IT-kurs
Nordland
Du har valgt: Narvik
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Narvik ) i IT-kurs
 

Nettkurs 12 måneder 9 000 kr
ITIL® 4 Specialist: Create, Deliver and Support dekker «kjernen» i ITIL®, aktiviteter rundt administrasjon av tjenester, og utvider omfanget av ITIL® til å omfatte «oppre... [+]
Kurset fokuserer på integrering av forskjellige verdistrømmer og aktiviteter for å lage, levere og støtte IT-aktiverte produkter og tjenester, samtidig som den dekker støtte for praksis, metoder og verktøy. Kurset gir kandidatene forståelse for tjenestekvalitet og forbedringsmetoder. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Specialist: Create, Deliver and Support e-læring (engelsk) i 12 måneder. ITIL® 4 Specialist: Create, Deliver and Support online voucher til sertifiseringstest.   ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
4 dager 23 000 kr
This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. [+]
 Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments.Students for AZ-140: Configuring and Operating Windows Virtual Desktop on Microsoft Azure are interested in delivering applications on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments. As a Windows Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Windows Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Windows Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Windows Virtual Desktop performance, and automate Windows Virtual Desktop management tasks. COURSE OBJECTIVES   Select an appropriate licensing model for Windows Virtual Desktop Implement networking for Windows Virtual Desktop Manage Windows Virtual Desktop session hosts by using Azure Bastion Configure storage for FSLogix components Create and manage session host images Implement Azure roles and role-based access control (RBAC) for Windows Virtual Desktop Configure user Windows Virtual Desktop experience settings Install and configure apps on a session host Implement business continuity and disaster recovery Monitor and manage Windows Virtual Desktop performance     COURSE CONTENT Module 1: Plan a Windows Virtual Desktop Architecture In this module, you will learn how to assess existing physical and virtual desktop environments, plan and configure name resolution for Active Directory (AD) and Azure Active Directory Domain Services (Azure AD DS), and plan for Windows Virtual Desktop client deployments. LESSONS M1 Windows Virtual Desktop Architecture Design the WVD architecture Design for user identities and profiles LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AZURE AD DS) LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AD DS) After completing module 1, students will be able to: Understand Windows Virtual Desktop Components Understand personal and pooled desktops Recommend an operating system for a WVD implementation Plan a host pools architecture Module 2: Implement a WVD Infrastructure In this module, you will learn how to manage connectivity to the internet and on-premises networks, create a host pool by using the Azure portal, deploy host pools and hosts by using Azure Resource Manager templates, apply OS and application updates to a running WVD host, and create a master image. LESSONS M2 Implement and manage networking for WVD Implement and manage storage for WVD Create and configure host pools and session hosts Create and manage session host image LAB: CREATE AND CONFIGURE HOST POOLS AND SESSION HOSTS (AZURE AD DS) LAB: DEPLOY HOST POOLS AND SESSION HOSTS BY USING THE AZURE PORTAL (AD DS) LAB: IMPLEMENT AND MANAGE STORAGE FOR WVD (AZURE AD DS) LAB: DEPLOY HOST POOLS AND HOSTS BY USING AZURE RESOURCE MANAGER TEMPLATES LAB: DEPLOY AND MANAGE HOST POOLS AND HOSTS BY USING POWERSHELL After completing module 2, students will be able to: Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Windows Virtual Desktop network connectivity Configure WVD session hosts using Azure Bastion Configure storage for FSLogix components Configure disks and file shares Modify a session host image Create and use a Shared Image Gallery (SIG) Module 3: Manage Access and Security In this module, you will learn how to plan and implement Azure roles and RBAC for WVD, implement Conditional Access policies for connections, plan and implement MFA, and manage security by using Azure Security Center. LESSONS M3 Manage access Manage security LAB: CONFIGURE CONDITIONAL ACCESS POLICIES FOR CONNECTIONS TO WVD (AD DS) After completing module 3, students will be able to: Manage local roles, groups and rights assignment on WVD session hosts. Configure user restrictions by using AD group policies and Azure AD policies Understand Conditional Access policy components