IT-kurs
Sør-Trøndelag
Du har valgt: Orkdal
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Orkdal ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Learn best practices for making new and changed services available for use, in line with your organisation's policies and any agreements between the organisation and its ... [+]
Understand the purpose and key concepts of Release Management, elucidating its significance in planning, scheduling, and controlling the build, test, and deployment of releases to ensure they deliver the expected outcomes. The eLearning course: Interactive Self-paced Device-friendly 2-3 hour content Mobile-optimised Practical exercises   Exam:   20 questions Multiple choise Closed book 30 minutes Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of Information Security Management, elucidating its significance in safeguarding the confidentiality, integrity, and availability of organisational information assets. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
5 dager 27 900 kr
ISO/IEC 27005 Lead Risk Manager [+]
ISO/IEC 27005 Lead Risk Manager [-]
Les mer
Virtuelt klasserom 3 timer 2 500 kr
04 Sep
23 Oct
04 Dec
Vi går gjennom oppbygging av pivottabeller og pivotdiagrammer og jobber oss inn i mer detaljerte og avanserte måter å presentere dataene samt tips og triks for å få tabel... [+]
Datagrunnlaget Gruppering Formatering Tallformater Visningsalternativer Feltinnstillinger Beregnede felt Bruk av flere pivottabeller i samme arbeidsbok Slicere som virker på flere pivottabeller eller pivotdiagrammer Tabellfunksjonalitet   Analyse av pivotdiagram Bruk av pivotdiagram i andre programmer   et er fordelaktig å ha to skjermer - en til å følge kurset og en til å gjøre det kursholder demonstrerer. Kurset gjennomføres i sanntid med nettundervisning via Teams. Det blir mulighet for å stille spørsmål, ha diskusjoner, demonstrasjoner og øvelser. Du vil motta en invitasjon til Teams fra kursholder.   [-]
Les mer
Virtuelt eller personlig 1 dag 3 120 kr
Målsetning for kurset: Opparbeide ferdigheter i å navigere, kommunisere og hente ut informasjon fra BIM-modeller i IFC-formatet med bruk av Solibri Anywhere. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt.NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Solibri Anywhere og Site   På kurset vil du lære å: Sammenstille flere IFC-modeller og navigere i disse Velge ut grupper av objekter for nærmere studier Legge inn snitt, måle, markere og opprette slides fra visninger av modellen Opprette rapporter og kommentere «issues» i Excel og BCF-format Se på resultatet av utførte regelsjekker i modellen Se på resultatet av utførte informasjons- og mengdeuttak fra modellen Høste informasjon og mengder fra modellen basert på eksisterende maler og klassifikasjoner Skape egne klassifikasjoner og definisjoner for megndeuttak   Dette er et populært kurs, meld deg på nå! Spesialtilpasset kurs: NTI anbefaler spesialtilpassede kurs for bedrifter som planlegger å sende to eller flere deltakere på Solibri-kurs. Grunnen til dette er at Solibri brukes av mange forskjellige aktører og profesjoner i BAE-bransjen, og følgelig blir de åpne kursene ofte for generelle for enkelte kursdeltakere. I et spesialtilpasset kurs vil vår kurskonsulent kartlegge fokusområdene i forkant av kurset, og gjennomføre kurset i henhold til selskapets behov, gjerne basert på kundens egne modeller. Utbyttet av kurset blir følgelig mye større.  Ta kontakt med oss på telefon 483 12 300, epost: salg-no@nti.biz eller les mer på www.nti.biz   [-]
Les mer
Virtuelt klasserom 4 dager 20 000 kr
This four-day instructor-led course is designed for IT professionals who configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW These professionals manage and support an infrastructure that includes on-premises and Azure IaaS-hosted Windows Server-based workloads. The course teaches IT professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to manage and secure Azure VMs running Windows Server. The course also covers how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights various administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. COURSE OBJECTIVES After you complete this course you will be able to: Harden the security configuration of the Windows Server operating system environment. Enhance hybrid security using Azure Security Center, Azure Sentinel, and Windows Update Management. Apply security features to protect critical resources. Implement high availability and disaster recovery solutions. Implement recovery services in hybrid scenarios. Plan and implement hybrid and cloud-only migration, backup, and recovery scenarios. Perform upgrades and migration related to AD DS, and storage. Manage and monitor hybrid scenarios using WAC, Azure Arc, Azure Automation and Azure Monitor. Implement service monitoring and performance monitoring, and apply troubleshooting. COURSE CONTENT Module 1: Windows Server security This module discusses how to protect an Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. The module covers how to limit authentication scope and remediate potentially insecure accounts. The module also describes how to harden the security configuration of a Windows Server operating system environment. In addition, the module discusses the use of Windows Server Update Services to deploy operating system updates to computers on the network. Finally, the module covers how to secure