IT-kurs
Vestfold
Du har valgt: Larvik
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Larvik ) i IT-kurs
 

Nettkurs 12 måneder 9 000 kr
ITIL® 4 Specialist: Create, Deliver and Support dekker «kjernen» i ITIL®, aktiviteter rundt administrasjon av tjenester, og utvider omfanget av ITIL® til å omfatte «oppre... [+]
Kurset fokuserer på integrering av forskjellige verdistrømmer og aktiviteter for å lage, levere og støtte IT-aktiverte produkter og tjenester, samtidig som den dekker støtte for praksis, metoder og verktøy. Kurset gir kandidatene forståelse for tjenestekvalitet og forbedringsmetoder. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Specialist: Create, Deliver and Support e-læring (engelsk) i 12 måneder. ITIL® 4 Specialist: Create, Deliver and Support online voucher til sertifiseringstest.   ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Klasserom + nettkurs 4 dager 21 000 kr
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. COURSE OBJECTIVES After you complete this course you will be able to: Use administrative techniques and tools in Windows Server. Identify tools used to implement hybrid solutions, including Windows Admin Center and PowerShell. Implement identity services in Windows Server. Implement identity in hybrid scenarios, including Azure AD DS on Azure IaaS and managed AD DS. Integrate Azure AD DS with Azure AD. Manage network infrastructure services. Deploy Azure VMs running Windows Server, and configure networking and storage. Administer and manage Windows Server IaaS Virtual Machine remotely. Manage and maintain Azure VMs running Windows Server. Configure file servers and storage. Implement File Services in hybrid scenarios, using Azure Files and Azure File Sync. COURSE CONTENT Module 1: Identity services in Windows Server This module introduces identity services and describes Active Directory Domain Services (AD DS) in a Windows Server environment. The module describes how to deploy domain controllers in AD DS, as well as Azure Active Directory (AD) and the benefits of integrating Azure AD with AD DS. The module also covers Group Policy basics and how to configure group policy objects (GPOs) in a domain environment. Lessons for module 1 Introduction to AD DS Manage AD DS domain controllers and FSMO roles Implement Group Policy Objects Manage advanced features of AD DS Lab : Implementing identity services and Group Policy Deploying a new domain controller on Server Core Configuring Group Policy After completing module 1, students will be able to: Describe AD DS in a Windows Server environment. Deploy domain controllers in AD DS. Describe Azure AD and benefits of integrating Azure AD with AD DS. Explain Group Policy basics and configure GPOs in a domain environment. Module 2: Implementing identity in hybrid scenarios This module discusses how to configure an Azure environment so that Windows IaaS workloads requiring Active Directory are supported. The module also covers integration of on-premises Active Directory Domain Services (AD DS) environment into Azure. Finally, the module explains how to extend an existing Active Directory environment into Azure by placing IaaS VMs configured as domain controllers onto a specially configured Azure virtual network (VNet) subnet. Lessons for module 2 Implement hybrid identity with Windows Server Deploy and manage Azure IaaS Active Directory domain controllers in Azure Lab : Implementing integration between AD DS and Azure AD Preparing Azure AD for AD DS integration Preparing on-premises AD DS for Azure AD integration Downloading, installing, and configuring Azure AD Connect Verifying integration between AD DS and Azure AD Implementing Azure AD integration features in AD DS After completing module 2, students will be able to: Integrate on-premises Active Directory Domain Services (AD DS) environment into Azure. Install and configure directory synchronization using Azure AD Connect. Implement and configure Azure AD DS. Implement Seamless Single Sign-on (SSO). Implement and configure Azure AD DS. Install a new AD DS forest on an Azure VNet. Module 3: Windows Server administration This module describes how to implement the principle of least privilege through Privileged Access Workstation (PAW) and Just Enough Administration (JEA). The module also highlights several common Windows Server administration tools, such as Windows Admin Center, Server Manager, and PowerShell. This module also describes the post-installation confguration process and tools available to use for this process, such as sconfig and Desired State Configuration (DSC). Lessons for module 3 Perform Windows Server secure