IT-kurs
Østfold
Du har valgt: Rømskog
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Rømskog ) i IT-kurs
 

1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Strategist: Direct, Plan and improve er en modul innen ITIL®. Modulen er en nøkkelkomponenten i både ITIL® 4 Managing Professional og ITIL® 4 Strategic Leader-løp... [+]
Modulen dekker bruk og effekt av Lean og agile arbeidsmåter, og hvordan dette kan utnyttes til fordel for organisasjonen. Kurset vil gi kandidatene en praktisk og strategisk metode for å planlegge og levere kontinuerlig forbedring med nødvendig smidighet.  E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 12 moduler. Les mer om ITIL® 4 på AXELOS sine websider Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert.   [-]
Les mer
Nettkurs 2 timer 549 kr
Microsoft Word er sannsynligvis verdens mest brukte tekstbehandlingsprogram. Programmet kan kjøpes gjennom et engangsbeløp eller abonneres på via Microsoft 365 (tidligere... [+]
Dykk inn i verdenen av tekstbehandling med kurset "Word: Grunnleggende", ledet av Elin Lovinda Bae hos Utdannet.no. Dette kurset er perfekt for alle som ønsker å lære å bruke Microsoft Word, verdens mest populære tekstbehandlingsprogram. Enten du er ny til Word eller bare ønsker å friske opp dine kunnskaper, kreves ingen forkunnskaper for å delta. Kurset gir deg en omfattende opplæring i hvordan du oppretter, redigerer og formaterer dokumenter i Word. Du vil lære om Word sitt brukergrensesnitt, hvordan du oppretter, lagrer og åpner dokumenter, bruker tekstverktøy, setter inn ulike typer innhold, og tilpasser dokumentets generelle oppsett. I tillegg vil kurset dekke hvordan du samarbeider med andre og deler dokumenter effektivt. Ved kursets slutt vil du ha en solid forståelse av hvordan du kan bruke Microsoft Word for å skape profesjonelt utseende dokumenter for en rekke formål. Dette kurset vil gi deg ferdighetene du trenger for å navigere og utnytte de mange funksjonene i Word effektivt.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Brukergrensesnittet Kapittel 3: Opprette, lagre og åpne dokument Kapittel 4: Tekstverktøy Kapittel 5: Sette inn innhold Kapittel 6: Generelle tilpasninger Kapittel 7: Del dokumentet Kapittel 8: Avslutning   Varighet: 2 timer og 19 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for se... [+]
COURSE OVERVIEW In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more.  You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam. TARGET AUDIENCE Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. COURSE OBJECTIVES After completing this course you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment   COURSE CONTENT Describing Information Security Concepts (Self-Study) Information Security Overview Managing Risk Vulnerability Assessment Understanding CVSS Describing Common TCP/IP Attacks (Self-Study) Legacy TCP/IP Vulnerabilities IP Vulnerabilities ICMP Vulnerabilities TCP Vulnerabilities UDP Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-In-The-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks DHCP Attacks Describing Common Network Application Attacks (Self-Study) Password Attacks DNS-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks (Self-Study) Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview IPS Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface ACLs Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW NAT Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview SMTP Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco WSA Overview Deployment Options Network Users Authentication HTTPS Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella (Self-Study) Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point Cisco IOS VTIs Static VTI Point-to-Point IPsec IKEv2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies SSL Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and EAP EAP Methods Role of RADIUS in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst Switch 802.1X Configuration Cisco WLC 802.1X Configuration Cisco ISE 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies (Self-Study) Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco AMP for Endpoints (Self-study) Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection (Self-Study) Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls (Self-Study) Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls (Self-Study) Overview of Layer 2 Data Plane Security Controls VLAN-Based Attacks Mitigation STP Attacks Mitigation Port Security Private VLANs DHCP Snooping ARP Inspection Storm Control MACsec Encryption Deploying Layer 3 Data Plane Security Controls (Self-Study) Infrastructure Antispoofing ACLs Unicast Reverse Path Forwarding IP Source Guard Labs Configure Network Settings And NAT On Cisco ASA Configure Cisco ASA Access Control Policies Configure Cisco Firepower NGFW NAT Configure Cisco Firepower NGFW Access Control Policy Configure Cisco Firepower NGFW Discovery and IPS Policy Configure Cisco NGFW Malware and File Policy Configure Listener, HAT, and RAT on Cisco ESA Configure Mail Policies Configure Proxy Services, Authentication, and HTTPS Decryption Enforce Acceptable Use