Prepare for Azure Active Directory (Azure AD)-based Conditional Access for Windows Virtual Desktop Implement Azure AD-based Conditional Access for Windows Virtual Desktop Module 4: Manage User Environments and Apps In this module, you will learn how to plan for FSLogix, install FSLogix, configure Cloud Cache, deploy an application as a RemoteApp, and implement and manage OneDrive for Business for a multi-session environment. LESSONS M4 Implement and manage FSLogix Configure user experience settings Install and configure apps on a session host LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AZURE AD DS) LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AD DS) LAB: WINDOWS VIRTUAL DESKTOP APPLICATION PACKAGING (AD DS) After completing module 4, students will be able to: Configure Profile Containers Configure Azure Files to store profile containers for WVD in an AAD DS environment Implement FSLogix based profiles for Windows Virtual Desktop in Azure AD DS environment Implement FSLogix based profiles for Windows Virtual Desktop Prepare for and create MSIX app packages Implement MSIX app attach container for Windows Virtual Desktop in AD DS environmen Module 5: Monitor and maintain a WVD infrastructure In this module, you will learn how to plan and implement a disaster recovery plan for WVD, configure automation for WVD, implement autoscaling in host pools, and optimize session host capacity and performance. LESSONS M5 Plan and implement business continuity and disaster recovery Automate WVD management tasks Monitor and manage performance and health LAB: IMPLEMENT AUTOSCALING IN HOST POOLS (AD DS) After completing module 5, students will be able to: Plan and implement a disaster recovery plan for WVD Configure automation for WVD Monitor WVD by using Azure Monitor Customize Azure Workbooks for WVD monitoring Configure autoscaling of Windows Virtual Desktop session hosts Verify autoscaling of Windows Virtual Desktop session host [-]
Les mer
Oslo Bodø Og 5 andre steder 2 dager 8 900 kr
06 May
06 May
03 Jun
Excel Grunnkurs [+]
Excel Grunnkurs [-]
Les mer
Nettkurs 12 timer 1 275 kr
E-læringskurset gir deg en opplevelsesrik og praktisk opplæring i presentasjonsprogrammet PowerPoint 2016. En kombinasjon av videoer, teori, oppskrifter, oppgaver og test... [+]
E-læringskurset gir deg en opplevelsesrik og praktisk opplæring i presentasjonsprogrammet PowerPoint 2016. En kombinasjon av videoer, teori, oppskrifter, oppgaver og tester gjør det enkelt å lære seg de nye funksjonene og verktøyene. En komplett e-læring med både grunnleggende og videregående emner. E-læringskurset inneholder 82 opplæringsvideoer.E-læringskurset er tilpasset Office 365.Testene i e-læringskurset måler kunnskap før, under og etter opplæringen. Når ettertesten er bestått får du tilgang til et kursbevis i PDF-format som enkelt kan lagres eller skrives ut.Jobb smart og effektivt!- Office 365 gir deg alltid den nyeste versjonen av PowerPoint.- Maler og tema er tilgjengelig ved oppstart.- Enklere åpning og lagring av presentasjoner.- Microsoft-kontoen kobler enheten til OneDrive, slik at du alltid har tilgang til filene dine.- Egen modus som er optimalisert for berøring.- Enklere søk etter kommandoer, handlinger og hjelp.- Bruk av tema gir en konsekvent layout på alle Office-dokumenter.- Temaene har et sett med ferdige fargevarianter.- Standard lysbildestørrelse er nå widescreen (16:9).- Elementer som skal gjentas på alle lysbildene kan settes inn i lysbildemalen.- Enklere å finne og sette inn bilder fra både datamaskinen, OneDrive og en kilde på Internett.- PowerPoint Designer er en ny tjeneste som automatisk genererer utformingsideer for et lysbilde.- Objekter tilpasses ved å endre plassering, størrelse, rotering, rekkefølge etc.- Bildebehandling med bildestiler, lysstyrke, kontrast, farger og kunstneriske effekter.- Figurene kan brukes til å tegne linjer, rektangler, piler, stjerner og flytskjema.- WordArt kan brukes for å lage spesielle teksteffekter i en presentasjon.- Ny og spennende tegnefunksjon for håndskriftsmerknader.- SmartArt-grafikk kan brukes til å lage flotte illustrasjoner.- Diagram egner seg godt for å gi et visuelt, lettfattelig inntrykk av tallverdier.- Tabeller kan brukes for å presentere informasjon på en oversiktlig måte.- Videoer og lyder kan gjøre presentasjonene mer spennende.- Skjerminnspilling kan startes direkte fra presentasjonen.- Et integrert utskriftsmiljø med både utskriftsinnstillinger og forhåndsvisning.- Dynamiske animasjoner og overganger imponerer under lysbildeframvisning.- Innspillingsfunksjonen kan brukes for å finne en passende tidsberegning for lysbildene.- Med Presentasjonstjeneste for Office eller Skype for Business, kan presentasjoner kjøres via nettet.Innhold:- Før du starter- Utforming- Tekst- Bilder- Figurer- SmartArt-grafikk- Diagram- Tabeller- Medier- Framvisning [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
