IT-kurs
Buskerud
Du har valgt: Modum
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Modum ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of the Service Level Management Practice, elucidating its significance in defining, negotiating, and managing service levels to meet customer expectations. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Relationship Management, Supplier Management, Service Level Management, Continual Improvement and Info... [+]
Understand the key concepts of Relationship Management, Supplier Management, Service Level Management, Continual Improvement, and Information Security Management, elucidating their significance in fostering collaboration, ensuring service quality, driving continual improvement, and maintaining information security. This eLearning is: Interactive Self-paced   Device-friendly   12 hours content   Mobile-optimised   Practical exercises   Exam: 60 questions Multiple choise 90 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn how to move new or changed hardware, software, documentation, processes, or any other component to live environments, and how to deploy components to other environm... [+]
Understand the purpose and key concepts of Deployment Management, highlighting its importance in managing the deployment of new or changed services into the live environment. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours of content   Mobile-optimised   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Oslo Bergen 3 dager 20 900 kr
10 Sep
10 Sep
22 Sep
Implementing REST Services using Web API [+]
Implementing REST Services using Web API [-]
Les mer
Nettstudie 11 800 kr
Med utgangspunkt i automasjon i bygg lærere du I denne utdanningen lærer du om grunnleggende programmering i HTML, Python, og JavaScript, mobilapp-utvikling, samt prosjek... [+]
Koding automasjon i bygg Denne fagskole utdanningens innhold tilsvarer 5 studiepoeng og utdanning er på nettet.  Maksimalt antall studieplasser er 25. Utdanningen er praktisk tilrettelagt, slik at du kan anvende teori og kunnskap i praksis. Du vil få mulighet til å jobbe med reelle og aktuelle problemstillinger, og du vil få tilbakemelding fra erfarne fagfolk. Læremateriellet består av video, podkaster, resyme av fagstoff, artikler, forskningsrapporter, foredrag, presentasjon av fagstoff, samt quizer og annet. Læremateriellet du får tilgang til er på en LMS som er under kontinuerlig utvikling og oppdatering. Du får ett års tilgang til læremateriell, etter at utdanningen er ferdig, på Learning Management System (LMS) I denne utdanningen lærer du om: Installere Python på egen PC (Spyder): Veiledning for hvordan du installerer Python og Spyder IDE for å utvikle Python-programmer. Introduksjon til programmering i: HTML: Grunnleggende om HTML-strukturer og webutvikling. Python: Introduksjon til grunnleggende programmeringskonsepter, inkludert: Variabler og Datatyper: Opprettelse og bruk av variabler med ulike datatyper som heltall (integers), desimaltall (floats), strenger (strings), lister (lists), tupler (tuples), og dictionaries (dictionaries). Operatorer: Bruk av matematiske, sammenlignings-, og logiske operatorer for beregninger og verdikomparasjoner. Løkker: Implementering av kontrollstrukturer som if-setninger, for- og while-løkker, samt avvikshantering med try og except for å styre programflyten. Funksjoner: Definisjon og anvendelse av funksjoner for å organisere koden i moduler og forbedre lesbarheten og vedlikeholdbarheten. Input og Output: Håndtering av datainnlesning fra bruker og datavisning til skjermen. Moduler og Biblioteker: Utforsking av innebygde og tredjepartsmoduler for å utvide programmets funksjonalitet. Filstyring: Åpning, lesing, skriving, og lukking av filer. Strukturering av kode: Organisering av kode ved hjelp av funksjoner, klasser, og moduler for bedre lesbarhet og vedlikehold. JavaScript: Grunnleggende programmeringskonsepter for å utvikle interaktive webapplikasjoner. Programmere App til mobil telefon: Introduksjon til å kunne programmere Android-apps. Fra sensor til web: Utvikling av programmer fra grunnen av, fra å programmere Arduino UNO som en Modbus RTU slave til å utvikle en Modbus RTU master i Python. Konfigurasjon av egen PC som webserver (IIS) for å støtte webapplikasjoner. Integrert prosjektarbeid som involverer programmering fra sensor til web, som kombinerer hardware og software for å samle, behandle, og presentere data. Inkluderer API-er (Application Programming Interfaces) og tekniske beskrivelser. Du