Control and Malware Protection Examine the Umbrella Dashboard Examine Cisco Umbrella Investigate Explore DNS Ransomware Protection by Cisco Umbrella Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW Configure Remote Access VPN on the Cisco Firepower NGFW Explore Cisco AMP for Endpoints Perform Endpoint Analysis Using AMP for Endpoints Console Explore File Ransomware Protection by Cisco AMP for Endpoints Console Explore Cisco Stealthwatch Enterprise v6.9.3 Explore CTA in Stealthwatch Enterprise v7.0 Explore the Cisco Cloudlock Dashboard and User Security Explore Cisco Cloudlock Application and Data Security Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors TEST CERTIFICATION Recommended as preparation for the following exams: 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)   This is the core exam for the Cisco CCNP Security certification, in order to gain the CCNP Security certification you will also need to pass one of the concentration exams. [-]
Les mer
1 dag 9 500 kr
18 Aug
26 Sep
07 Nov
Develop dynamic reports with Microsoft Power BI [+]
Develop dynamic reports with Microsoft Power BI [-]
Les mer
Oslo Bergen 4 dager 28 900 kr
26 Aug
26 Aug
27 Oct
Kubernetes Administration (LFS458) [+]
Kubernetes Administration (LFS458) [-]
Les mer
1 dag 8 000 kr
This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. [+]
COURSE OVERVIEW The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. The course is designed as a blended learning experience that combines instructor-led training with online materials on the Microsoft Learn platform (https://azure.com/learn). The hands-on exercises in the course are based on Learn modules, and students are encouraged to use the content on Learn as reference materials to reinforce what they learn in the class and to explore topics in more depth. TARGET AUDIENCE The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don’t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. COURSE OBJECTIVES  After completing this course, you will be able to: Describe Artificial Intelligence workloads and considerations Describe fundamental principles of machine learning on Azure Describe features of computer vision workloads on Azure Describe features of Natural Language Processing (NLP) workloads on Azure Describe features of conversational AI workloads on Azure   COURSE CONTENT Module 1: Introduction to AI In this module, you'll learn about common uses of artificial intelligence (AI), and the different types of workload associated with AI. You'll then explore considerations and principles for responsible AI development. Artificial Intelligence in Azure Responsible AI After completing this module you will be able to Describe Artificial Intelligence workloads and considerations Module 2: Machine Learning Machine learning is the foundation for modern AI solutions. In this module, you'll learn about some fundamental machine learning concepts, and how to use the Azure Machine Learning service to create and publish machine learning models. Introduction to Machine Learning Azure Machine Learning After completing this module you will be able to Describe fundamental principles of machine learning on Azure Module 3: Computer Vision Computer vision is a the area of AI that deals with understanding the world visually, through images, video files, and cameras. In this module you'll explore multiple computer vision techniques and services. Computer Vision Concepts Computer Vision in Azure After completing this module you will be able to Describe features of computer vision workloads on Azure Module 4: Natural Language Processing This module describes scenarios for AI solutions that can process written and spoken language. You'll learn about Azure services that can be used to build solutions that analyze text, recognize and synthesize speech, translate between languages, and interpret commands. After completing this module you will be able to Describe features of Natural Language Processing (NLP) workloads on Azure Module 5: Conversational AI Conversational AI enables users to engage in a dialog with an AI agent, or *bot*, through communication channels such as email, webchat interfaces, social media, and others. This module describes some basic principles for working with bots and gives you an opportunity to create a bot that can respond intelligently to user questions. Conversational AI Concepts Conversational AI in Azure After completing this module you will be able to Describe features of conversational AI workloads on Azure   TEST CERTIFICATION Recommended as preparation for the following exams: Exam AI-900: Microsoft Azure AI Fundamentals. HVORFOR VELGE SG PARTNER AS:  Flest kurs med Startgaranti Rimeligste kurs Beste service og personlig oppfølgning Tilgang til opptak etter endt kurs Partner med flere av verdens beste kursleverandører [-]
Les mer
Bedriftsintern 1 dag 7 500 kr
Data science og maskinlæring er blitt en viktig drivkraft bak mange forretnings beslutninger. Men fortsatt er mange usikre på hva begrepene innebærer og hvilke muligheter... [+]