1 dag 8 000 kr
This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. [+]
COURSE OVERVIEW The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. The course is designed as a blended learning experience that combines instructor-led training with online materials on the Microsoft Learn platform (https://azure.com/learn). The hands-on exercises in the course are based on Learn modules, and students are encouraged to use the content on Learn as reference materials to reinforce what they learn in the class and to explore topics in more depth. TARGET AUDIENCE The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don’t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. COURSE OBJECTIVES  After completing this course, you will be able to: Describe Artificial Intelligence workloads and considerations Describe fundamental principles of machine learning on Azure Describe features of computer vision workloads on Azure Describe features of Natural Language Processing (NLP) workloads on Azure Describe features of conversational AI workloads on Azure   COURSE CONTENT Module 1: Introduction to AI In this module, you'll learn about common uses of artificial intelligence (AI), and the different types of workload associated with AI. You'll then explore considerations and principles for responsible AI development. Artificial Intelligence in Azure Responsible AI After completing this module you will be able to Describe Artificial Intelligence workloads and considerations Module 2: Machine Learning Machine learning is the foundation for modern AI solutions. In this module, you'll learn about some fundamental machine learning concepts, and how to use the Azure Machine Learning service to create and publish machine learning models. Introduction to Machine Learning Azure Machine Learning After completing this module you will be able to Describe fundamental principles of machine learning on Azure Module 3: Computer Vision Computer vision is a the area of AI that deals with understanding the world visually, through images, video files, and cameras. In this module you'll explore multiple computer vision techniques and services. Computer Vision Concepts Computer Vision in Azure After completing this module you will be able to Describe features of computer vision workloads on Azure Module 4: Natural Language Processing This module describes scenarios for AI solutions that can process written and spoken language. You'll learn about Azure services that can be used to build solutions that analyze text, recognize and synthesize speech, translate between languages, and interpret commands. After completing this module you will be able to Describe features of Natural Language Processing (NLP) workloads on Azure Module 5: Conversational AI Conversational AI enables users to engage in a dialog with an AI agent, or *bot*, through communication channels such as email, webchat interfaces, social media, and others. This module describes some basic principles for working with bots and gives you an opportunity to create a bot that can respond intelligently to user questions. Conversational AI Concepts Conversational AI in Azure After completing this module you will be able to Describe features of conversational AI workloads on Azure   TEST CERTIFICATION Recommended as preparation for the following exams: Exam AI-900: Microsoft Azure AI Fundamentals. HVORFOR VELGE SG PARTNER AS:  Flest kurs med Startgaranti Rimeligste kurs Beste service og personlig oppfølgning Tilgang til opptak etter endt kurs Partner med flere av verdens beste kursleverandører [-]
Les mer
Nettkurs 4 timer 349 kr
Adobe Audition er et profesjonelt lydredigeringsprogram for innspilling, miksing og bearbeiding av lyd. Programmet passer for alle som jobber med lyd, dette være seg: vid... [+]