velger selv prosjektoppgave: Oppgaven kan for eksempel innebære å innhente data via API fra https://www.yr.no/ eller en annen nettressurs. Ved å anvende Modbus for I/O på Arduino, er det mulig å utvikle et system som både overvåker og regulerer energiforbruket ditt. Brukergrensesnittet kan være basert på web, og konfigureres på din egen datamaskin. Denne utdanningen danner et solid fundament for videre læring og anvendelse av disse konseptene i automasjon i bygg. Bedriftsinterne utdanning tilpasset din bedrift Denne utdanningen kan tilbys som en bedriftsintern utdanning. Det faglige innholdet er fastsatt, men den faglige tilnærmingen kan tilpasses den enkelte bedrifts behov og ønsker. Ta kontakt for en prat, så kan vi sammen lage et utdanningsløp som passer for deg og din bedrift. Kontaktpersoner er Hans Gunnar Hansen (tlf. 91101824) og Vidar Luth-Hanssen (tlf. 91373153) [-]
Les mer
Bedriftsintern 1 dag 7 500 kr
Data science og maskinlæring er blitt en viktig drivkraft bak mange forretnings beslutninger. Men fortsatt er mange usikre på hva begrepene innebærer og hvilke muligheter... [+]
Dette kurset tilbys som bedriftsinternt kurs   Maskinlæring handler om sette datamaskiner i stand til å lære fra og utvikle atferd basert på data. Det vil si at en datamaskin kan løse en oppgave den ikke er eksplisitt programmert for å håndtere. I stedet er den i stand til å automatisk lære gjenkjenning av komplekse mønstre i data og gjøre beslutninger basert på dette disse. Maskinlæring gir store muligheter, men mange bedrifter har problemer med å ta teknologien i bruk. Nøyaktig hvilke oppgaver kan maskinlæring utføre, og hvordan kommer man i gang? Dette kurset gir oversikt over mulighetene som ligger i maskinlæring, og hvordan i tillegg til kunnskap om hvordan teknologien kan løse oppgaver og skape resultater i praksis. Hva er maskinlæring, datavitenskap og kunstig intelligens og hvordan det er relatert til statistikk og dataanalyse? Hvordan å utvinne kunnskap fra dataene dine? Hva betyr Big data og hvordan analyseres det? Hvor og hvordan skal du bruke maskinlæring til dine daglige forretningsproblemer? Hvordan bruke datamønstre til å ta avgjørelser og spådommer med eksempler fra den virkelige verden? Hvilke typer forretningsproblemer kan en maskinen lære å håndtere Muligheter som maskinlæring gir din bedrift Hva er de teoretiske aspekter på metoder innen maskinlæring? Hvilke ML-metoder som er relevante for ulike problemstillinger innen dataanalyse? Hvordan evaluere styrker og svakheter mellom disse algoritmene og velge den beste? Anvendt data science og konkrete kunde eksempler i praksis   Målsetning Kurset gir kunnskap om hvordan maskinlæring kan løse et bestemt problem og hvilke metoder som egner seg i en gitt situasjon. Du blir i stand til å kan skaffe deg innsikt i data, og vil kunne identifisere egenskapene som representerer dem best. Du kjenner de viktigste maskinlæringsalgoritmene og hvilke metoder som evaluerer ytelsen deres best. Dette gir grunnlag for kontinuerlig forbedring av løsninger basert på maskinlæring.   [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
Oslo Trondheim Og 1 annet sted 2 dager 20 900 kr
18 Aug
25 Aug
25 Aug
TOGAF® EA Training Foundation [+]
TOGAF® EA Training Foundation [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration: Microsoft 365 tenant and service management, Office 365 management, and Microsoft 36... [+]
COURSE OVERVIEW  In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management. This begins with an overview of Office 365 product functionality, including Exchange Online, SharePoint Online, Microsoft Teams, additional product resources, and device management. You will then transition to configuring Office 365, with a primary focus on configuring Office client connectivity to Office 365. Finally, you will examine how to manage Office 365 ProPlus deployments, from user-driven client installations to centralized Office 365 ProPlus deployments. You will wrap up this section by learning how to configure Office Telemetry and Microsoft Analytics. The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multi-factor authentication and self-service password management. This section wraps up with a comprehensive look at implementing application and external access. You will learn how to add and manage applications in Azure Active Directory, including how to configure multi-tenant applications. You will then examine how to configure Azure AD Application Proxy, including how to install and