administration Describe Windows Server administration tools Perform post-installation configuration of Windows Server Just Enough Administration in Windows Server Lab : Managing Windows Server Implementing and using remote server administration After completing module 3, students will be able to: Explain least privilege administrative models. Decide when to use privileged access workstations. Select the most appropriate Windows Server administration tool for a given situation. Apply different methods to perform post-installation configuration of Windows Server. Constrain privileged administrative operations by using Just Enough Administration (JEA). Module 4: Facilitating hybrid management This module covers tools that facilitate managing Windows IaaS VMs remotely. The module also covers how to use Azure Arc with on-premises server instances, how to deploy Azure policies with Azure Arc, and how to use role-based access control (RBAC) to restrict access to Log Analytics data. Lessons for module 4 Administer and manage Windows Server IaaS virtual machines remotely Manage hybrid workloads with Azure Arc Lab : Using Windows Admin Center in hybrid scenarios Provisioning Azure VMs running Windows Server Implementing hybrid connectivity by using the Azure Network Adapter Deploying Windows Admin Center gateway in Azure Verifying functionality of the Windows Admin Center gateway in Azure After completing module 4, students will be able to: Select appropriate tools and techniques to manage Windows IaaS VMs remotely. Explain how to onboard on-premises Windows Server instances in Azure Arc. Connect hybrid machines to Azure from the Azure portal. Use Azure Arc to manage devices. Restrict access using RBAC. Module 5: Hyper-V virtualization in Windows Server This modules describes how to implement and configure Hyper-V VMs and containers. The module covers key features of Hyper-V in Windows Server, describes VM settings, and how to configure VMs in Hyper-V. The module also covers security technologies used with virtualization, such as shielded VMs, Host Guardian Service, admin-trusted and TPM-trusted attestation, and Key Protection Service (KPS). Finally, this module covers how to run containers and container workloads, and how to orchestrate container workloads on Windows Server using Kubernetes. Lessons for module 5 Configure and manage Hyper-V Configure and manage Hyper-V virtual machines Secure Hyper-V workloads Run containers on Windows Server Orchestrate containers on Windows Server using Kubernetes Lab : Implementing and configuring virtualization in Windows Server Creating and configuring VMs Installing and configuring containers After completing module 5, students will be able to: Install and configure Hyper-V on Windows Server. Configure and manage Hyper-V virtual machines. Use Host Guardian Service to protect virtual machines. Create and deploy shielded virtual machines. Configure and manage container workloads. Orchestrate container workloads using a Kubernetes cluster. Module 6: Deploying and configuring Azure VMs This module describes Azure compute and storage in relation to Azure VMs, and how to deploy Azure VMs by using the Azure portal, Azure CLI, or templates. The module also explains how to create new VMs from generalized images and use Azure Image Builder templates to create and manage images in Azure. Finally, this module describes how to deploy Desired State Configuration (DSC) extensions, implement those extensions to remediate noncompliant servers, and use custom script extensions. Lessons for module 6 Plan and deploy Windows Server IaaS virtual machines Customize Windows Server IaaS virtual machine images Automate the configuration of Windows Server IaaS virtual machines Lab : Deploying and configuring Windows Server on Azure VMs Authoring Azure Resource Manager (ARM) templates for Azure VM deployment Modifying ARM templates to include VM extension-based configuration Deploying Azure VMs running Windows Server by using ARM templates Configuring administrative access to Azure VMs running Windows Server Configuring Windows Server security in Azure VMs After completing module 6, students will be able to: Create a VM from the Azure portal and from Azure Cloud Shell. Deploy Azure VMs by using templates. Automate the configuration of Windows Server IaaS VMs. Detect and remediate noncompliant servers. Create new VMs from generalized images. Use Azure Image Builder templates to create and manage images in Azure. Module 7: Network infrastructure services in Windows Server This module describes how to implement core network infrastructure services in Windows Server, such