Adobe Audition er et profesjonelt lydredigeringsprogram som gir deg muligheten til å spille inn, mikse og bearbeide lyd. Dette programmet er ideelt for alle som arbeider med lyd, uavhengig om det er for video, animasjon, radio, podkast eller spill. Audition støtter et bredt spekter av lydformater, inkludert ASIO, VST og MIDI. Du kan også enkelt importere prosjekter fra Adobe Premiere Pro, noe som gjør Audition til et utmerket valg for de som ønsker førsteklasses lyd til sine videoproduksjoner. For å få tilgang til Adobe Audition må du abonnere på Adobe Creative Cloud (kr 590 per måned). I dette omfattende kurset vil Espen Faugstad veilede deg gjennom hele programmet, fra begynnelse til slutt. Du vil lære alt du trenger for å kunne bruke programmet på en effektiv måte. Kurset dekker emner som hvordan du importerer, organiserer og redigerer lydfiler. Du vil også lære å fjerne bakgrunnsstøy, fremheve stemmer, legge til lydeffekter, og mye mer. Kursinnhold: Introduksjon Lydterminologi Importering av lyd Redigering med Waveform Editor (del 1) Redigering med Waveform Editor (del 2) Multitrack Editor (del 1) Multitrack Editor (del 2) Bruk av paneler og verktøy Essential Sound-panelet Eksportering av prosjekt og samarbeid med Premiere Pro Etter fullføring av kurset, vil du ha den nødvendige kunnskapen og ferdighetene til å arbeide effektivt med Adobe Audition for å oppnå høykvalitetslyd i dine prosjekter.   Varighet: 4 timer og 5 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av de beste digitale nettkursene i landet. Vår tjeneste fungerer på samme måte som strømmetjenester for musikk eller TV-serier, der våre kunder betaler en fast månedspris for tilgang til alle kursene vi har tilgjengelige. Med over 30 000 registrerte brukere og 1,5 millioner videoavspillinger har vi opplevd betydelig vekst de siste årene. Vårt mål er å gjøre kompetanseutvikling engasjerende, spennende og tilgjengelig for alle, og vi har støtte fra Innovasjon Norge og Forskningsrådet. [-]
Les mer
Nettstudie 1 semester 4 980 kr
På forespørsel
Datatyper, betingelser og løkker, uttrykk, funksjoner, funksjonsbibliotek, tabeller, tekststrenger, strukturer, klasser og objekter, datafiler, sortering, søking. Program... [+]
  Studieår: 2013-2014   Gjennomføring: Høst Antall studiepoeng: 5.0 Forutsetninger: Emnet gir en innføring i programmering og krever ingen bestemte forkunnskaper. Innleveringer: Innleverte øvinger. Det blir gitt 10 øvinger, 8 må være godkjent for å kunne gå opp til eksamen. Personlig veileder: ja Vurderingsform: Skriftlig eksamen, individuell, 4 timer,  Ansvarlig: Tore Berg Hansen Eksamensdato: 06.12.13         Læremål: KUNNSKAPER:Kandidaten:- kan definere, gjenkjenne og forklare de grunnleggende konsepter for programmering i C++ så som programmers struktur, nøkkelord, spesialtegn, datatyper, algoritmer, kontrollstrukturer, operatorer, funksjoner og uttrykk- kan forklare gangen fra kildekode til ferdig kjørbart program inkludert bruken av redigeringsprogram, kompilator og lenker og disses plass i integrerte programmeringsomgivelser- kan gjøre rede for begrepene enkle og sammensatte datatyper samt en- og flerdimensjonale tabeller- kan forklare den objektorienterte tankegangen og bruk av klasser FERDIGHETER:Kandidaten:- kan lage programmer i C++ som demonstrerer bruk av funksjoner, algoritmer og kontrollstrukturer- kan lage programmer som bruker tabeller- kan lage programmer som bruker datafiler- kan lage programmer som viser bruk av objekter- kan lage programmer satt sammen av flere filer GENERELL KOMPETANSE:Kandidaten:- er oppmerksom på at emnet er en introduksjon til programmering i C++ og at det er mye mer å lære spesielt om objektorientert programmering Innhold:Datatyper, betingelser og løkker, uttrykk, funksjoner, funksjonsbibliotek, tabeller, tekststrenger, strukturer, klasser og objekter, datafiler, sortering, søking. Program som består av flere filer. Bruk av "header"-filer. Kompilering og lenking i integrerte programmeringsomgivelser og bruk av "debugger". Algoritmer, skrittvis forfining, testing og feilsøking.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Dette faget går: Høst 2013    Fag Programmering i C++ 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Virtuelt klasserom 5 timer 33 000 kr
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE BOOTCAMP [+]
COURSE OVERVIEW The Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency.   Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class.   TARGET AUDIENCE Individuals involved in the deployment and maintenance of the Cisco ISE platform. COURSE OBJECTIVES After completing this course you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party network access devices (NADs), Cisco TrustSec®, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authentication, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. COURSE CONTENT Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Fucntions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Services Configure Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning Working with Network Access Devices Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Labs Lab 1: Access the SISE Lab and Install ISE 2.4 Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage  Lab 3: Integrate Cisco ISE with Active Directory Lab 4: Configure Cisco ISE Policy Lab 5: Configure Access Policy for Easy Connect Lab 6: Configure Guest Access Lab 7: Configure Guest Access Operations Lab 8: Create Guest Reports Lab 9: Configure Profiling Lab 10: Customize the Cisco ISE Profiling Configuration Lab 11: Create Cisco ISE Profiling Reports Lab 12: Configure BYOD Lab 13: Blacklisting a Device Lab 14: Configure Cisco ISE Compliance Services Lab 15: Configure Client Provisioning Lab 16: Configure Posture Policies Lab 17: Test and Monitor Compliance Based Access Lab 18: Test Compliance Policy Lab 19: Configure Cisco ISE for Basic Device Administration Lab 20: Configure TACACS+ Command Authorization   [-]