register a connector and how to publish an on-premises app for remote access. Finally, you will examine how to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths. COURSE OBJECTIVES Designing, configuring, and managing your Microsoft 365 tenant Office 365 product functionality Configuring Office 365 Managing Office 365 ProPlus deployments Planning and implementing identity synchronization Implementing application and external access COURSE CONTENT Module 1: Designing Your Microsoft 365 Tenant Planning Microsoft 365 in your On-premises Infrastructure Planning Your Identity and Authentication Solution Planning Your Service Setup Planning Your Hybrid Enviroment Planning Your Migration to Office 365 Module 2: Configuring Your Microsoft 365 Tenant Planning  Your Microsoft 365 Experience Configuring  Your Microsoft 365 Experience Managing User Accounts and Licenses in Microsoft 365 Managing Security Groups in Microsoft 365 Implementing Your Domain Services Leveraging FastTrack and Partner Services Module 3: Lab 1 - Configuring your Microsoft 365 Tenant Exercise 1 - Set up a Microsoft 365 Trial Tenant Module 4: Managing Your Microsoft 365 Tenant Configuring Tenant Roles Managing Tenant Health and Services Module 5: Lab 2 - Managing your Microsoft 365 Tenant Exercise 1 - Manage Administration Delegation Exercise 2 - Configure Office 365 Message Encryption (OME) Exercise 3 - Monitor and Troubleshoot Office 365 Module 6: Office 365 Overview Exchange Online Overview SharePoint Online Overview Teams Overview Additional Resources Overview Device Management Overview Module 7: Lab 3 - Office 365 Overview Exercise 1 - Exchange Online Overview Exercise 2 - SharePoint Online Overview Exercise 3 - Teams Overview Module 8: Configuring  Office 365 Office 365 Client Overview Configuring Office Client Connectivity to Office 365 Module 9: Managing Office 365 ProPlus Deployments Managing User-Driven Client Installations Managing Centralized Office 365 ProPlus Deployments Configuring Office Telemetry Configuring Microsoft Analytics Module 10: Lab 4 - Managing Office 365 ProPlus installations Exercise 1 - Prepare an Office 365 ProPlus Managed Installation Exercise 2 - Manage a Centralized Office 365 ProPlus Installation Exercise 3 - Deploy and Configure Office Telemetry Components Module 11: Planning and Implementing Identity Synchronization Introduction to Identity Synchronization Planning for Azure AD Connect Implementing Azure AD Connect Managing Synchronized Identities Password Management in Microsoft 365 Module 12: Lab 5 - Implementing Identity Synchronization Exercise 1 - Set up your organization for identity synchronization Exercise 2 - Implement Identity Synchronization Module 13: Implementing Application and External Access Implementing Applications in Azure AD Configuring Azure AD App Proxy Designing Solutions for External Access TEST CERTIFICATION This course helps you to prepare for exam MS100. But as this is part of an expert certification you should already own one of the Microsoft 365 Associate certifications:  Modern Desktop Teamwork Administrator Security Administrator Messaging Administrator. [-]
Les mer
4 dager 25 000 kr
AI-102 Designing and Implementing an Azure AI Solution is intended for software developers wanting to build AI infused applications that leverage Azure Cognitive Services... [+]
TARGET AUDIENCE Software engineers concerned with building, managing and deploying AI solutions that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework. They are familiar with C#, Python, or JavaScript and have knowledge on using REST-based APIs to build computer vision, language analysis, knowledge mining, intelligent search, and conversational AI solutions on Azure. COURSE OBJECTIVES After completing this course you should be able to: Describe considerations for creating AI-enabled applications Identify Azure services for AI application development Provision and consume cognitive services in Azure Manage cognitive services security Monitor cognitive services Use a cognitive services container Use the Text Analytics cognitive service to analyze text Use the Translator cognitive service to translate text Use the Speech cognitive service to recognize and synthesize speech Use the Speech cognitive service to translate speech Create a Language Understanding app Create a client application for Language Understanding Integrate Language Understanding and Speech Use QnA Maker to create a knowledge base Use a QnA knowledge base in an app or bot Use the