as DHCP and DNS. This module also covers how to implement IP address managment and how to use Remote Access Services. Lessons for module 7 Deploy and manage DHCP Implement Windows Server DNS Implement IP address management Implement remote access Lab : Implementing and configuring network infrastructure services in Windows Server Deploying and configuring DHCP Deploying and configuring DNS After completing module 7, students will be able to: Implement automatic IP configuration with DHCP in Windows Server. Deploy and configure name resolution with Windows Server DNS. Implement IPAM to manage an organization’s DHCP and DNS servers, and IP address space. Select, use, and manage remote access components. Implement Web Application Proxy (WAP) as a reverse proxy for internal web applications. Module 8: Implementing hybrid networking infrastructure This module describes how to connect an on-premises environment to Azure and how to configure DNS for Windows Server IaaS virtual machines. The module covers how to choose the appropriate DNS solution for your organization’s needs, and run a DNS server in a Windows Server Azure IaaS VM. Finally, this module covers how to manage manage Microsoft Azure virtual networks (VNets) and IP address configuration for Windows Server infrastructure as a service (IaaS) virtual machines. Lessons for module 8 Implement hybrid network infrastructure Implement DNS for Windows Server IaaS VMs Implement Windows Server IaaS VM IP addressing and routing Lab : Implementing Windows Server IaaS VM networking Implementing virtual network routing in Azure Implementing DNS name resolution in Azure After completing module 8, students will be able to: Implement an Azure virtual private network (VPN). Configure DNS for Windows Server IaaS VMs. Run a DNS server in a Windows Server Azure IaaS VM. Create a route-based VPN gateway using the Azure portal. Implement Azure ExpressRoute. Implement an Azure wide area network (WAN). Manage Microsoft Azure virtual networks (VNets). Manage IP address configuration for Windows Server IaaS virtual machines (VMs). Module 9: File servers and storage management in Windows Server This module covers the core functionality and use cases of file server and storage management technologies in Windows Server. The module discusses how to configure and manage the Windows File Server role, and how to use Storage Spaces and Storage Spaces Direct. This module also covers replication of volumes between servers or clusters using Storage Replica. Lessons for module 9 Manage Windows Server file servers Implement Storage Spaces and Storage Spaces Direct Implement Windows Server Data Deduplication Implement Windows Server iSCSI Implement Windows Server Storage Replica Lab : Implementing storage solutions in Windows Server Implementing Data Deduplication Configuring iSCSI storage Configuring redundant Storage Spaces Implementing Storage Spaces Direct After completing module 9, students will be able to: Configure and manage the Windows Server File Server role. Protect data from drive failures using Storage Spaces. Increase scalability and performance of storage management using Storage Spaces Direct. Optimize disk utilization using Data DeDuplication. Configure high availability for iSCSI. Enable replication of volumes between clusters using Storage Replica. Use Storage Replica to provide resiliency for data hosted on Windows Servers volumes. Module 10: Implementing a hybrid file server infrastructure This module introduces Azure file services and how to configure connectivity to Azure Files. The module also covers how to deploy and implement Azure File Sync to cache Azure file shares on an on-premises Windows Server file server. This module also describes how to manage cloud tiering and how to migrate from DFSR to Azure File Sync. Lessons for module 10 Overview of Azure file services Implementing Azure File Sync Lab : Implementing Azure File Sync Implementing DFS Replication in your on-premises environment Creating and configuring a sync group Replacing DFS Replication with File Sync–based replication Verifying replication and enabling cloud tiering Troubleshooting replication issues After completing module 10, students will be able to: Configure Azure file services. Configure connectivity to Azure file services. Implement Azure File Sync. Deploy Azure File Sync Manage cloud tiering. Migrate from DFSR to Azure File Sync.   [-]
Les mer
Webinar 2 timer 1 690 kr
På webinaret vil vi vise deg hvordan du kan lage nettbaserte spørreundersøkelse og tester ved hjelp av Microsoft Forms. [+]