Windows Server DNS to help protect the network name resolution infrastructure. Lessons for module 1 Secure Windows Sever user accounts Hardening Windows Server Windows Server Update Management Secure Windows Server DNS Lab : Configuring security in Windows Server Configuring Windows Defender Credential Guard Locating problematic accounts Implementing LAPS After completing module 1, students will be able to: Diagnose and remediate potential security vulnerabilities in Windows Server resources. Harden the security configuration of the Windows Server operating system environment. Deploy operating system updates to computers on a network by using Windows Server Update Services. Secure Windows Server DNS to help protect the network name resolution infrastructure. Implement DNS policies. Module 2: Implementing security solutions in hybrid scenarios This module describes how to secure on-premises Windows Server resources and Azure IaaS workloads. The module covers how to improve the network security for Windows Server infrastructure as a service (IaaS) virtual machines (VMs) and how to diagnose network security issues with those VMs. In addition, the module introduces Azure Security Center and explains how to onboard Windows Server computers to Security Center. The module also describes how to enable Azure Update Management, deploy updates, review an update assessment, and manage updates for Azure VMs. The modules explains how Adaptive application controls and BitLocker disk encryption are used to protect Windows Server IaaS VMs. Finally, the module explains how to monitor Windows Server Azure IaaS VMs for changes in files and the registry, as well as monitoring modifications made to application software. Lessons for module 2 Implement Windows Server IaaS VM network security. Audit the security of Windows Server IaaS Virtual Machines Manage Azure updates Create and implement application allowlists with adaptive application control Configure BitLocker disk encryption for Windows IaaS Virtual Machines Implement change tracking and file integrity monitoring for Windows Server IaaS VMs Lab : Using Azure Security Center in hybrid scenarios Provisioning Azure VMs running Windows Server Configuring Azure Security Center Onboarding on-premises Windows Server into Azure Security Center Verifying the hybrid capabilities of Azure Security Center Configuring Windows Server 2019 security in Azure VMs After completing module 2, students will be able to: Diagnose network security issues in Windows Server IaaS virtual machines. Onboard Windows Server computers to Azure Security Center. Deploy and manage updates for Azure VMs by enabling Azure Automation Update Management. Implement Adaptive application controls to protect Windows Server IaaS VMs. Configure Azure Disk Encryption for Windows IaaS virtual machines (VMs). Back up and recover encrypted data. Monitor Windows Server Azure IaaS VMs for changes in files and the registry. Module 3: Implementing high availability This module describes technologies and options to create a highly available Windows Server environment. The module introduces Clustered Shared Volumes for shared storage access across multiple cluster nodes. The module also highlights failover clustering, stretch clusters, and cluster sets for implementing high availability of Windows Server workloads. The module then discusses high availability provisions for Hyper-V and Windows Server VMs, such as network load balancing, live migration, and storage migration. The module also covers high availability options for shares hosted on Windows Server file servers. Finally, the module describes how to implement scaling for virtual machine scale sets and load-balanced VMs, and how to implement Azure Site Recovery. Lessons for module 3 Introduction to Cluster Shared Volumes. Implement Windows Server failover clustering. Implement high availability of Windows Server VMs. Implement Windows Server File Server high availability. Implement scale and high availability with Windows Server VMs. Lab : Implementing failover clustering Configuring iSCSI storage Configuring a failover cluster Deploying and configuring a highly available file server Validating the deployment of the highly available file server After completing module 3, students will be able to: Implement highly available storage volumes by using Clustered Share Volumes. Implement highly available Windows Server workloads using failover clustering. Describe Hyper-V VMs load balancing. Implement Hyper-V VMs live migration and Hyper-V VMs storage migration. Describe Windows Server File Server high availablity options. Implement scaling for virtual machine scale sets and load-balanced VMs. Implement Azure Site Recovery. Module 4: Disaster recovery in Windows Server This module introduces Hyper-V Replica as a business continuity and disaster recovery solution for a virtual environment. The module discusses Hyper-V Replica scenarios and use cases, and prerequisites to use it. The module also discusses how to implement Azure Site Recovery in on-premises scenarios to recover from disasters. Lessons for module 4 Implement Hyper-V Replica Protect your on-premises infrastructure from disasters with Azure Site Recovery Lab : Implementing Hyper-V Replica and Windows Server Backup Implementing Hyper-V Replica Implementing backup and restore with Windows Server Backup After completing module 4, students