Bot Framework SDK to create a bot Use the Bot Framework Composer to create a bot Use the Computer Vision service to analyze images Use Video Indexer to analyze videos Use the Custom Vision service to implement image classification Use the Custom Vision service to implement object detection Detect faces with the Computer Vision service Detect, analyze, and recognize faces with the Face service Use the Computer Vision service to read text in images and documents Use the Form Recognizer service to extract data from digital forms Create an intelligent search solution with Azure Cognitive Search Implement a custom skill in an Azure Cognitive Search enrichment pipeline Use Azure Cognitive Search to create a knowledge store   COURSE CONTENT Module 1: Introduction to AI on Azure Artificial Intelligence (AI) is increasingly at the core of modern apps and services. In this module, you'll learn about some common AI capabilities that you can leverage in your apps, and how those capabilities are implemented in Microsoft Azure. You'll also learn about some considerations for designing and implementing AI solutions responsibly. Introduction to Artificial Intelligence Artificial Intelligence in Azure Module 2: Developing AI Apps with Cognitive Services Cognitive Services are the core building blocks for integrating AI capabilities into your apps. In this module, you'll learn how to provision, secure, monitor, and deploy cognitive services. Getting Started with Cognitive Services Using Cognitive Services for Enterprise Applications Lab: Get Started with Cognitive Services Lab: Get Started with Cognitive Services Lab: Monitor Cognitive Services Lab: Use a Cognitive Services Container Module 3: Getting Started with Natural Language Processing  Natural Language processing (NLP) is a branch of artificial intelligence that deals with extracting insights from written or spoken language. In this module, you'll learn how to use cognitive services to analyze and translate text. Analyzing Text Translating Text Lab: Analyze Text Lab: Translate Text Module 4: Building Speech-Enabled Applications Many modern apps and services accept spoken input and can respond by synthesizing text. In this module, you'll continue your exploration of natural language processing capabilities by learning how to build speech-enabled applications. Speech Recognition and Synthesis Speech Translation Lab: Recognize and Synthesize Speech Lab: Translate Speech Module 5: Creating Language Understanding Solutions To build an application that can intelligently understand and respond to natural language input, you must define and train a model for language understanding. In this module, you'll learn how to use the Language Understanding service to create an app that can identify user intent from natural language input. Creating a Language Understanding App Publishing and Using a Language Understanding App Using Language Understanding with Speech Lab: Create a Language Understanding App Lab: Create a Language Understanding Client Application Use the Speech and Language Understanding Services Module 6: Building a QnA Solution One of the most common kinds of interaction between users and AI software agents is for users to submit questions in natural language, and for the AI agent to respond intelligently with an appropriate answer. In this module, you'll explore how the QnA Maker service enables the development of this kind of solution. Creating a QnA Knowledge Base Publishing and Using a QnA Knowledge Base Lab: Create a QnA Solution Module 7: Conversational AI and the Azure Bot Service Bots are the basis for an increasingly common kind of AI application in which users engage in conversations with AI agents, often as they would with a human agent. In this module, you'll explore the Microsoft Bot Framework and the Azure Bot Service, which together provide a platform for creating and delivering conversational experiences. Bot Basics Implementing a Conversational Bot Lab: Create a Bot with the Bot Framework SDK Lab: Create a Bot with a Bot Freamwork Composer Module 8: Getting Started with Computer Vision Computer vision is an area of artificial intelligence in which software applications interpret visual input from images or video. In this module, you'll start your exploration of computer vision by learning how to use cognitive services to analyze images and video. Analyzing Images Analyzing Videos Lab: Analyse Images with Computer Vision Lab: Analyze Images with Video Indexer Module 9: Developing