IT-kurs
Du har valgt: Nord-Trøndelag
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Nord-Trøndelag ) i IT-kurs
 

Nettkurs 12 måneder 8 000 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 40 minutter 5 600 kr
MoP®, er et rammeverk og en veiledning for styring av prosjekter og programmer i en portefølje. Sertifiseringen MoP Foundation gir deg en innføring i porteføljestyring me... [+]
Du vil få tilsendt en «Core guidance» bok og sertifiserings-voucher slik at du kan ta sertifiseringstesten for eksempel hjemme eller på jobb. Denne vil være gyldig i ett år. Tid for sertifiseringstest avtales som beskrevet i e-post med voucher. Eksamen overvåkes av en web-basert eksamensvakt.   Eksamen er på engelsk. Eksamensformen er multiple choice - 50 spørsmål skal besvares, og du består ved 50% korrekte svar (dvs 25 av 50 spørsmål). Deltakerne har 40 minutter til rådighet på eksamen.  Ingen hjelpemidler er tillatt.   Nødvendige forkunnskaper: Ingen [-]
Les mer
Oslo Bergen Og 1 annet sted 4 dager 28 900 kr
13 May
13 May
04 Jun
Kubernetes Administration (LFS458) [+]
Kubernetes Administration (LFS458) [-]
Les mer
2 dager 8 500 kr
Lag verdifulle kundeopplevelser med Design Thinking [+]
Verden er i endring, det snakkes om den fjerde industrielle revolusjon og stadig flere ledere etterspør «radikal digital innovasjon». Men hva betyr det? Hvor skal vi begynne? Og hvordan kan vi sikre en plass med på toget inn i fremtiden, når vi lever i en virkelighet der teknologi utvikler seg eksponentielt og selskaper logaritmisk? Mange mener Design Thinking er svaret på det. Designtenking er et tankesett og en brukerorientert tilnærming til innovasjon. Metoden kombinerer designernes iterative tilnærming til tjeneste- og produktutvikling, med økonomenes analytiske og strategiske metoder for forretningsutvikling. Resultatet blir løsninger som har større sannsynlighet for å svare på brukerbehovene, er lønnsomme og i tråd med forretningsstrategi. Bli med på to dagers intensivt kurs i Design Thinking, lær å lage knallgode kundeopplevelser. Mål og gjennomføring Kurset er en blanding av praktisk workshop og foredrag med fokus på kundeopplevelse og de enorme digitale mulighetene vi har i dag. Med en «fail fast, fail cheap» tilnærming skal vi få kjenne på kroppen hva det betyr å ikke forelske seg i første idé, samarbeide på tvers av fagdisipliner og ikke minst ALLTID ha brukeren i fokus. Vi vil jobbe med å kartlegge kundens brukerbehov og jobber, og videre designe verdiforslag, tar valg, utforske gode forretningsmodell, teste, evaluerer og ikke minst LÆRE. Målet er at du skal forlate kurset med en verktøykasse du kan bruke på din egen arbeidsplass. Kurset inneholder: Forståelse av dagens digitale landskap Strategisk arbeid med innovasjon Design Thinking: teori og praktiske verktøy for design av verdifulle kundeopplevelser Kursleder: André Nordal Sylte, fagleder kundekonsept i DNB. Han jobber med å utforske og spesifisere prioriterte kundesegmenters viktigste behov, og designe verdiforslag til disse. Han har tidligere jobbet i Deloitte og Creuna. André er veldig kunnskapsrik og inspirerende, vi lover deg to meget lærerike og innholdsrike kvelder. Tid: 25. – 26. november kl. 17 – 21, matservering fra kl. 1630.   [-]
Les mer
3 dager 12 550 kr
Lær å bruke AutoCAD [+]
UTDANNINGSMÅLKursdeltakerne skal etter endt kurs kunne bruke AutoCAD til å: Opprette nye tegninger Gjøre forandringer i eksisterende tegninger Bruke og forstå de vanligste tegne- og editeringskommandoer Målsette og påføre tekst i en tegning Bruke og forstå lagoppbyggingen i AutoCAD Symbol- og blokkhåndtering Enkel layout/plotting Lagre tegninger KURSINNHOLD: Introduksjon av AutoCAD 2-dimensjonal tegning Zoom og skjermbehandlingsteknikk Redigeringsfunksjoner Målsettingsfunksjoner Laghåndtering Symbol- og blokkhåndtering Hente symboler og parametere (målsettings- og tekststiler, osv.) fra eksisterende tegninger Layout/plotting av tegninger Lagrings- og avslutningsrutiner [-]