will be able to: Describe Hyper-V Replica, pre-requisites for its use, and its high-level architecture and components Describe Hyper-V Replica use cases and security considerations. Configure Hyper-V Replica settings, health monitoring, and failover options. Describe extended replication. Replicate, failover, and failback virtual machines and physical servers with Azure Site Recovery. Module 5: Implementing recovery services in hybrid scenarios This module covers tools and technologies for implementing disaster recovery in hybrid scenarios, whereas the previous module focus on BCDR solutions for on-premises scenarios. The module begins with Azure Backup as a service to protect files and folders before highlighting how to implementRecovery Vaults and Azure Backup Policies. The module describes how to recover Windows IaaS virtual machines, perform backup and restore of on-premises workloads, and manage Azure VM backups. The modules also covers how to provide disaster recovery for Azure infrastructure by managing and orchestrating replication, failover, and failback of Azure virtual machines with Azure Site Recovery. Lessons for module 5 Implement hybrid backup and recovery with Windows Server IaaS Protect your Azure infrastructure with Azure Site Recovery Protect your virtual machines by using Azure Backup Lab : Implementing Azure-based recovery services Implementing the lab environment Creating and configuring an Azure Site Recovery vault Implementing Hyper-V VM protection by using Azure Site Recovery vault Implementing Azure Backup After completing module 5, students will be able to: Recover Windows Server IaaS virtual machines by using Azure Backup. Use Azure Backup to help protect the data for on-premises servers and virtualized workloads. Implement Recovery Vaults and Azure Backup policies. Protect Azure VMs with Azure Site Recovery. Run a disaster recovery drill to validate protection. Failover and failback Azure virtual machines. Module 6: Upgrade and migrate in Windows Server This module discusses approaches to migrating Windows Server workloads running in earlier versions of Windows Server to more current versions. The module covers the necessary strategies needed to move domain controllers to Windows Server 2022 and describes how the Active Directory Migration Tool can consolidate domains within a forest or migrate domains to a new AD DS forest. The module also discusses the use of Storage Migration Service to migrate files and files shares from existing file servers to new servers running Windows Server 2022. Finally, the module covers how to install and use the Windows Server Migration Tools cmdlets to migrate commonly used server roles from earlier versions of Windows Server. Lessons for module 6 Active Directory Domain Services migration Migrate file server workloads using Storage Migration Service Migrate Windows Server roles Lab : Migrating Windows Server workloads to IaaS VMs Deploying AD DS domain controllers in Azure Migrating file server shares by using Storage Migration Service After completing module 6, students will be able to: Compare upgrading an AD DS forest and migrating to a new AD DS forest. Describe the Active Directory Migration Tool (ADMT). Identify the requirements and considerations for using Storage Migration Service. Describe how to migrate a server with storage migration. Use the Windows Server Migration Tools to migrate specific Windows Server roles. Module 7: Implementing migration in hybrid scenarios This module discusses approaches to migrating workloads running in Windows Server to an infrastructure as a service (IaaS) virtual machine. The module introduces using Azure Migrate to assess and migrate on-premises Windows Server instances to Microsoft Azure. The module also covers how migrate a workload running in Windows Server to an infrastructure as a service (IaaS) virtual machine (VM) and to Windows Server 2022 by using Windows Server migration tools or the Storage Migration Service. Finally, this module describes how to use the Azure Migrate App Containerization tool to containerize and migrate ASP.NET applications to Azure App Service. Lessons for module 7 Migrate on-premises Windows Server instances to Azure IaaS virtual machines Upgrade and migrate Windows Server IaaS virtual machines Containerize and migrate ASP.NET applications to Azure App Service Lab : Migrating on-premises VMs servers to IaaS VMs Implementing assessment and discovery of Hyper-V VMs using Azure Migrate Implementing migration of Hyper-V workloads using Azure Migrate After completing module 7, students will be able to: Plan a migration strategy and choose the appropriate migration tools. Perform server assessment and discovery using Azure Migrate. Migrate Windows Server workloads to Azure VM workloads using Azure Migrate. Explain how to migrate workloads using Windows Server Migration tools. Migrate file servers by using the Storage Migration Service. Discover and containerize ASP.NET applcations running on Windows. Migrate a containerized application to Azure App Service. Module 8: Server and performance monitoring in Windows Server This module introduces a range of tools to monitor the operating system and applications on a Windows Server computer as well as describing how to configure a system to optimize efficiency and to troublshoot problems. The module covers how Event Viewer provides a convenient and