Custom Vision Solutions While there are many scenarios where pre-defined general computer vision capabilities can be useful, sometimes you need to train a custom model with your own visual data. In this module, you'll explore the Custom Vision service, and how to use it to create custom image classification and object detection models. Image Classification Object Detection Lab: Classify Images with Custom Vision Lab: Detect Objects in Images with Custom Vision Module 10: Detecting, Analyzing, and Recognizing Faces Facial detection, analysis, and recognition are common computer vision scenarios. In this module, you'll explore the user of cognitive services to identify human faces. Detecting Faces with the Computer Vision Service Using the Face Service Lab:Destect, Analyze and Recognize Faces Module 11: Reading Text in Images and Documents Optical character recognition (OCR) is another common computer vision scenario, in which software extracts text from images or documents. In this module, you'll explore cognitive services that can be used to detect and read text in images, documents, and forms. Reading text with the Computer Vision Service Extracting Information from Forms with the Form Recognizer service Lab: Read Text in IMages Lab: Extract Data from Forms Module 12: Creating a Knowledge Mining Solution Ultimately, many AI scenarios involve intelligently searching for information based on user queries. AI-powered knowledge mining is an increasingly important way to build intelligent search solutions that use AI to extract insights from large repositories of digital data and enable users to find and analyze those insights. Implementing an Intelligent Search Solution Developing Custom Skills for an Enrichment Pipeline Creating a Knowledge Store Lab: Create and Azure Cognitive Search Solution Create a Custom Skill for Azure Cognitive Search Create a Knowledge Store with Azure Cognitive Search   TEST CERTIFICATION Recommended as preparation for the following exams: AI-102 - Designing and Implementing a Microsoft Azure AI Solution - Part of the requirements for the Microsoft Certified Azure AI Engineer Associate Certification.   HVORFOR VELGE SG PARTNER AS:  Flest kurs med Startgaranti Rimeligste kurs Beste service og personlig oppfølgning Tilgang til opptak etter endt kurs Partner med flere av verdens beste kursleverandører [-]
Les mer
13 timer
Grunnleggende Excel [+]
Her starter vi ganske på begynnelsen, og går ut fra at deltagerne har liten eller ingen erfaring med Excel. Vi starter med de grunnleggende prinsippene, og bygger så videre på dem. I stikkordsform ser innholdet ut slik: Regnearkets oppbygning – grunnprinsipper Tall og tekst – identifisere og korrigere/konvertere Listefunksjonalitet – sortere, filtrere, redigere, skrive ut, etc. Grunnleggende formelbygging – de fire regneartene Kopiering av formler – absolutte og relative referanser Sentrale funksjoner: SUMMER, GJENNOMSNITT, HVIS,   HVISFEIL Modellbyggingsteknikker - sammendrag av data over flere ark Grafiske fremstillinger av numeriske data Identifisere og fjerne duplikatverdier fra en liste Arbeide med tid (dager, klokkeslett, etc.) i Excel [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstilta... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: IFUD1012 Internett og sikkerhet Innleveringer: Øvinger: 3 av 5 må være godkjent. Vurderingsform: Skriftlig eksamen, 3 timer (60 %). Det gjennomføres 3 obligatoriske større øvingsarbeider gruppevis underveis i kurset. Disse får en midlertidig vurdering/tilbakemelding og kan deretter leveres på nytt til en samlet sluttvurdering som teller 40 % på karakteren. Ansvarlig: Ole Christian Eidheim Eksamensdato: 12.12.13 / 26.05.14         Læremål: Etter å ha gjennomført emnet Informasjonssikkerhetsstyring skal studenten ha følgende samlede læringsutbytter: KUNNSKAPER:Kandidaten:- kan gjøre rede for hva informasjonssikkerhet betyr for en bedrifts økonomi og omdømme- kan gjøre rede for hva standardene ISO 27001 og ISO 27002 inneholder og hvordan de benyttes i sikkerhetsarbeidet- kjenner til prinsippene i Demmings sirkel og kunne redegjøre for betydningen av disse for det kontinuerlige sikkerhetsarbeidet- kjenner til en trinnvis plan for innføring av et styringssystem for informasjonssikkerhet (ISMS) og kunne redegjøre for de kritiske suksessfaktorene i hver av fasene- kan redegjøre for forutsetninger og tiltak for å skape en sikkerhetskultur i en bedrift- kan redegjøre for den trinnvise prosessen frem mot sertifisering av et ISMS