Les mer
Webinar + nettkurs 1 dag 5 590 kr
Jobber du med reguleringsplaner? Lær å lage planer i AutoCAD ved hjelp av Focus Arealplan. [+]
Kurset passer både for deg som skal i gang med Focus Arealplan eller som har brukt programmet litt fra før.   Hensikten med kurset er å gi deg en grunnleggende forståelse i bruken av AutoCAD-applikasjonen Focus Arealplan. Kurset er nødvendig for å komme raskt i gang med med å bruke programmet, og for å få den nødvendige forståelse for de mulighetene programmet gir. Kursinnhold: På kurset vi deltagerne lære å hente inn SOSI-filer og å utarbeide reguleringsplaner iht. Miljøverndepartementets veiledere med Focus Arealplan. Vi legger spesielt vekt på riktig arbeidsmetodikk. Kurset gjennomgår også hvordan man overfører ferdig plan til SOSI-format og kontroll av SOSI-filen med programmet 'SOSI-vis'. Vi vil også gå gjennom typiske problemstillinger hvor vi har erfart at ting kan gå galt eller ting som oppleves vanskelig hvis man benytter feil arbeidsmetodikk. [-]
Les mer
2 dager
ISO/IEC 27001 Foundation gir deg en grunnleggende innføring i informasjonssikkerhet og sikkerhetsstyring. [+]
Bedriftstilbud! Vi tilbyr nå rabatterte priser for på PECB ISO/IEC Foundation 27001 som bedriftsinternt kurs for grupper (minimum 5 personer).Kurset kan holdes i lokalene til Orange Cyberdefense på Lysaker Torg, eller hos dere. Kontakt oss for et godt tilbud.  Har dere sikkerhetskompetansen dere trenger? Orange Cyberdefense holder sertifiseringskurs innen cyber- og informasjonssikkerhet levert av den anerkjente sertifisering- og kursleverandøren PECB. PECB ISO/IEC 27001 Foundation er et 2 dagers kurs, der man vil lære om de grunnleggende elementene for å implementere og lede et styringssystem for informasjonssikkerhet (ISMS) i samsvar med ISO/IEC 27001. Etter kurset vil kursdeltagerne forstå de ulike delene i et ISMS, inkludert policyer, rutiner, måling, internrevisjon og kontinuerlig forbedring. Kurset er ment for bedriftens ansatte som skal delta i innføringen av et styringssystem for informasjonssikkerhet, eller som trenger å lære mer om informasjonssikkerhet og styring av dette i en virksomhet.  Læringsmål for kurset Kjennskap til ISO/IEC 27001 og kunne se sammenhenger mellom ISO/IEC 27001, ISO/IEC 27002 og andre rammeverk. Forstå ulike tilnærminger, standarder, metoder og teknikker som brukes for å implementere og styre et ISMS. Kunne drifte elementene i et styringssystem for informasjonssikkerhet ISMS.   Bindende påmelding Vi forbeholder oss retten til å utsette kurs ved for få deltakere/ påmeldte. Tilbud om ny kursdato vil bli gitt.  [-]
Les mer
Oslo Trondheim 5 dager 34 000 kr
29 Apr
20 May
17 Jun
https://www.glasspaper.no/kurs/ccna-implementing-and-administering-cisco-solutions/ [+]
CCNA: Implementing and Administering Cisco Solutions [-]
Les mer
Oslo 2 dager 11 900 kr
22 May
22 May
19 Aug
Excel for Controllere og Økonomisjefer [+]
Excel for Controllere og Økonomisjefer [-]
Les mer
Virtuelt eller personlig Bærum 2 dager 9 900 kr
Når formgivningen krever litt mer. Kurset henvender seg til industrielle designere og andre som arbeider med produktdesign eller annen kompleks formgivning. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon. Fusion 360 Her er et utvalg av temaene du vil lære på kurset: Fusion 360 Dashboard - Data og prosjekthåndtering Formgivning - konseptuelt design og parametrisk Samlinger og 2D-tegninger, inkludert stykklister  Dataimport - håndtering av data fra andre CAD-plattformer Kurset for deg som er industriell designer, arbeider med produktdesign eller annen kompleks forgivning. Kurset har fokus på oppbygning av modeller med kompliserte overflater. Du vil få kunnskap til å skape og korrigere avanserte og komplekse 3D-modeller, og samtidig lage avanserte 3D-modeller på bakgrunn av konseptuelle skisser, vedlikeholde og dokumentere dem i forskjellige varianter.    Dette er et populært kurs, meld deg på nå! Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Oslo 5 dager 35 000 kr
10 Jun
10 Jun
16 Sep
CEH: Certified Ethical Hacker v12 [+]
CEH: Certified Ethical Hacker v12 [-]
Les mer