Les mer
Virtuelt klasserom 4 timer 24 500 kr
This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data int... [+]
The course combines lecture with case studies to demonstrate basic architect design principles. Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. COURSE OBJECTIVES Skills gained Design a governance solution. Design a compute solution. Design an application architecture. COURSE CONTENT Module 1: Design compute and application solutions In this module you will learn about governance, compute, and application architectures. Lessons of Module 1 Design for governance Design for compute solutions Design for application architectures Lab : Case studies of Module 1 After completing this module, students will be able to: Design a governance solution. Design a compute solution. Design an application architecture. Module 2: Design storage solutions In this module, you will learn about non-relational storage, relational storage, and data integration solutions. Lessons of Module 2 Design a non-relational storage solution. Design a relational storage solution. Design a data integration solution. Lab : Case studies of Module 2 After completing this module, students will be able to: Design non-relational storage solutions. Design relational storage solutions. Design a data integration solution. Module 3: Design networking and access solutions In this module you will learn about authentication and authorization, identity and access for applications, and networking solutions. Lessons of Module 3 Design authentication and authorization solutions Design networking solutions Lab : Case studies of Module 3 After completing this module, students will be able to: Design authentication and authorization solutions. Design network solutions. Module 4: Design business continuity solutions Lessons of Module 4 Design for backup and disaster recovery Design monitoring solutions Design for migrations Lab : Case studies of Module 4 After completing this module, students will be able to: Design backup and disaster recovery. Design monitoring solutions. Design for migrations. [-]
Les mer
Oslo 5 dager 27 500 kr
22 Apr
10 Jun
10 Jun
AZ-305: Microsoft Azure Architect Design [+]
AZ-305: Microsoft Azure Architect Design [-]
Les mer
5 dager 25 500 kr
MS-500: Microsoft 365 Security Administrator [+]
MS-500: Microsoft 365 Security Administrator [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
2 dager 12 900 kr
Ønsker du å jobbe med ulike tegninger i Visio, men føler du ikke mestrer programmet? Vil du i tillegg kunne lage egne maler for å jobbe mer effektivt? Da er ”Visio ... [+]
Ønsker du å jobbe med ulike tegninger i Visio, men føler du ikke mestrer programmet? Vil du i tillegg kunne lage egne maler for å jobbe mer effektivt? Da er ”Visio Grunnleggende” kurset for deg! Kurset kan også spesialtilpasses og holdes bedriftsinternt i deres eller våre lokaler.   Kursinnhold:   Dag 1    Hva er Visio? Få oversikt. Bli kjent med programvinduet og hvordan du kan tilpasse det etter dine behov. Mal. Hvordan er en mal bygd opp og hvordan jobbe med en tegning? Formatering. Lær å formatere og hva formateringsbegrepet betyr. Sjablonger og figurer. Hva er sjablonger og figurer?   Å jobbe effektivt med Visio Bygge opp en tegning. Lær å bygge opp en tegning fra bunnen av. Hurtigtaster. Effektiv bruk av tastatur og mus. Formatering. Bruk formatering for å gjøre tegningene oversiktlige og informasjonen mest mulig tilgjengelig. Ark. Lær å jobbe med flere ark, navngi dem, slette dem, bruke bakgrunner etc. Praktisk oppgaveløsing. Jobb med skreddersydde oppgaver innenfor dagens temaer. Andre Office-programmer. Lær å bruke Visio-tegninger i andre Office-programmer.   Flytskjema og organisasjonskart Koblinger. Lær å koble figurer på en effektiv måte. Oppsett. Hvordan sørge for at figurene står plassert på en nøyaktig og oversiktlig måte? Navigasjon. Bygge opp praktisk navigasjon mellom sidene i en større tegning.   