accessible location for observing events that occur, and how to interpret the data in the event log. The module also covers how to audit and diagnose a Windows Server environment for regulatory compliance, user activity, and troubleshooting. Finally, the module explains how to troubleshoot AD DS service failures or degraded performance, including recovery of deleted objects and the AD DS database, and how to troubleshoot hybrid authentication issues. Lessons for module 8 Monitor Windows Server performance Manage and monitor Windows Server event logs Implement Windows Server auditing and diagnostics Troubleshoot Active Directory Lab : Monitoring and troubleshooting Windows Server Establishing a performance baseline Identifying the source of a performance problem Viewing and configuring centralized event logs After completing module 8, students will be able to: Explain the fundamentals of server performance tuning. Use built-in tools in Windows Server to monitor server performance. Use Server Manager and Windows Admin Center to review event logs. Implement custom views. Configure an event subscription. Audit Windows Server events. Configure Windows Server to record diagnostic information. Recover the AD DS database and objects in AD DS. Troubleshoot AD DS replication. Troubleshoot hybrid authentication issues. Module 9: Implementing operational monitoring in hybrid scenarios This module covers using monitoring and troubleshooing tools, processes, and best practices to streamline app performance and availabilty of Windows Server IaaS VMs and hybrid instances. The module describes how to implement Azure Monitor for IaaS VMs in Azure, implement Azure Monitor in on-premises environments, and use dependency maps. The module then explains how to enable diagnostics to get data about a VM, and how to view VM metrics in Azure Metrics Explorer, and how to create a metric alert to monitor VM performance. The module then covers how to monitor VM performance by using Azure Monitor VM Insights. The module then describes various aspects of troubleshooting on premises and hybrid network connectivity, including how to diagnose common issues with DHCP, name resolution, IP configuration, and routing. Finally, the module examines how to troubleshoot configuration issues that impact connectivity to Azure-hosted Windows Server virtual machines (VMs), as well as approaches to resolve issues with VM startup, extensions, performance, storage, and encryption. Lessons for module 9 Monitor Windows Server IaaS Virtual Machines and hybrid instances Monitor the health of your Azure virtual machines by using Azure Metrics Explorer and metric alerts Monitor performance of virtual machines by using Azure Monitor VM Insights Troubleshoot on-premises and hybrid networking Troubleshoot Windows Server Virtual Machines in Azure Lab : Monitoring and troubleshooting of IaaS VMs running Windows Server Enabling Azure Monitor for virtual machines Setting up a VM with boot diagnostics Setting up a Log Analytics workspace and Azure Monitor VM Insights After completing module 9, students will be able to: Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. View VM metrics in Azure Metrics Explorer. Use monitoring data to diagnose problems. Evaluate Azure Monitor Logs and configure Azure Monitor VM Insights. Configure a Log Analytics workspace. Troubleshoot on-premises connectivity and hybrid network connectivity. Troubleshoot AD DS service failures or degraded performance. Recover deleted security objects and the AD DS database. Troubleshoot hybrid authentication issues. [-]
Les mer
Nettstudie 1 semester 4 980 kr
På forespørsel
Nettstrukturer: LAN, VLAN, VPN, trådløst nett, virtuelle nett Nettutstyr: Svitsj, ruter, brannmur, basestasjon. Nettfunksjoner: Ruting, filtrering, tunnelering, port forw... [+]
Studieår: 2013-2014   Gjennomføring: Høst Antall studiepoeng: 5.0 Forutsetninger: Kunnskaper om grunnleggende datakommunikasjon, tilsvarende faget "Datakommunikasjon". Innleveringer: 8 av 12 øvinger må være godkjent for å få gå opp til eksamen. Personlig veileder: ja Vurderingsform: Skriftlig eksamen, individuell, 3 timer.  Ansvarlig: Olav Skundberg Eksamensdato: 16.12.13         Læremål: KUNNSKAPER:Kandidaten:- kan redegjøre for struktur og virkemåte for ulike typer lokale nettverk og nettverkskomponenter- kan redegjøre for kryptering og andre sikkerhetsmekanismer i kablet og trådløst nettverk- kan redegjøre for oversetting mellom interne og offentlige IP-adresser- kan redegjøre for nettverksadministrasjon og fjernpålogging på nettverksenheter FERDIGHETER:Kandidaten:- kan analysere pakketrafikk- kan konfigurere nettverk med virtuelle datamaskiner- kan administrere virtuelt nettverk og sette opp interne lukkede nettverk.- kan filtrere nettverkstrafikk i brannmur basert port, adresser og eksisterende forbindelser GENERELL KOMPETANSEKandidaten:- er bevisst på helhetlig samspill mellom de ulike teknologiene Innhold:Nettstrukturer: LAN, VLAN, VPN, trådløst nett, virtuelle nett Nettutstyr: Svitsj, ruter, brannmur, basestasjon. Nettfunksjoner: Ruting, filtrering, tunnelering, port forwarding, NAT, DHCP, IPv6. Nettadministrasjon: Fjernpålogging og trafikkanalyse.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Dette faget går: Høst 2013    Fag Nettverksteknologi 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
5 dager 20 000 kr
