IT-kurs
Troms
Du har valgt: Nordreisa
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Nordreisa ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Learn best practices for making new and changed services available for use, in line with your organisation's policies and any agreements between the organisation and its ... [+]
Understand the purpose and key concepts of Release Management, elucidating its significance in planning, scheduling, and controlling the build, test, and deployment of releases to ensure they deliver the expected outcomes. The eLearning course: Interactive Self-paced Device-friendly 2-3 hour content Mobile-optimised Practical exercises   Exam:   20 questions Multiple choise Closed book 30 minutes Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Receive practical guidance on the processes and activities of Problem Management, including their roles in the service value chain. [+]
Understand the purpose and key concepts of Problem Management, including its role in identifying and managing the root causes of incidents to prevent recurrence.   This eLearning is: Interactive   Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
2 dager 7 900 kr
Etter fullført kurs skal du kunne tegne illustrasjoner og logoer, klargjøre illustrasjoner for utkjøring og ha oversikt over programmets bruksområder. [+]
Vil du lære å tegne illustrasjoner og logoer til bruk i alle medier? Illustrator tegner vektorgrafikk som kan forstørres ubegrenset, uten å tape kvalitet og kan derfor brukes overalt. Adobe Illustrator er verktøyet for illustratører og grafiske designere, men også et program for deg som vil lage litt enklere illustrasjoner til internett, Power Point og Word. På kurset lærer du å ta utgangspunkt i enkle basisformer og kombinere dem til kompliserte figurer, slik at det blir det lett for alle å tegne. Hvorfor ta dette kurset: Du får en grundig innføring i programmet Du vil lære konkrete tegne- og designoppgaver Du vil lære å redigere/endre Illustrator-filer du mottar Du vil lære å lage illustrasjoner og logoer Du vil lære å lage grafikk for bruk på internett, lesebrett eller mobil Du vil lære effektive arbeidsmetoder Du får kontroll på tegninger med mange elementer og lag Du vil lære om fargebruk og klargjøring av filer for trykk og nett Dette lærer du: Arbeidsmiljøet i programmet Tegning med tegneverktøyene og ved å kombinere enkle grunnformer Redigering og transformering av objekter Innsetting av tekst og bilder Tekstbearbeiding Lage bannerannonser Bruk av farger og forløpninger Lag og gjennomsiktighet [-]
Les mer
Oslo 3 dager 20 900 kr
27 Aug
10 Dec
10 Dec
Test-Driven JavaScript - (Hands-on) [+]
Test-Driven JavaScript - (Hands-on) [-]
Les mer
5 dager 25 500 kr
MS-101: Microsoft 365 Mobility and Security [+]
MS-101: Microsoft 365 Mobility and Security [-]
Les mer
Oslo 4 dager 23 900 kr
Angular 14 Development [+]
Angular 14 Development [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Installasjon, konfigurering og bruk av epost-tjener og Outlook klient. Bruk av PowerShell for å drifte Exchange server. Installasjon, konfigurering og bruk av SQL-tjener.... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Kunnskaper om Windows server eller gode generelle nettverkskunnskaper eller tilsvarende. Innleveringer: 8 av 12 øvinger må være godkjent. Personlig veileder: ja Vurderingsform: 3 timers individuell skriftlig eksamen Ansvarlig: Jostein Lund Eksamensdato: 02.12.13 / 05.05.14         Læremål: KUNNSKAPER:Kandidaten:- har innsikt i drift av epost- og database-servere- kjenner til løsninger for å eksportere og importere data for epost- og database-servere FERDIGHETER:Kandidaten kan:- installere, konfigurere, drifte og sikre en Exchange epost-server- sette opp og distribuere Outlook til klienter- bruke PowerShell til å automatisere driftsoppgaver i Exchange- installere, konfigurere og drifte en SQL server GENERELL KOMPETANSE:Kandidaten har:- perspektiv og kompetanse i å velge riktige og tilpassete driftsløsninger- kompetanse i å formidle driftsterminologi, både muntlig og skriftlig Innhold:Installasjon, konfigurering og bruk av epost-tjener og Outlook klient. Bruk av PowerShell for å drifte Exchange server. Installasjon, konfigurering og bruk av SQL-tjener. Utveksling av data mellom løst sammenkoblede systemer. Finne, dele og publisere informasjon. Følgende programvare vil bli gjennomgått som supplement for å belyse den teoretiske gjennomgangen: Microsoft Exchange Server, Microsoft SharePoint Portal Server, Microsoft SQL Server. Nødvendig programvare kan fritt lastes ned.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Drift av MS Exchange og MS SQL Server 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.   [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
OFFICIAL (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL TRAINING - INCLUDING EXAM [+]
COURSE OVERVIEW The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the cybersecurity market. CISSP validates a cybersecurity professional’s deep technical and managerial knowledge and experience to effectively design, engineer and manage an organization’s overall security posture. Please note an exam voucher is included as part of this course TARGET AUDIENCE Cybersecurity professionals with at least 5 years in the information security field. Member data has shown that amajority of CISSP holders are in middle management and a much smaller proportion are in senior or junior/entry-level positions. Roles include:• Chief Information Officer• Chief Information Security Officer• Chief Technology Officer• Compliance Manager / Officer• Director of Security• Information Architect• Information Manager / Information RiskManager or Consultant• IT Specialist / Director / Manager• Network / System Administrator• Security Administrator• Security Architect / Security Analyst• Security Consultant• Security Manager• Security Systems Engineer / Security EngineerSectorsCISSP is relevant across all sectors and industries, including:• Aerospace• Automotive• Banking, financial services, insurance (BFSI)• Construction• Cybersecurity• Energy• Engineering• Government• Healthcare, IT products, services, consulting• Manufacturing• Pharma• Retail• Telecom COURSE OBJECTIVESAfter completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age. Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections. Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function. List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7. Identify standard terms for applying physical and logical access controls to environments related to their security practice. Appraise various access control models to meet business security requirements. Name primary methods for designing and validating test and audit strategies that support business requirements. Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures. Recognize risks to an organization’s operational endeavours and assess specific threats, vulnerabilities and controls. Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security. COURSE CONTENT Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security Architecture and Engineering Domain 4: Communication and Network Security Domain 5: Identity and Access Management (IAM) Domain 6: Security Assessment and Testing Domain 7: Security Operations Domain 8: Software Development Security TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)2 Certified Information Systems Security Professional Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification Please note an exam voucher is included as part of this course   [-]
Les mer
Oslo Trondheim Og 1 annet sted 5 dager 34 000 kr
18 Aug
25 Aug
25 Aug
TOGAF® EA Course Combined [+]
TOGAF® EA Course Combined [-]
Les mer
1 dag 9 900 kr
Jira Project Administration (Cloud) [+]
Jira Project Administration (Cloud) [-]
Les mer
Oslo 1 dag 9 900 kr
22 Sep
22 Sep
01 Dec
ITIL® 4 Practitioner: Change enablement [+]
ITIL® 4 Practitioner: Change Enablement [-]
Les mer
Virtuelt klasserom 3 dager 20 000 kr
Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. [+]
 This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure. TARGET AUDIENCE This course is designed for data scientists with existing knowledge of Python and machine learning frameworks like Scikit-Learn, PyTorch, and Tensorflow, who want to build and operate machine learning solutions in the cloud. COURSE CONTENT Module 1: Introduction to Azure Machine Learning In this module, you will learn how to provision an Azure Machine Learning workspace and use it to manage machine learning assets such as data, compute, model training code, logged metrics, and trained models. You will learn how to use the web-based Azure Machine Learning studio interface as well as the Azure Machine Learning SDK and developer tools like Visual Studio Code and Jupyter Notebooks to work with the assets in your workspace. Getting Started with Azure Machine Learning Azure Machine Learning Tools Lab : Creating an Azure Machine Learning WorkspaceLab : Working with Azure Machine Learning Tools After completing this module, you will be able to Provision an Azure Machine Learning workspace Use tools and code to work with Azure Machine Learning Module 2: No-Code Machine Learning with Designer This module introduces the Designer tool, a drag and drop interface for creating machine learning models without writing any code. You will learn how to create a training pipeline that encapsulates data preparation and model training, and then convert that training pipeline to an inference pipeline that can be used to predict values from new data, before finally deploying the inference pipeline as a service for client applications to consume. Training Models with Designer Publishing Models with Designer Lab : Creating a Training Pipeline with the Azure ML DesignerLab : Deploying a Service with the Azure ML Designer After completing this module, you will be able to Use designer to train a machine learning model Deploy a Designer pipeline as a service Module 3: Running Experiments and Training Models In this module, you will get started with experiments that encapsulate data processing and model training code, and use them to train machine learning models. Introduction to Experiments Training and Registering Models Lab : Running ExperimentsLab : Training and Registering Models After completing this module, you will be able to Run code-based experiments in an Azure Machine Learning workspace Train and register machine learning models Module 4: Working with Data Data is a fundamental element in any machine learning workload, so in this module, you will learn how to create and manage datastores and datasets in an Azure Machine Learning workspace, and how to use them in model training experiments. Working with Datastores Working with Datasets Lab : Working with DatastoresLab : Working with Datasets After completing this module, you will be able to Create and consume datastores Create and consume datasets Module 5: Compute Contexts One of the key benefits of the cloud is the ability to leverage compute resources on demand, and use them to scale machine learning processes to an extent that would be infeasible on your own hardware. In this module, you'll learn how to manage experiment environments that ensure consistent runtime consistency for experiments, and how to create and use compute targets for experiment runs. Working with Environments Working with Compute Targets Lab : Working with EnvironmentsLab : Working with Compute Targets