Dag 2    Nettverksdiagram Figurdata. Knytt praktisk informasjon til figurene i tegningen. Rapporter. Hvordan hente ut rapporter fra en tegning?   Prosjektplaner Tidslinje. Illustrere faser i et prosjekt på en oversiktlig måte. Gantt-diagram. Vise prosjektinformasjon på en mer detaljert måte. Utskrift. Få oversikt over de vanligste problemstillingene ved utskrift.   Egne maler Maler. Hva er maler, deres styrke og hvordan kan jeg utnytte dem best mulig i mitt arbeid? Sjablonger. Bygge opp en egen samling med de figurene du skal bruke. Figurer. Lær å lage egne tilpassede figurer. Praktisk oppgaveløsing. Jobb med skreddersydde oppgaver innenfor dagens temaer.   4 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Små kursgrupper 4. Kvalitets- og startgaranti   [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
The Implementing and Operating Cisco Enterprise Network Core Technologies course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterpri... [+]
COURSE OVERVIEW  Learn how to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. The automation and programmability of Enterprise networks is also incorporated in this course. This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 CE credits toward recertification   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 3 days of self study. The self-study content will be provided as part of the digital courseware that you receive at the beginning of the course and should be part of your preparation for the exam. Additional lab access will be provided at the end of the class, this will be valid for 60 hours or 90 days whichever is the shorter. It will be possible to complete all but 7 of the labs after the class. TARGET AUDIENCE Network engineers involved in the installation, support and troubleshooting of enterprise networks. COURSE OBJECTIVES After completing this course you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using EtherChannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Centre™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Centre and vManage COURSE CONTENT Examining Cisco Enterprise Network Architecture Cisco Enterprise Architecture Model Campus LAN Design Fundamentals Traditional Multilayer Campus Layer Design Campus Distribution Layer Design   Understanding Cisco Switching Paths Layer 2 Switch Operation Control and Data Plane Cisco Switching Mechanisms Implementing Campus LAN Connectivity Revisiting VLANs Trunking with 802.1Q Inter-VLAN Routing Building Redundant Switched Topology Spanning-Tree Protocol Overview Spanning-Tree Protocol Operation Spanning-Tree Protocols Types and Features Multiple Spanning Tree Protocol PortFast and BPDU Implementing Layer 2 Port Aggregation (Self-Study) Need for EtherChannel EtherChannel Mode Interactions Layer 2 EtherChannel Configuration Guidelines EtherChannel Load-Balancing Options Troubleshoot EtherChannel Issues Understanding EIGRP EIGRP Features EIGRP Reliable Transport Establishing EIGRP Neighbour Adjacency EIGRP Metrics EIGRP Path Selection Explore EIGRP Path Selection Explore EIGRP Load Balancing and Sharing EIGRP for IPv6 Compare EIGRP and OSPF Routing Protocols Implementing OSPF Describe OSPF The OSPF Process OSPF Neighbour Adjacencies Building a Link-State Database OSPF LSA Types Compare Single-Area and Multi-Area OSPF OSPF Area Structure OSPF Network Types Optimizing OSPF OSPF Cost OSPF Route Summarization Benefits OSPF Route Filtering Tools Compare OSPFv2 and OSPFv3 Exploring EBGP Interdomain Routing with BGP BGP Operations Types of BGP Neighbour Relationships BGP Path Selection BGP Path Attributes Implementing Network Redundancy Need for Default Gateway Redundancy Define FHRP HSRP Advanced Features Cisco Switch High Availability Features Implementing NAT Define Network Address Translation NAT Address Types Explore NAT Implementations NAT Virtual Interface Introducing Virtualisation Protocols and Techniques Server Virtualisation Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Introducing