På webinaret vil vi vise deg hvordan du kan lage nettbaserte spørreundersøkelse, tester og påmeldingsskjemaer ved hjelp av Microsoft Forms. Microsoft Forms er en enkel og elegant app i Microsoft 365 familien for opprettelse av undersøkelser og tester. Du kan lage skjema med flere språk i samme skjema. Du kan ha forgreninger til ulike svarretninger alt etter hva som velges som svar. Det er mange ulike spørsmålsalternativer å velge mellom. Svarene kan være anonyme om ønskelig. Du kan også sette inn undersøkelser (poll) i et Teams-møte eller som en del av en presentasjon i PowerPoint. Resultatene behandler og analyserer du enkelt i Excel. Hva er Forms | Forskjell undersøkelser og tester | Personlige skjema vs gruppeskjema | Opprette skjema | Spørsmålstyper | Forgreninger | Innstillinger | Flere språk i samme skjema | Simulere skjema | Delingsmåter (samle inn svar) | Samarbeide om samme skjema eller duplisere skjema (gi kopi til andre) | Resultater og analyser | Forms og Teams | Forms og PowerPoint Pris: 1690 kroner [-]
Les mer
Bedriftsintern 3 dager 27 000 kr
In this course, application developers learn how to design, develop, and deploy applications that seamlessly integrate components from the Google Cloud ecosystem. [+]
Through a combination of presentations, demos, and hands-on labs, participants learn how to use GCP services and pre-trained machine learning APIs to build secure, scalable, and intelligent cloud-native applications. Objectives This course teaches participants the following skills: Use best practices for application development Choose the appropriate data storage option for application data Implement federated identity management Develop loosely coupled application components or microservices Integrate application components and data sources Debug, trace, and monitor applications Perform repeatable deployments with containers and deployment services Choose the appropriate application runtime environment; use Google Container Engine as a runtime environment and later switch to a no-ops solution with Google App Engine Flex All courses will be delivered in partnership with ROI Training, Google Cloud Premier Partner, using a Google Authorized Trainer. Course Outline Module 1: Best Practices for Application Development -Code and environment management-Design and development of secure, scalable, reliable, loosely coupled application components and microservices-Continuous integration and delivery-Re-architecting applications for the cloud Module 2: Google Cloud Client Libraries, Google Cloud SDK, and Google Firebase SDK -How to set up and use Google Cloud Client Libraries, Google Cloud SDK, and Google Firebase SDK-Lab: Set up Google Client Libraries, Google Cloud SDK, and Firebase SDK on a Linux instance and set up application credentials Module 3: Overview of Data Storage Options -Overview of options to store application data-Use cases for Google Cloud Storage, Google Cloud Datastore, Cloud Bigtable, Google Cloud SQL, and Cloud Spanner Module 4: Best Practices for Using Cloud Datastore -Best practices related to the following:-Queries-Built-in and composite indexes-Inserting and deleting data (batch operations)-Transactions-Error handling-Bulk-loading data into Cloud Datastore by using Google Cloud Dataflow-Lab: Store application data in Cloud Datastore Module 5: Performing Operations on Buckets and Objects -Operations that can be performed on buckets and objects-Consistency model-Error handling Module 6: Best Practices for Using Cloud Storage -Naming buckets for static websites and other uses-Naming objects (from an access distribution perspective)-Performance considerations-Setting up and debugging a CORS configuration on a bucket-Lab: Store files in Cloud Storage Module 7: Handling Authentication and Authorization -Cloud Identity and Access Management (IAM) roles and service accounts-User authentication by using Firebase Authentication-User authentication and authorization by using Cloud Identity-Aware Proxy-Lab: Authenticate users by using Firebase Authentication Module 8: Using Google Cloud Pub/Sub to Integrate Components of Your Application -Topics, publishers, and subscribers-Pull and push subscriptions-Use cases for Cloud Pub/Sub-Lab: Develop a backend service to process messages in a message queue Module 9: Adding Intelligence to Your Application -Overview of pre-trained machine learning APIs such as Cloud Vision API and Cloud Natural Language Processing API Module 10: Using Cloud Functions for Event-Driven Processing -Key concepts such as triggers, background functions, HTTP functions-Use cases-Developing and deploying functions-Logging, error reporting, and monitoring Module 11: Managing APIs with