Machine Learning and Data Science in R with Microsoft SQL Server - with Rafal Lukawiecki [+]
Machine Learning and Data Science in R with Microsoft SQL Server - with Rafal Lukawiecki [-]
Les mer
2 dager 6 500 kr
Vil du jobbe enklere og mer effektivt i InDesign? På dette kurset vil du lære å lage gode, avanserte og tidsbesparende maler for sider, tekst og objekter, samt gjenbru... [+]
Vil du jobbe enklere og mer effektivt i InDesign? På dette kurset vil du lære å lage gode, avanserte og tidsbesparende maler for sider, tekst og objekter, samt gjenbruk via biblioteker. Etter kurset kan du lage egne maler som automatiserer mange arbeidsprosesser og sparer deg for mye tid og arbeid. Gode maler kvalitetsikrer produktetene dine og gir deg mere tid til å være kreativ. Hvem passer kurset for? Kurset passer for deg som jobber i Adobe InDesign og ønsker å utnytte programmets potensiale. Forhåndskunnskap i InDesign: «InDesign grunnkurs» eller tilsvarende kunnskap. Dette lærer du: God, effektiv og avansert bruk av maler for sider, tekst og objekter i Adobe InDesign Spar på elementer du lager med CC Libraries Lage automatisk innholdsfortegnelse Bruk av tabell Tekstlenker og registerlinjer Hvordan tilpasse en layout til ulike størrelser i samme dokument Lage egne tastatursnarveier https://igm.no/indesign-kurs-videregaende/ [-]
Les mer
Virtuelt klasserom 3 timer 6 950 kr
Kurset gir en innføring i digitalisering og hvordan digitalisering påvirker og kan utnyttes til å skape økt vekst og innovasjon. [+]
Digital strategi i styrerommet   * Ca. 3 timer kurs spesialtilpasset for mindre deltakergrupper (1 - 6 deltakere) med mulighet for dialog, spørsmål og avklaringer underveis. Kurset leveres normalt nettbasert - alternativt - som fysisk kurs etter avtale med kursholder, eller i henhold til særskilt annonsering / tilbud. Kurset / Alle våre kan også leveres som et eksklusivt kurs der kun du og foreleser deltar. Ved slik eksklusiv leveranse får du mulighet til personlig gjennomgang med en av våre profesjonell kursholdere og konsulenter innenfor det aktuelle tema. Ved bestilling av eksklusiv / personlig kursdato for deg selv, vil kursholder kontakte deg direkte, og avtale konkret kursdato. **Alle spesialkurs, kan også leveres som bedriftsinterne kurs, kurs for hele styret, hele ledergruppen etc.   Kurset gir en innføring i digitalisering og hvordan digitalisering påvirker og kan utnyttes til å skape økt vekst og innovasjon. Deltagerne får en innføring i et rammeverk for utvikling av en fokusert digital strategi tilpasset virksomheten.   I tillegg vil deltagerne vil bli kjent med nødvendige begreper, anerkjente metoder og strategiske verktøy, og få delta i spennende gruppearbeid. I tillegg ser vi på hvordan arbeid med digitalisering kan organiseres og hva som er de viktigste virkemidlene for å lykkes.    Kurset tar utgangspunktet i internasjonal forskning knyttet til digitalisering, og gir en grundig innføring i de sentrale elementene i en digital strategi som styre og ledelse i virksomhetene bør konsentrere seg om. Kurset avmystifiserer begrepet digitalisering med forenklet terminologi, og gir deltagerne det nødvendige grunnlaget for å kunne delta aktivt i å utvikle fokuserte digitale strategier. I en verden hvor digitaliseringen driver endringstakten stadig raskere, blir retning og et tydelig fremtidsbilde viktigere enn rene langsiktige mål. Samtidig må man ha et felles begrepsapparat, forstå driverne og ofte benytte utradisjonelle virkemidler og nye forretningsmodeller for å lykkes.    Formålet med kurset: Formålet er å gi deltagerne et forenklet rammeverk for å kunne diskutere og sette premisser ved utvikling av en fokusert digital strategi. Videre vil deltagerne få avmystifisert begrepet digitalisering, få en forståelse av hva digitalisering i realiteten betyr for virksomheten og få konkretisert hva man kan gjøre for å utnytte de mulighetene som digitaliseringen gir.   Kursinnhold:  Hvordan kan styret sette premisser gjennom en fokusert digital strategi? Hva er digitalisering egentlig, hva er driverne og hvor fort går det? Hvilke muligheter og trusler gir digitalisering? Hva kreves for å lykkes? Digitalisering vs. IT Digital innovasjon Digital forretningsutvikling Digital transformasjon Digitale forretningsmodeller Strategiprosesser Digital strategi Fremtidsscenario Virkemidler Strategiske partnerskap Organisering og kompetanse   Målgruppe:  Målgruppen er primært styreledere, styremedlemmer, eiere og ledere som er opptatt av prosessene omkring digitalisering og digital strategi i styrerommet.    [-]
Les mer
Arne Rettedals Hus 3 timer 3 200 kr
15 Oct
OneNote er et program fra Microsoft som gir deg mulighet til å digitalisere dine notater, og på kurset viser vi deg hvordan du jobber med opprettelse og oppbygning av not... [+]
