagdefinisjon, farger, linjetyper, målsetting Lyssetting, naturlig sollys og lokale lyskilder Knytte materialer til objekt eller til lag Renderfunksjoner Animasjon og video [-]
Les mer
Oslo Bergen Og 1 annet sted 2 timer 15 900 kr
11 Sep
11 Sep
23 Oct
Leading SAFe® 6.0 [+]
Leading SAFe® [-]
Les mer
Virtuelt klasserom 3 dager 9 760 kr
Certificate of Cloud Security Knowledge (CCSK) [+]
  Certificate of Cloud Security Knowledge (CCSK)    CCSK er et bevis på at innehaveren forstår hovedkonseptene i de tre dokumentene CSA bruker som kunnskapsbase for CCSK: CSAs eget rammeverk for beste praksis innen skysikkerhet, «Security Guidance for Critical Areas of Focus in Cloud Computing, v4.0” ENISAs – det europeiske byrået for nettverks- og informasjonssikkerhet – white paper «Cloud Computing: Benefits, Risks and Recommendations for Information Security.» ENISA er EUs ekspertisesenter for internettsikkerhet i Europa. CSA har i en årrekke hatt et tett samarbeid med ENISA. «CSA Cloud Controls Matrix» er et verktøy for å evaluere skytjenester opp mot en lang rekke standarder og rammeverk, for enklere å forstå hvor godt den enkelte skytjeneste er egnet til å understøtte deg og din bedrift i deres forpliktelser. I tillegg til det offisielle materialet, får kursdeltakere fra kraftbransjen tilgang til Berigos egenutviklede materiale som utvider Cloud Controls Matrix til også å omfatte kraftberedskapsforskriften.   [-]
Les mer
Oslo 4 dager 23 900 kr
30 Sep
30 Sep
16 Dec
Vue.js, Vuex & Router Course [+]
Vue.js, Vuex & Router Course [-]
Les mer