After completing this module, you will be able to Create and use environments Create and use compute targets Module 6: Orchestrating Operations with Pipelines Now that you understand the basics of running workloads as experiments that leverage data assets and compute resources, it's time to learn how to orchestrate these workloads as pipelines of connected steps. Pipelines are key to implementing an effective Machine Learning Operationalization (ML Ops) solution in Azure, so you'll explore how to define and run them in this module. Introduction to Pipelines Publishing and Running Pipelines Lab : Creating a PipelineLab : Publishing a Pipeline After completing this module, you will be able to Create pipelines to automate machine learning workflows Publish and run pipeline services Module 7: Deploying and Consuming Models Models are designed to help decision making through predictions, so they're only useful when deployed and available for an application to consume. In this module learn how to deploy models for real-time inferencing, and for batch inferencing. Real-time Inferencing Batch Inferencing Lab : Creating a Real-time Inferencing ServiceLab : Creating a Batch Inferencing Service After completing this module, you will be able to Publish a model as a real-time inference service Publish a model as a batch inference service Module 8: Training Optimal Models By this stage of the course, you've learned the end-to-end process for training, deploying, and consuming machine learning models; but how do you ensure your model produces the best predictive outputs for your data? In this module, you'll explore how you can use hyperparameter tuning and automated machine learning to take advantage of cloud-scale compute and find the best model for your data. Hyperparameter Tuning Automated Machine Learning Lab : Tuning HyperparametersLab : Using Automated Machine Learning After completing this module, you will be able to Optimize hyperparameters for model training Use automated machine learning to find the optimal model for your data Module 9: Interpreting Models Many of the decisions made by organizations and automated systems today are based on predictions made by machine learning models. It's increasingly important to be able to understand the factors that influence the predictions made by a model, and to be able to determine any unintended biases in the model's behavior. This module describes how you can interpret models to explain how feature importance determines their predictions. Introduction to Model Interpretation using Model Explainers Lab : Reviewing Automated Machine Learning ExplanationsLab : Interpreting Models After completing this module, you will be able to Generate model explanations with automated machine learning Use explainers to interpret machine learning models Module 10: Monitoring Models After a model has been deployed, it's important to understand how the model is being used in production, and to detect any degradation in its effectiveness due to data drift. This module describes techniques for monitoring models and their data. Monitoring Models with Application Insights Monitoring Data Drift Lab : Monitoring a Model with Application InsightsLab : Monitoring Data Drift After completing this module, you will be able to Use Application Insights to monitor a published model Monitor data drift   [-]
Les mer
1 dag 3 700 kr
Klasseromskurs små klasser maks 5 personer. Kurs kan holdes bedriftinternt i din bedrift, eller også via Zoom. Lær gode regnearkoppsett med formler, funksjoner og diagr..... [+]
Innhold: Bygge opp gode regnearkoppsett med formler, funksjoner og diagrammer. Summere flere regneark. Låse celler. Absolutt celle referanse, parenteser, hvis formler, Pivottabell. Kursholder Marianne Nylund er utdannet systemasvarlig/IKT-rådgiver fra forsvaret,Hun er sertifisert Microsoft-instruktør og har holdtMicrosoft Office-kurs siden 1998. Kursleder er tydelig, pedagogisk og flink til å forklare. Hun engasjerer sine kursdeltakere og gjør det underholdende å delta på våre kurs.Hun er meget tålmodig og tilpasser undervisningen etter hver enkelt deltagers behov, slik at alle skal få et stort utbytte av kursene.   [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Fi... [+]
COURSE OVERVIEW The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment TARGET AUDIENCE This course is aimed at Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff. COURSE OBJECTIVES After you complete this course, you will be able to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports COURSE CONTENT 1 - Palo Alto Networks Portfolio and Architecture 2 - Configuring Initial Firewall Settings 3 - Managing Firewall Configurations 4 - Managing Firewall Administrator Accounts 5 - Connecting the Firewall to Production Networks with Security Zones 6 - Creating and Managing Security Policy Rules 7 - Creating and Managing NAT Policy Rules 8 - Controlling Application Usage with App-ID 9 - Blocking Known Threats Using Security Profiles 10 - Blocking Inappropriate Web Traffic with URL Filtering 11 - Blocking Unknown Threats with Wildfire 12 - Controlling Access to Network Resources with User-ID 13 - Using Decryption to Block Threats in Encrypted Traffic 14 - Locating Valuable Information Using Logs and Reports 15 - What's Next in Your Training and Certification Journey Supplemental Materials Securing Endpoints with GlobalProtect Providing Firewall Redundancy with High Availability Connecting Remotes Sites using VPNs Blocking Common Attacks Using Zone Protection   FURTHER INFORMATION Level: Introductory Duration: 5 days Format: Lecture and hands-on labs Platform support: Palo Alto Networks next-generation firewalls running PAN-OS® operating system version 11.0     [-]
Les mer