OneNote er et program fra Microsoft som gir deg mulighet til å digitalisere dine notater. Programmet egner seg særlig for deg som har behov for å skrive møtenotater, foredragsnotater og arbeidsnotater. OneNote vil synkronisere dine notater på tvers av dine enheter, og kan benyttes på din PC, din smarttelefon eller nettbrett. Du kan bygge inn tekst og filer fra Outlook, Word, Excel og PowerPoint, samt film- og lydfiler. Har du oversikten over notater etter at møter er over? Føler du at de papirbaserte notatene over tid blir uoversiktlige og lite tilgjengelige. Du kan jobbe raskere, smartere og bedre ved å ta i bruk OneNote. I dine digitale notater i OneNote kan du inkludere tekst, bilder, lenker til filer og websider, lyd og film. Du kan ta notater fra din smarttelefon, ditt nettbrett eller din PC; alt etter hva du har tilgjengelig. Systemet vil synkronisere notatene på tvers av dine enheter. OneNote er en del av Microsoft Office og er tilgjengelig gratis for alle.  Kurset kan spesialtilpasses og holdes bedriftsinternt i deres eller våre lokaler. Deltakere må ha med egen datamaskin med relevant programvare. 6 gode grunner til å delta Du vil se hvor enkelt det er å ta raske notater Lær hvordan du finner igjen notater raskt og effektivt Du vil kunne koble notater til oppgaver i Outlook Lær å holde møtenotater koblet til avtaler og møter i Outlook Få en innføring i hvordan flere kan jobbe samtidig med notater Lær hvordan OneNote kobler lyd/videoopptak med notater Synkroniser dine notater mellom dine enheter (PC, mobil, nettbrett) Forkunnskap: Erfaring i bruk av Microsoft Office. Varighet:3 timer Pris:3200 kroner Ansatte ved UiS har egne betalingsbetingelser. [-]
Les mer
Virtuelt klasserom 4 dager 22 000 kr
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. [+]
COURSE OVERVIEW Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. TARGET AUDIENCE The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. COURSE OBJECTIVES Explain how Microsoft Defender for Endpoint can remediate risks in your environment Create a Microsoft Defender for Endpoint environment Configure Attack Surface Reduction rules on Windows 10 devices Perform actions on a device using Microsoft Defender for Endpoint Investigate domains and IP addresses in Microsoft Defender for Endpoint Investigate user accounts in Microsoft Defender for Endpoint Configure alert settings in Microsoft Defender for Endpoint Explain how the threat landscape is evolving Conduct advanced hunting in Microsoft 365 Defender Manage incidents in Microsoft 365 Defender Explain how Microsoft Defender for Identity can remediate risks in your environment. Investigate DLP alerts in Microsoft Cloud App Security Explain the types of actions you can take on an insider risk management case. Configure auto-provisioning in Azure Defender Remediate alerts in Azure Defender Construct KQL statements Filter searches based on event time, severity, domain, and other relevant data using KQL Extract data from unstructured string fields using KQL Manage an Azure Sentinel workspace Use KQL to access the watchlist in Azure Sentinel Manage threat indicators in Azure Sentinel Explain the Common Event Format and Syslog connector differences in Azure Sentinel Connect Azure Windows Virtual Machines to Azure Sentinel Configure Log Analytics agent to collect Sysmon events Create new analytics rules and queries using the analytics rule wizard Create a playbook to automate an incident response Use queries to hunt for threats Observe threats over time with livestream COURSE CONTENT Module 1: Mitigate threats using Microsoft Defender for Endpoint Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. Learn how Microsoft Defender for Endpoint can help your organization stay secure. Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security. Learn how to investigate incidents and alerts using Microsoft Defender for Endpoints. Perform advanced hunting and consult with threat experts. You will also learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings.. Lastly, you will learn about your environment's weaknesses by using Threat and Vulnerability Management in Microsoft Defender for Endpoint. Lessons M1 Protect against threats with Microsoft Defender for Endpoint Deploy the Microsoft Defender for Endpoint environment Implement Windows 10 security enhancements with Microsoft Defender for Endpoint Manage alerts and incidents in Microsoft Defender for Endpoint Perform device investigations in Microsoft Defender for Endpoint Perform actions on a device using Microsoft Defender for Endpoint Perform evidence and entities investigations using Microsoft Defender for Endpoint Configure and manage automation using Microsoft Defender for Endpoint Configure for alerts and detections in Microsoft Defender for Endpoint Utilize Threat and Vulnerability Management in Microsoft Defender for Endpoint Lab M1: Mitigate threats using Microsoft Defender for Endpoint Deploy Microsoft Defender for Endpoint Mitigate Attacks using Defender for Endpoint After completing module 1, students will be able to: Define the capabilities of Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint environment settings Configure Attack Surface Reduction rules on Windows 10 devices Investigate alerts in Microsoft Defender for Endpoint Describe device forensics information collected by Microsoft Defender for Endpoint Conduct forensics data collection using Microsoft Defender for Endpoint Investigate user accounts in Microsoft Defender for Endpoint Manage automation settings in Microsoft Defender for Endpoint Manage indicators in Microsoft Defender for Endpoint Describe Threat and Vulnerability Management in Microsoft Defender for Endpoint Module 2: Mitigate threats using Microsoft 365 Defender Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender. Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data. Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise. Lessons M2 Introduction to threat protection with Microsoft 365 Mitigate incidents using Microsoft 365 Defender Protect your identities with Azure AD Identity Protection Remediate risks with Microsoft Defender for Office 365 Safeguard your environment with Microsoft Defender for Identity Secure your cloud apps and services with Microsoft Cloud App Security Respond to data loss prevention alerts using Microsoft 365 Manage insider risk in Microsoft 365 Lab M2: Mitigate threats using Microsoft 365 Defender Mitigate Attacks with Microsoft 365 Defender After completing module 2, students will be able to: Explain how the threat landscape is evolving. Manage incidents in Microsoft 365 Defender Conduct advanced hunting in Microsoft 365 Defender Describe the investigation and remediation features of Azure Active Directory Identity Protection. Define the capabilities of Microsoft Defender for Endpoint. Explain how Microsoft Defender for Endpoint can remediate risks in your environment. Define the Cloud App Security framework Explain how Cloud Discovery helps you see what's going on in your organization Module 3: Mitigate threats using Azure Defender Use Azure Defender integrated with Azure Security Center, for Azure, hybrid cloud, and on-premises workload protection and security. Learn the purpose of Azure Defender, Azure Defender's relationship to Azure Security Center, and how to enable Azure Defender. You will also learn about the protections and detections provided by Azure Defender for each cloud workload. Learn how you can add Azure Defender capabilities to your hybrid environment. Lessons M3 Plan for cloud workload protections using Azure Defender Explain cloud workload protections in Azure Defender Connect Azure assets to Azure Defender Connect non-Azure resources to Azure Defender Remediate security alerts using Azure Defender Lab M3: Mitigate threats using Azure Defender Deploy Azure Defender Mitigate Attacks with Azure Defender After completing module 3, students will be able to: Describe Azure Defender features Explain Azure Security Center features Explain which workloads are protected by Azure Defender Explain how Azure Defender protections function Configure auto-provisioning in Azure Defender Describe manual provisioning in Azure Defender Connect non-Azure machines to Azure Defender Describe alerts in Azure Defender Remediate alerts in Azure Defender Automate responses in Azure Defender Module 4: Create queries for Azure Sentinel using Kusto Query Language (KQL) Write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Azure Sentinel. This module will focus on the most used operators. The example KQL statements will showcase security related table queries. KQL is the query language used to perform analysis on data to create analytics, workbooks, and perform hunting in Azure Sentinel. Learn how basic KQL statement structure provides the foundation to build more complex statements. Learn how to summarize and visualize data with a KQL statement provides the foundation to build detections in Azure Sentinel. Learn how to use the Kusto Query Language (KQL) to manipulate string data ingested from log sources. Lessons M4 Construct KQL statements for Azure Sentinel Analyze query results using KQL Build multi-table statements using KQL Work with data in Azure Sentinel using Kusto Query Language Lab M4: Create queries for Azure Sentinel using Kusto Query Language (KQL) Construct Basic KQL Statements Analyze query results using KQL Build multi-table statements using KQL Work with string data using KQL statements After completing module 4, students will be able to: Construct KQL statements Search log files for security events using KQL Filter searches based on event time, severity, domain, and other relevant data using KQL Summarize data using KQL statements Render visualizations using KQL statements Extract data from unstructured string fields using KQL Extract data from structured string data using KQL Create Functions using KQL Module 5: Configure your Azure Sentinel environment Get started with Azure Sentinel by properly configuring the Azure Sentinel workspace. Traditional security information and event management (SIEM) systems typically take a long time to set up and configure. They're also not necessarily designed with cloud workloads in mind. Azure Sentinel enables you to start getting valuable security insights from your cloud and on-premises data quickly. This module helps you get started. Learn about the architecture of Azure Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements. As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Azure Sentinel. Lessons M5 Introduction to Azure Sentinel Create and manage Azure Sentinel workspaces Query logs in Azure Sentinel Use watchlists in Azure Sentinel Utilize threat intelligence in Azure Sentinel Lab M5 : Configure your Azure Sentinel environment Create an Azure Sentinel Workspace Create a Watchlist Create a Threat Indicator After completing module 5, students will be able to: Identify the various components and functionality of Azure Sentinel. Identify use cases where Azure Sentinel would be a good solution. Describe Azure Sentinel workspace architecture Install Azure Sentinel workspace Manage an Azure Sentinel workspace Create a watchlist in Azure Sentinel Use KQL to access the watchlist in Azure Sentinel Manage threat indicators in Azure Sentinel Use KQL to access threat indicators in Azure Sentinel Module 6: Connect logs to Azure Sentinel Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Azure Sentinel. The primary