Google Cloud Endpoints -Open API deployment configuration-Lab: Deploy an API for your application Module 12: Deploying an Application by Using Google Cloud Build, Google Cloud Container Registry, and Google Cloud Deployment Manager -Creating and storing container images-Repeatable deployments with deployment configuration and templates-Lab: Use Deployment Manager to deploy a web application into Google App Engine flexible environment test and production environments Module 13: Execution Environments for Your Application -Considerations for choosing an execution environment for your application or service:-Google Compute Engine-Kubernetes Engine-App Engine flexible environment-Cloud Functions-Cloud Dataflow-Lab: Deploying your application on App Engine flexible environment Module 14: Debugging, Monitoring, and Tuning Performance by Using Google Stackdriver -Stackdriver Debugger-Stackdriver Error Reporting-Lab: Debugging an application error by using Stackdriver Debugger and Error Reporting-Stackdriver Logging-Key concepts related to Stackdriver Trace and Stackdriver Monitoring.-Lab: Use Stackdriver Monitoring and Stackdriver Trace to trace a request across services, observe, and optimize performance [-]
Les mer
2 dager 7 900 kr
Etter fullført kurs skal du kunne tegne illustrasjoner og logoer, klargjøre illustrasjoner for utkjøring og ha oversikt over programmets bruksområder. [+]
Vil du lære å tegne illustrasjoner og logoer til bruk i alle medier? Illustrator tegner vektorgrafikk som kan forstørres ubegrenset, uten å tape kvalitet og kan derfor brukes overalt. Adobe Illustrator er verktøyet for illustratører og grafiske designere, men også et program for deg som vil lage litt enklere illustrasjoner til internett, Power Point og Word. På kurset lærer du å ta utgangspunkt i enkle basisformer og kombinere dem til kompliserte figurer, slik at det blir det lett for alle å tegne. Hvorfor ta dette kurset: Du får en grundig innføring i programmet Du vil lære konkrete tegne- og designoppgaver Du vil lære å redigere/endre Illustrator-filer du mottar Du vil lære å lage illustrasjoner og logoer Du vil lære å lage grafikk for bruk på internett, lesebrett eller mobil Du vil lære effektive arbeidsmetoder Du får kontroll på tegninger med mange elementer og lag Du vil lære om fargebruk og klargjøring av filer for trykk og nett Dette lærer du: Arbeidsmiljøet i programmet Tegning med tegneverktøyene og ved å kombinere enkle grunnformer Redigering og transformering av objekter Innsetting av tekst og bilder Tekstbearbeiding Lage bannerannonser Bruk av farger og forløpninger Lag og gjennomsiktighet [-]
Les mer
Oslo Bergen Og 1 annet sted 2 dager 16 900 kr
06 Jun
13 Jun
20 Jun
Modern Service Oriented Architecture [+]
Modern Service Oriented Architecture [-]
Les mer
Oslo 2 dager 16 900 kr
10 Oct
10 Oct
Lean IT Foundation [+]
Lean IT Foundation [-]
Les mer
Virtuelt eller personlig Bærum 2 dager 9 900 kr
Når formgivningen krever litt mer. Kurset henvender seg til industrielle designere og andre som arbeider med produktdesign eller annen kompleks formgivning. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon. Fusion 360 Her er et utvalg av temaene du vil lære på kurset: Fusion 360 Dashboard - Data og prosjekthåndtering Formgivning - konseptuelt design og parametrisk Samlinger og 2D-tegninger, inkludert stykklister  Dataimport - håndtering av data fra andre CAD-plattformer Kurset for deg som er industriell designer, arbeider med produktdesign eller annen kompleks forgivning. Kurset har fokus på oppbygning av modeller med kompliserte overflater. Du vil få kunnskap til å skape og korrigere avanserte og komplekse 3D-modeller, og samtidig lage avanserte 3D-modeller på bakgrunn av konseptuelle skisser, vedlikeholde og dokumentere dem i forskjellige varianter.    Dette er et populært kurs, meld deg på nå! Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Oslo Trondheim Og 1 annet sted 5 dager 27 500 kr
27 May
27 May
27 May
MD-102 : Microsoft 365 Endpoint Administrator [+]
MD-102 : Microsoft 365 Endpoint Administrator [-]
Les mer
Oslo Bergen Og 1 annet sted 1 dag 9 500 kr
13 May
14 May
31 May
AZ-900: Microsoft Azure Fundamentals [+]
AZ-900: Microsoft Azure Fundamentals [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
The Implementing and Operating Cisco Enterprise Network Core Technologies course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterpri... [+]