Virtualisation Protocols and Techniques Server Virualization Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Understanding Virtual Private Networks and Interfaces Site-to-Site VPN Technologies IPSec VPN Overview IPSec: IKE IPsec Modes IPsec VPN Types Cisco IOS VTI Understanding Wireless Principles Explain RF Principles Describe Watts and Decibels Describe Antenna Characteristics Describe IEEE Wireless Standards Identify Wireless Component Roles Examining Wireless Deployment Options Wireless Deployment Overview Describe Autonomous AP Deployment Describe Centralized Cisco WLC Deployment Describe FlexConnect Deployment Cloud Deployment and Its Effect on Enterprise Networks Describe the Cloud-Managed Meraki Solution Cisco Catalyst 9800 Series Controller Deployment Options Describe Cisco Mobility Express Understanding Wireless Roaming and Location Services Wireless Roaming Overview Mobility Groups and Domains Wireless Roaming Types Describe Location Services Examining Wireless AP Operation Universal AP Priming Explore the Controller Discovery Process Describe AP Failover Explain High Availability Explore AP Modes Understanding Wireless Client Authentication Authentication Methods Pre-Shared Key (PSK) Authentication 802.1X User Authentication Overview PKI and 802.1X Certificate Based Authentication Introduction to Extensible Authentication Protocol EAP-Transport Layer Security (EAP-TLS) Protected Extensible Authentication Protocol EAP-FAST Guest Access with Web Auth Troubleshooting Wireless Client Connectivity Wireless Troubleshooting Tools Overview Spectrum Analysis Wi-Fi Scanning Packet Analysis Cisco AireOS GUI and CLI Tools Cisco Wireless Config Analyzer Express Common Wireless Client Connectivity Issues Overview Client to AP Connectivity WLAN Configuration Infrastructure Configuration Introducing Multicast Protocols (Self-study) Multicast Overview Internet Group Management Protocol Multicast Distribution Trees IP Multicasting Routing Rendezvous Point Introducing QoS (Self-study) Understand the Impact of User Applications on the Network Need for Quality of Service (QoS) Describe QoS Mechanisms Define and Interpret a QoS Policy Implementing Network Services Understanding Network Time Protocol Logging Services Simple Network Management Protocol Introducing NetFlow Flexible NetFlow Understanding Cisco IOS Embedded Event Manager Using Network Analysis Tools Troubleshooting Concepts Network Troubleshooting Procedures: Overview Network Troubleshooting Procedures: Case Study Basic Hardware Diagnostics Filtered Show Commands Cisco IOS IP SLAs Switched Port Analyzer(SPAN) Overview Remote SPAN (RSPAN) Encapsulated Remote Switched Port Analyzer(ERSAPN) Cisco Packet Capture Tools Overview Implementing Infrastructure Security ACL Overview ACL Wildcard Masking Types of ACLs Configure Numbered Access Lists Use ACLs to Filter Network Traffic Apply ACLs to Interfaces Configured Named Access Lists Control Plane Overview Control Plane Policing Implementing Secure Access Control Securing Device Access AAA Framework Overview Benefits of AAA Usage Authentication Options RADIUS and TACACS+ Enabling AAA and Configuring a Local User for Fallback Configuring RADIUS for Console and VTY Access Configuring TACACS+ for Console and VTY Access Configure Authorization and Accounting Understanding Enterprise Network Security Architecture (Self-study) Explore Threatscape Cisco Intrusion Prevention Systems Virtual Private Networks Content Security Logging Endpoint Security Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Firewall Concepts TrustSec MACsec Identity Management 802.1X for Wired and Wireless Endpoint Authentication MAC Authentication Bypass Web Authentication Exploring Automation and Assurance Using Cisco DNA Centre (Self-study) Need for Digital Transformation Cisco Digital Network Architecture Cisco Intent-Based Networking Cisco DNA Centre Automation Overview Cisco DNA