approach to connect log data is using the Azure Sentinel provided data connectors. This module provides an overview of the available data connectors. You will get to learn about the configuration options and data provided by Azure Sentinel connectors for Microsoft 365 Defender. Lessons M6 Connect data to Azure Sentinel using data connectors Connect Microsoft services to Azure Sentinel Connect Microsoft 365 Defender to Azure Sentinel Connect Windows hosts to Azure Sentinel Connect Common Event Format logs to Azure Sentinel Connect syslog data sources to Azure Sentinel Connect threat indicators to Azure Sentinel Lab M6: Connect logs to Azure Sentinel Connect Microsoft services to Azure Sentinel Connect Windows hosts to Azure Sentinel Connect Linux hosts to Azure Sentinel Connect Threat intelligence to Azure Sentinel After completing module 6, students will be able to: Explain the use of data connectors in Azure Sentinel Explain the Common Event Format and Syslog connector differences in Azure Sentinel Connect Microsoft service connectors Explain how connectors auto-create incidents in Azure Sentinel Activate the Microsoft 365 Defender connector in Azure Sentinel Connect Azure Windows Virtual Machines to Azure Sentinel Connect non-Azure Windows hosts to Azure Sentinel Configure Log Analytics agent to collect Sysmon events Explain the Common Event Format connector deployment options in Azure Sentinel Configure the TAXII connector in Azure Sentinel View threat indicators in Azure Sentinel Module 7: Create detections and perform investigations using Azure Sentinel Detect previously uncovered threats and rapidly remediate threats with built-in orchestration and automation in Azure Sentinel. You will learn how to create Azure Sentinel playbooks to respond to security threats. You'll investigate Azure Sentinel incident management, learn about Azure Sentinel events and entities, and discover ways to resolve incidents. You will also learn how to query, visualize, and monitor data in Azure Sentinel. Lessons M7 Threat detection with Azure Sentinel analytics Threat response with Azure Sentinel playbooks Security incident management in Azure Sentinel Use entity behavior analytics in Azure Sentinel Query, visualize, and monitor data in Azure Sentinel Lab M7: Create detections and perform investigations using Azure Sentinel Create Analytical Rules Model Attacks to Define Rule Logic Mitigate Attacks using Azure Sentinel Create Workbooks in Azure Sentinel After completing module 7, students will be able to: Explain the importance of Azure Sentinel Analytics. Create rules from templates. Manage rules with modifications. Explain Azure Sentinel SOAR capabilities. Create a playbook to automate an incident response. Investigate and manage incident resolution. Explain User and Entity Behavior Analytics in Azure Sentinel Explore entities in Azure Sentinel Visualize security data using Azure Sentinel Workbooks. Module 8: Perform threat hunting in Azure Sentinel In this module, you'll learn to proactively identify threat behaviors by using Azure Sentinel queries. You'll also learn to use bookmarks and livestream to hunt threats. You will also learn how to use notebooks in Azure Sentinel for advanced hunting. Lessons M8 Threat hunting with Azure Sentinel Hunt for threats using notebooks in Azure Sentinel Lab M8 : Threat hunting in Azure Sentinel Threat Hunting in Azure Sentinel Threat Hunting using Notebooks After completing this module, students will be able to: Describe threat hunting concepts for use with Azure Sentinel Define a threat hunting hypothesis for use in Azure Sentinel Use queries to hunt for threats. Observe threats over time with livestream. Explore API libraries for advanced threat hunting in Azure Sentinel Create and use notebooks in Azure Sentinel [-]
Les mer
Nettstudie 1 dag 5 900 kr
Hvordan fylle rollen som personvernombud, og hva må du kunne. Ett kurs for deg som DPO og vil bli bedriftens kompetanse person på GDPR [+]
Personvernforordningen / General Data Protection Regulation (GDPR) Vi går gjennom de deler du må ha kompetanse om, og du får fyldig kursmateriale med deg hjem, slik at du enklere kan mester fagområdet etter kurset. Men på ettdagskurs er det ikke dybdegejnnomgang av områder som DPIA, teknologi og prosess rundt GAP planer. Du får alikevel med deg materiale så du kan lese etterpå. Hva er formålet med forordninga og hvordan forordningen er strukturert. Vi går gjennom  tilsynsmyndighet og hvilke innvirkninger den loven har på Norge, EU og andre land.  Du får kompetanse om hovedpunkter i forordningen med de viktige nøkkelkonsepter, kategorier for personlig informasjon og prinsipper for databeskyttelse. Den registrertes rettigheter og hvordan analyser utfordringer og problemer En viktig kompetanse som mange ikke kjenner godt nok er hvilke roller, forpliktelser og behandlingsaktiviteter som må mestres, så vi ser på personvernombudets betegnelser  Konsekvensanalyse av databeskyttelse og personvernombudet Behandlingsaktiviteter og personvernombudet  Kontrollers ansvar Personvernombudet sitt ansvarRegistrering av behandlingsaktiviteterSamarbeid med tilsynsmyndighetHvordan starte program for å etterleve personvernforordningenHvem må forholde seg til personvernforordningenMetoder og tilnærmingForbered program for personvernforordningenHvordan avdekke mangler  og i dentifiser strategiske målLedelsens ansvar og godkjenning [-]
Les mer