COURSE OVERVIEW  Learn how to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. The automation and programmability of Enterprise networks is also incorporated in this course. This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 CE credits toward recertification   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 3 days of self study. The self-study content will be provided as part of the digital courseware that you receive at the beginning of the course and should be part of your preparation for the exam. Additional lab access will be provided at the end of the class, this will be valid for 60 hours or 90 days whichever is the shorter. It will be possible to complete all but 7 of the labs after the class. TARGET AUDIENCE Network engineers involved in the installation, support and troubleshooting of enterprise networks. COURSE OBJECTIVES After completing this course you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using EtherChannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Centre™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Centre and vManage COURSE CONTENT Examining Cisco Enterprise Network Architecture Cisco Enterprise Architecture Model Campus LAN Design Fundamentals Traditional Multilayer Campus Layer Design Campus Distribution Layer Design   Understanding Cisco Switching Paths Layer 2 Switch Operation Control and Data Plane Cisco Switching Mechanisms Implementing Campus LAN Connectivity Revisiting VLANs Trunking with 802.1Q Inter-VLAN Routing Building Redundant Switched Topology Spanning-Tree Protocol Overview Spanning-Tree Protocol Operation Spanning-Tree Protocols Types and Features Multiple Spanning Tree Protocol PortFast and BPDU Implementing Layer 2 Port Aggregation (Self-Study) Need for EtherChannel EtherChannel Mode Interactions Layer 2 EtherChannel Configuration Guidelines EtherChannel Load-Balancing Options Troubleshoot EtherChannel Issues Understanding EIGRP EIGRP Features EIGRP Reliable Transport Establishing EIGRP Neighbour Adjacency EIGRP Metrics EIGRP Path Selection Explore EIGRP Path Selection Explore EIGRP Load Balancing and Sharing EIGRP for IPv6 Compare EIGRP and OSPF Routing Protocols Implementing OSPF Describe OSPF The OSPF Process OSPF Neighbour Adjacencies Building a Link-State Database OSPF LSA Types Compare Single-Area and Multi-Area OSPF OSPF Area Structure OSPF Network Types Optimizing OSPF OSPF Cost OSPF Route Summarization Benefits OSPF Route Filtering Tools Compare OSPFv2 and OSPFv3 Exploring EBGP Interdomain Routing with BGP BGP Operations Types of BGP Neighbour Relationships BGP Path Selection BGP Path Attributes Implementing Network Redundancy Need for Default Gateway Redundancy Define FHRP HSRP Advanced Features Cisco Switch High Availability Features Implementing NAT Define Network Address Translation NAT Address Types Explore NAT Implementations NAT Virtual Interface Introducing Virtualisation Protocols and Techniques Server Virtualisation Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Introducing Virtualisation Protocols and Techniques Server Virualization Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Understanding Virtual Private Networks and Interfaces Site-to-Site VPN Technologies IPSec VPN Overview IPSec: IKE IPsec Modes IPsec VPN Types Cisco IOS VTI Understanding Wireless Principles Explain RF Principles Describe Watts and Decibels Describe Antenna Characteristics Describe IEEE Wireless Standards Identify Wireless Component Roles Examining Wireless Deployment Options Wireless Deployment Overview Describe Autonomous AP Deployment Describe Centralized Cisco WLC Deployment Describe FlexConnect Deployment Cloud Deployment and Its Effect on Enterprise Networks Describe the Cloud-Managed Meraki Solution Cisco Catalyst 9800 Series Controller Deployment Options Describe Cisco Mobility Express Understanding Wireless Roaming and Location Services Wireless Roaming Overview Mobility Groups and Domains Wireless Roaming Types Describe Location Services Examining Wireless AP Operation Universal AP Priming Explore the Controller Discovery Process Describe AP Failover Explain High Availability Explore AP Modes Understanding Wireless Client Authentication Authentication Methods Pre-Shared Key (PSK) Authentication 802.1X User Authentication Overview PKI and 802.1X Certificate Based Authentication Introduction to Extensible Authentication Protocol EAP-Transport Layer Security (EAP-TLS) Protected Extensible Authentication Protocol EAP-FAST Guest Access with Web Auth Troubleshooting Wireless Client Connectivity Wireless Troubleshooting Tools Overview Spectrum Analysis Wi-Fi Scanning Packet Analysis Cisco AireOS GUI and CLI Tools Cisco Wireless Config Analyzer Express Common Wireless Client Connectivity Issues Overview Client to AP Connectivity WLAN Configuration Infrastructure Configuration Introducing Multicast Protocols (Self-study) Multicast Overview Internet Group Management Protocol Multicast Distribution Trees IP Multicasting Routing Rendezvous Point Introducing QoS (Self-study) Understand the Impact of User Applications on the Network Need for Quality of Service (QoS) Describe QoS Mechanisms Define and Interpret a QoS Policy Implementing Network Services Understanding Network Time Protocol Logging Services Simple Network Management Protocol Introducing NetFlow Flexible NetFlow Understanding Cisco IOS Embedded Event Manager Using Network Analysis Tools Troubleshooting Concepts Network Troubleshooting Procedures: Overview Network Troubleshooting Procedures: Case Study Basic Hardware Diagnostics Filtered Show Commands Cisco IOS IP SLAs Switched Port Analyzer(SPAN) Overview Remote SPAN (RSPAN) Encapsulated Remote Switched Port Analyzer(ERSAPN) Cisco Packet Capture Tools Overview Implementing Infrastructure Security ACL Overview ACL Wildcard Masking Types of ACLs Configure Numbered Access Lists Use ACLs to Filter Network Traffic Apply ACLs to Interfaces Configured Named Access Lists Control Plane Overview Control Plane Policing Implementing Secure Access Control Securing Device Access AAA Framework Overview Benefits of AAA Usage Authentication Options RADIUS and TACACS+ Enabling AAA and Configuring a Local User for Fallback Configuring RADIUS for Console and VTY Access Configuring TACACS+ for Console and VTY Access Configure Authorization and Accounting Understanding Enterprise Network Security Architecture (Self-study) Explore Threatscape Cisco Intrusion Prevention Systems Virtual Private Networks Content Security Logging Endpoint Security Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Firewall Concepts TrustSec MACsec Identity Management 802.1X for Wired and Wireless Endpoint Authentication MAC Authentication Bypass Web Authentication Exploring Automation and Assurance Using Cisco DNA Centre (Self-study) Need for Digital Transformation Cisco Digital Network Architecture Cisco Intent-Based Networking Cisco DNA Centre Automation Overview Cisco DNA Centre Platform Overview Cisco DNA Centre Design Cisco DNA Centre Inventory Overview Cisco DNA Centre Configuration and Management Overview Onboarding of Network Devices Using Cisco DNA Centre Cisco DNA Centre Software Image Management Overview Cisco DNA Assurance Key Features and Use Cases Cisco DNA Centre Assurance Implementation Workflow Examining the Cisco SD-Access Solution (Self-study) Need for Cisco SD-Access Cisco SD Access Overview Cisco SD-Access Fabric Components Cisco SD-Access Fabric Control Plane Based on LISP Cisco SD-Access Fabric Control Plane Based on VXLAN Cisco SD-Access Fabric Control Plane Based on Cisco TrustSec Role of Cisco ISE and Cisco DNA Centre in SD-Access Cisco SD-Access Wireless Integration Traditional Campus Interoperating with Cisco SD-Access Understanding the Working Principles of the Cisco SD-WAN Solution (Self-study) Need for Software Defined Networking for WAN Cisco SD-WAN Components and Functions Cisco SD-WAN Orchestration Plane Cisco SD-WAN Management Plane- vManage Cisco SD-WAN Control Plane - vSmart Cisco SD-WAN Data Plane - WAN Edge Cisco SD-WAN Programmatic APIs Cisco SD-WAN Automation and Analytics Cisco SD-WAN Terminology Cisco IOS XE and IOS XE SD-WAN Software Flexible Controller Deployment Options Cisco SD-WAN Security Understanding the Basics of Python Programming Describe Python Concepts String Data Types Numbers Data Types Boolean Data Types Script Writing and Execution Analyse Code Introducing Network Programmability Protocols Configuration Management Evolution of Device Management and Programmability Data Encoding Formats Understanding JSON Model Driven Programmability Stack Introduction to YANG Types of YANG Models Understanding NETCONF Explain NETCONF and YANG REST Understanding RESTCONF Protocol Introducing APIs in Cisco DNA Centre and vManage (Self-study) Application Programming Interfaces REST API Response Codes and Results REST API Security Cisco DNA Centre APIs Cisco SD-WAN REST API Overview Labs Lab 1: Investigate the CAM Lab 2: Analyse Cisco Express Forwarding Lab 3: Troubleshoot VLAN and Trunk Issues Lab 4: Tuning STP and Configuring RSTP Lab 5: Configure Multiple Spanning Tree Protocol Lab 6: Troubleshoot EtherChannel Lab 7: Implementing Multiarea OSPF Lab 8: Implement OSPF Tuning Lab 9: Apply OSPF Optimization Lab 10: Implement OSPFv3 Lab 11: Configure and Verify Single-Homed EBGP Lab 12: Implementing HSRP Lab 13: Configure VRRP Lab 14: Implement NAT Lab 15: Configure and Verify VRF Lab 16: Configure and Verify a GRE Tunnel Lab 17: Configure Static VTI Point-to-Point