eller produkt- kan redegjøre for rollen til målinger og evalueringer i sikkerhetsarbeidet FERDIGHETER:Kandidaten kan:- kartlegge trusselbildet for en konkret bedrift- gjennomføre en risikoanalyse for en bedrift på en strukturert og systematisk måte- innføre tiltak for å redusere risikoverdien for kartlagte trusler som har for høy risikoverdi- velge og utarbeide relevante sikkerhetspolicyer for en konkret bedrift- utarbeide forslag til en organisasjonsstruktur for sikkerhetsarbeidet i en konkret bedrift- analysere behovet for sertifisering av ISMS for en konkret bedrift og gi anbefalinger om veien dit GENERELL KOMPETANSE:Kandidaten kan:- kommunisere med og forstå brukernes behov- involvere de ansatte i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med- involvere eksterne konsulenter i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med Innhold:Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstiltak, sikkerhetskultur, sikkerhet i informasjonssystemer, veien til sertifisering, måling og evaluering, kontinuerlig forbedringLes mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Informasjonssikkerhetsstyring 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Virtuelt klasserom 3 timer 6 950 kr
Kurset gir en innføring i digitalisering og hvordan digitalisering påvirker og kan utnyttes til å skape økt vekst og innovasjon. [+]
Digital strategi i styrerommet   * Ca. 3 timer kurs spesialtilpasset for mindre deltakergrupper (1 - 6 deltakere) med mulighet for dialog, spørsmål og avklaringer underveis. Kurset leveres normalt nettbasert - alternativt - som fysisk kurs etter avtale med kursholder, eller i henhold til særskilt annonsering / tilbud. Kurset / Alle våre kan også leveres som et eksklusivt kurs der kun du og foreleser deltar. Ved slik eksklusiv leveranse får du mulighet til personlig gjennomgang med en av våre profesjonell kursholdere og konsulenter innenfor det aktuelle tema. Ved bestilling av eksklusiv / personlig kursdato for deg selv, vil kursholder kontakte deg direkte, og avtale konkret kursdato. **Alle spesialkurs, kan også leveres som bedriftsinterne kurs, kurs for hele styret, hele ledergruppen etc.   Kurset gir en innføring i digitalisering og hvordan digitalisering påvirker og kan utnyttes til å skape økt vekst og innovasjon. Deltagerne får en innføring i et rammeverk for utvikling av en fokusert digital strategi tilpasset virksomheten.   I tillegg vil deltagerne vil bli kjent med nødvendige begreper, anerkjente metoder og strategiske verktøy, og få delta i spennende gruppearbeid. I tillegg ser vi på hvordan arbeid med digitalisering kan organiseres og hva som er de viktigste virkemidlene for å lykkes.    Kurset tar utgangspunktet i internasjonal forskning knyttet til digitalisering, og gir en grundig innføring i de sentrale elementene i en digital strategi som styre og ledelse i virksomhetene bør konsentrere seg om. Kurset avmystifiserer begrepet digitalisering med forenklet terminologi, og gir deltagerne det nødvendige grunnlaget for å kunne delta aktivt i å utvikle fokuserte digitale strategier. I en verden hvor digitaliseringen driver endringstakten stadig raskere, blir retning og et tydelig fremtidsbilde viktigere enn rene langsiktige mål. Samtidig må man ha et felles begrepsapparat, forstå driverne og ofte benytte utradisjonelle virkemidler og nye forretningsmodeller for å lykkes.    Formålet med kurset: Formålet er å gi deltagerne et forenklet rammeverk for å kunne diskutere og sette premisser ved utvikling av en fokusert digital strategi. Videre vil deltagerne få avmystifisert begrepet digitalisering, få en forståelse av hva digitalisering i realiteten betyr for virksomheten og få konkretisert hva man kan gjøre for å utnytte de mulighetene som digitaliseringen gir.   Kursinnhold:  Hvordan kan styret sette premisser gjennom en fokusert digital strategi? Hva er digitalisering egentlig, hva er driverne og hvor fort går det? Hvilke muligheter og trusler gir digitalisering? Hva kreves for å lykkes? Digitalisering vs. IT Digital innovasjon Digital forretningsutvikling Digital transformasjon Digitale forretningsmodeller Strategiprosesser Digital strategi Fremtidsscenario Virkemidler Strategiske partnerskap Organisering og kompetanse   Målgruppe:  Målgruppen er primært styreledere, styremedlemmer, eiere og ledere som er opptatt av prosessene omkring digitalisering og digital strategi i styrerommet.    [-]
Les mer
5 dager 25 500 kr
MD-101: Managing Modern Desktops [+]
MD-101: Managing Modern Desktops [-]
Les mer