Centre Platform Overview Cisco DNA Centre Design Cisco DNA Centre Inventory Overview Cisco DNA Centre Configuration and Management Overview Onboarding of Network Devices Using Cisco DNA Centre Cisco DNA Centre Software Image Management Overview Cisco DNA Assurance Key Features and Use Cases Cisco DNA Centre Assurance Implementation Workflow Examining the Cisco SD-Access Solution (Self-study) Need for Cisco SD-Access Cisco SD Access Overview Cisco SD-Access Fabric Components Cisco SD-Access Fabric Control Plane Based on LISP Cisco SD-Access Fabric Control Plane Based on VXLAN Cisco SD-Access Fabric Control Plane Based on Cisco TrustSec Role of Cisco ISE and Cisco DNA Centre in SD-Access Cisco SD-Access Wireless Integration Traditional Campus Interoperating with Cisco SD-Access Understanding the Working Principles of the Cisco SD-WAN Solution (Self-study) Need for Software Defined Networking for WAN Cisco SD-WAN Components and Functions Cisco SD-WAN Orchestration Plane Cisco SD-WAN Management Plane- vManage Cisco SD-WAN Control Plane - vSmart Cisco SD-WAN Data Plane - WAN Edge Cisco SD-WAN Programmatic APIs Cisco SD-WAN Automation and Analytics Cisco SD-WAN Terminology Cisco IOS XE and IOS XE SD-WAN Software Flexible Controller Deployment Options Cisco SD-WAN Security Understanding the Basics of Python Programming Describe Python Concepts String Data Types Numbers Data Types Boolean Data Types Script Writing and Execution Analyse Code Introducing Network Programmability Protocols Configuration Management Evolution of Device Management and Programmability Data Encoding Formats Understanding JSON Model Driven Programmability Stack Introduction to YANG Types of YANG Models Understanding NETCONF Explain NETCONF and YANG REST Understanding RESTCONF Protocol Introducing APIs in Cisco DNA Centre and vManage (Self-study) Application Programming Interfaces REST API Response Codes and Results REST API Security Cisco DNA Centre APIs Cisco SD-WAN REST API Overview Labs Lab 1: Investigate the CAM Lab 2: Analyse Cisco Express Forwarding Lab 3: Troubleshoot VLAN and Trunk Issues Lab 4: Tuning STP and Configuring RSTP Lab 5: Configure Multiple Spanning Tree Protocol Lab 6: Troubleshoot EtherChannel Lab 7: Implementing Multiarea OSPF Lab 8: Implement OSPF Tuning Lab 9: Apply OSPF Optimization Lab 10: Implement OSPFv3 Lab 11: Configure and Verify Single-Homed EBGP Lab 12: Implementing HSRP Lab 13: Configure VRRP Lab 14: Implement NAT Lab 15: Configure and Verify VRF Lab 16: Configure and Verify a GRE Tunnel Lab 17: Configure Static VTI Point-to-Point Tunnels Lab 18: Configure Wireless Client Authentication in a Centralized Deployment (No Extended Access) Lab 19: Troubleshoot Wireless Client Connectivity Issues (No Extended Access) Lab 20: Configure Syslog Lab 21: Configure and Verify Flexible NetFlow Lab 22: Configuring Cisco IOS Embedded Event Manager (EEM) Lab 23: Troubleshoot Connectivity and Analyse Traffic with Ping, Traceroute and Debug Lab 24: Configure and Verify Cisco IP SLA's Lab 25: Configure Standard and Extended ACLs Lab 26: Configure Control Plane Policing Lab 27: Implement Local and Server-Based AAA (No Extended Access) Lab 28: Writing and Troubleshooting Python Scripts (No Extended Access) Lab 29: Explore JSON Objects and Scripts in Python (No Extended Access) Lab 30: Use NETCONF via SSH (No Extended Access) Lab 31: Use RESTCONF with Cisco IOS XE Software (No Extended Access) [-]
Les mer
Nettkurs 2 timer 3 120 kr
Bluebeam Revu er en komplett PDF-løsning, som lar deg opprette og redigere PDF-dokumenter og tegninger. Videre kan du markere opp og gjøre mengdeuttak fra tegningene, sam... [+]
På dette online-kurset vil du lære: Publisering, redigering, kommentering og markering Sikkerhet, digitale stempler og digital signatur Opprette og lagre symboler og tilpassede markeringsverktøy i Tool Chest Skybasert samarbeid og deling av dokumenter i Bluebeam Studio eXtreme-funksjoner (OCR – Tekstfjerning - Skjema-opprettelse - Batch Link) Noen eXtreme-funksjoner blir vist/nevnt i kurset [-]