Tunnels Lab 18: Configure Wireless Client Authentication in a Centralized Deployment (No Extended Access) Lab 19: Troubleshoot Wireless Client Connectivity Issues (No Extended Access) Lab 20: Configure Syslog Lab 21: Configure and Verify Flexible NetFlow Lab 22: Configuring Cisco IOS Embedded Event Manager (EEM) Lab 23: Troubleshoot Connectivity and Analyse Traffic with Ping, Traceroute and Debug Lab 24: Configure and Verify Cisco IP SLA's Lab 25: Configure Standard and Extended ACLs Lab 26: Configure Control Plane Policing Lab 27: Implement Local and Server-Based AAA (No Extended Access) Lab 28: Writing and Troubleshooting Python Scripts (No Extended Access) Lab 29: Explore JSON Objects and Scripts in Python (No Extended Access) Lab 30: Use NETCONF via SSH (No Extended Access) Lab 31: Use RESTCONF with Cisco IOS XE Software (No Extended Access) [-]
Les mer
Oslo 5 dager 35 000 kr
10 Jun
10 Jun
16 Sep
CEH: Certified Ethical Hacker v12 [+]
CEH: Certified Ethical Hacker v12 [-]
Les mer
Nettkurs 4 timer 349 kr
SketchUp er et gratis 3D-modelleringsverktøy hvor du kan tegne i et to- eller tredimensjonalt perspektiv. Verktøyet brukes av arkitekter, ingeniører, snekkere, kunstnere ... [+]
Oppdag den intuitive og robuste verdenen av 3D-modellering med "SketchUp: Komplett", et omfattende kurs ledet av Espen Faugstad hos Utdannet.no. SketchUp, populært blant arkitekter, ingeniører, snekkere og kreative fagfolk, er et gratis verktøy som lar deg designe i både to- og tredimensjonalt perspektiv. Dette kurset er designet for alle som ønsker å lære å bruke SketchUp effektivt, uavhengig av tidligere erfaring. Kurset vil guide deg gjennom SketchUps grunnleggende, inkludert oppsett, verktøy og paneler, og hvordan du skaper to- og tredimensjonale figurer. Du vil lære å kontrollere kameraet, anvende ulike visningsstiler og manipulere objekter med en rekke verktøy. Videre dekkes tegning av figurer, måling og merking av modeller, organisering av prosjekter, samt arbeid med komponenter, materialer og teksturer. Med dette kurset vil du utvikle ferdigheter for å lage detaljerte og nøyaktige 3D-modeller og bli i stand til å presentere dine design på en overbevisende måte. Ved kursets slutt vil du ha en solid forståelse av SketchUp, noe som gjør deg i stand til å bruke programmet for en rekke prosjekter, fra enkle skisser til komplekse arkitektoniske design.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Kamera Kapittel 3: Visning Kapittel 4: Manipulere Kapittel 5: Tegne Kapittel 6: Måle og merke Kapittel 7: Organisere Kapittel 8: Komponenter Kapittel 9: Material og tekstur Kapittel 10: Presentasjon Kapittel 11: Avslutning   Varighet: 3 timer og 4 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Majorstuen 1 dag 7 600 kr
Med Power Automate kan du automatisere forretningsprosesser og handlinger på tvers av organisasjonen, med lite eller ingen koding. Ta farvel med kjedelige, repetitive opp... [+]
Med Power Automate kan du automatisere forretningsprosesser og handlinger på tvers av organisasjonen, med lite eller ingen koding. Ta farvel med kjedelige, repetitive oppgaver og effektiviser hverdagen. Ikke minst er Power Automate ofte en del av Microsoft 365 lisensen du kanskje allerede har. Power Automate er Microsoft sin løsning for automatisering av prosesser, og er en tjeneste som lar deg utvikle flyter på tvers av en rekke applikasjoner og tjenester med lite eller ingen koding. Du kan selvfølgelig få tjenestene i Microsoft 365 til å snakke sammen slik du vil, men det finnes også flere hundre koblinger til andre eksterne tjenester. I tillegg har du naturligvis mulighet til å benytte generelle tilkoblinger, for å hente data fra egne APIer, databaser og tjenester. Power Automate gir muligheter til brukere på tvers av organisasjonen som tidligere i stor grad har vært forbeholdt utviklere.  I løpet av kurset vil deltagere få en hands-on opplevelse av hva Power Automate er, hva det kan brukes til, og hvordan en kan jobbe med det. Kursholderen vil gjøre deltakerne godt kjent med terminologien, demonstrere løsninger og utfordre med øvelser.  Dette er et introduksjonskurs, så det er naturligvis mye vi ikke vil rekke å gå gjennom. Kursleder vil peke deltagerne til gode kilder for videre læring. Det er også mulig å be om bedriftsinterne kurs på videregående nivå, der man kan spesifisere ønsket fokus og spesifikke behov. Disse kan også kjøres som workshops.   TA MED EGEN PC   Kursinnhold Power Automate - det store bildet Ulike flyttyper Bli kjent med arbeidsflaten Datakilder og koblinger Beste praksis for navngivning, utvikling, dokumentering m.m. Bruksområder og viktige begrensninger   [-]
Les mer