Les mer
Nettkurs 2 timer 1 690 kr
Tekst er ikke alltid best egnet til å kommunisere ditt budskap. Dette webinaret viser deg hvordan du enkelt og effektivt benytter figurer, smart art modeller, diagrammer.... [+]
Tekst er ikke alltid best egnet til å kommunisere ditt budskap. Dette webinaret viser deg hvordan du enkelt og effektivt benytter figurer, smart art modeller, diagrammer, bilder og video. Du får en rekke tips som vil bidra til at du sparer mye tid.  Webinaret varer i 2 timer og består av to økter à 45 min. Etter hver økt er det 10 min spørsmålsrunde. Mellom øktene er det 10 min pause.  Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.    Kursinnhold:   Innsetting av ulike objekter Figurer og SmartArt Bilder Video - ha kontroll på avspilling   Bruk av diagrammer Koblinger til Excel Håndtere koblinger   Håndtering av objekter Justere og fordele Fordeler og ulemper ved gruppering   3 gode grunner til å delta 1. Lær og justere og fordele objekter effektivt 2. Lag figurmodeller raskt og enkelt 3. Ha kontroll på koblede objekter   [-]
Les mer
Oslo Bergen Og 1 annet sted 2 dager 16 900 kr
13 May
06 Jun
20 Jun
htWeb Security for Developers [+]
httpWeb Security for Developers [-]
Les mer
Klasserom + nettkurs 1 dag 5 490 kr
Excel controllere/økonomer kurs vinklet fra en Controllers hverdag med fokus på gode metoder for å arbeid med Excel-lister. Påfyllet kurset gir deg, gjør deg i stand... [+]
Excel controllere/økonomer kurs vinklet fra en Controllers hverdag med fokus på gode metoder for å arbeide med Excel-lister. Påfyllet kurset gir deg, gjør deg i stand til å jobbe mer effektivt i Excel. Kursets mange eksempler, viser hva du virkelig kan få til i Excel, enten det er å jobbe med formler / funksjoner, lister eller store Excel-modeller. Kurset er utviklet av controllere, med det for øye at du skal kunne angripe dine Excel-utfordringer på en smart og effektiv måte. Kurset kan også spesialtilpasses og holdes bedriftsinternt i deres eller våre lokaler.   Kursinnhold:     Datautveksling/Klargjøring av data Mulige inndatametoder: Importering av tekstfil, webspørringer, innliming av data fra WWW. Importere data med ulikt dataformat: tekst - eller databaseformat Formatproblemer ifm. dataimport: ”feil” formater, fjerne deler av informasjon i en celle, fjerne duplikater, kjapt finne skrivefeil   Data/Konsolider Konsolider data: hvor data ligger i samme regneark Konsolidering data: hvor dataene skal behandles på tvers av regneark. Konsolidering data: hvor data ligger i ulike arbeidsbøker   Tabeller/Listefunksjonalitet Definisjonen av en tabell: Viktig å huske når tabellen skal behandles videre. Jobbe med en liste: få gode råd angående arbeid med lister Sortere tabellen: kjapt og enkelt med egendefinerte sorteringsnøkler Filter med Autofilter: filtrere ut bare de data du ønsker eller slette tomme rader. Filter med Avansert filter: få råd om i hvilke situasjoner det er smart å bruke avansert filter og hvordan du enklest bruker dette filteret. Beregninger i tabeller og lister Beregninger med flere variabler: Funksjonene Dsummer, Dantall og DGjennomsnitt Organiser og beregne data : Ved hjelp av delsammendrag. Lær hvordan resultatet kan kopieres til et annet sted. Oppslag i en liste: Funksjonene Finn.Kolonne og Finn.Rad Lag rapporter ved hjelp av Pivotteknikk: Opplev hvor enkelt det er å lage rapporter ved hjelp av pivotteknikk!   "Hva hvis"-analyser og optimalisering Sensitivitetsanalyse: Målsøking er en måte å regne ”baklengs” på. Sensitivitetsanalyse: Tabeller med 1 og 2 variabler Optimalisering: Ved hjelp av Problemløseren   Samarbeid med andre Deling av arbeidsbøker: ved ønske om å jobbe samtidig i samme arbeidsbok Sporing av endringer: når du ønsker å plukke opp de endringer andre har gjort     4 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Små kursgrupper 4. Kvalitets- og startgaranti   [-]
Les mer