Dette kurset tilbys som bedriftsinternt kurs   Maskinlæring handler om sette datamaskiner i stand til å lære fra og utvikle atferd basert på data. Det vil si at en datamaskin kan løse en oppgave den ikke er eksplisitt programmert for å håndtere. I stedet er den i stand til å automatisk lære gjenkjenning av komplekse mønstre i data og gjøre beslutninger basert på dette disse. Maskinlæring gir store muligheter, men mange bedrifter har problemer med å ta teknologien i bruk. Nøyaktig hvilke oppgaver kan maskinlæring utføre, og hvordan kommer man i gang? Dette kurset gir oversikt over mulighetene som ligger i maskinlæring, og hvordan i tillegg til kunnskap om hvordan teknologien kan løse oppgaver og skape resultater i praksis. Hva er maskinlæring, datavitenskap og kunstig intelligens og hvordan det er relatert til statistikk og dataanalyse? Hvordan å utvinne kunnskap fra dataene dine? Hva betyr Big data og hvordan analyseres det? Hvor og hvordan skal du bruke maskinlæring til dine daglige forretningsproblemer? Hvordan bruke datamønstre til å ta avgjørelser og spådommer med eksempler fra den virkelige verden? Hvilke typer forretningsproblemer kan en maskinen lære å håndtere Muligheter som maskinlæring gir din bedrift Hva er de teoretiske aspekter på metoder innen maskinlæring? Hvilke ML-metoder som er relevante for ulike problemstillinger innen dataanalyse? Hvordan evaluere styrker og svakheter mellom disse algoritmene og velge den beste? Anvendt data science og konkrete kunde eksempler i praksis   Målsetning Kurset gir kunnskap om hvordan maskinlæring kan løse et bestemt problem og hvilke metoder som egner seg i en gitt situasjon. Du blir i stand til å kan skaffe deg innsikt i data, og vil kunne identifisere egenskapene som representerer dem best. Du kjenner de viktigste maskinlæringsalgoritmene og hvilke metoder som evaluerer ytelsen deres best. Dette gir grunnlag for kontinuerlig forbedring av løsninger basert på maskinlæring.   [-]
Les mer
Nettkurs 2000 timer 2 750 kr
Med GeT Everything får du tilgang til alle kurs og innholdet fra Autodesk, Adobe, Primavera, Bluebeam, Bentlye, Microsoft, Trimble og McNeel. [+]
GeT Everything NTI tilbyr eLæringkurs av høyeste kvalitet. Uansett hvilket kurs du velger har du tilgang til dem 24/7 i 1 år (365 dager). Med elæringskurs velger du selv ditt tempo i læringen, og om du vil lære gjennom kombinasjon av å se, lese, lytte og teste selv – eller hvorfor ikke en kombinasjon av flere? Det du trenger er en PC, smarttelefon eller nettbrett som har internettilgang   Her er et utvalg av kursene du får tilgang på: Autodesk Adobe Primavera Bluebeam Bentlye Microsof Trimble McNeel NTI  leverer opplæring for å forenkle og effektivisere din arbeidshverdag Vi har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon. Global eTraining har over 25 års erfaring med opplæring, og har solgt millioner av elæringskurs i over 150 land.  PC, smarttelefon eller nettbrett som har internettilgang Pål har gjennomført e-læringskurs Pål hadde ikke anledning til å reise bort en uke for å delta på kurs, da var det forlokkende å gjennomføre kurset som e-læringskurs. Kurset var absolutt verdt pengene. Det var en viktig bekreftelse på at jeg har basiskunnskapene. Jeg lærte mange nye viktige kommandoer for å gjøre operasjoner mer effektivt, fikk også en pekepinn på hvor jeg kan bygge på med kunnskap.Les mer her [-]
Les mer
1 dag 8 000 kr
This one-day course will provide foundational level knowledge on Azure concepts; core Azure services; core solutions and management tools; general security and network se... [+]
COURSE OVERVIEW This course does not provide an Azure pass or time in the classroom for students to do any hands-on activities. TARGET AUDIENCE  This course is suitable for program managers and technical sales, with a general IT background. These students want to learn about our offerings, see how components are implemented, and ask questions about products and features. COURSE OBJECTIVES   Discuss the basics of cloud computing and Azure, and how to get started with Azure's subscriptions and accounts. Describe the advantages of using cloud computing services, learning to differentiate between the categories and types of cloud computing, and how to examine the various concepts, resources, and terminology that are necessary to work with Azure architecture. Outline the core services available with Microsoft Azure. Discuss the core solutions that encompass a wide array of tools and services from Microsoft Azure. Describe the general security and network security features, and how you can use the various Azure services to help ensure that your cloud resources are safe, secure, and trusted. Discuss the identity, governance, privacy, and compliance features, and how Azure can help you secure access to cloud resources, what it means to build a cloud governance strategy, and how Azure adheres to common regulatory and compliance standards. Discuss the factors that influence cost, tools you can use to help estimate and manage your cloud spend, and how Azure's service-level agreements (SLAs) can impact your application design decisions. COURSE CONTENT Module 1: Cloud Concepts In this module, you'll take an entry level end-to-end look at Azure and its capabilities, which will provide you with a solid foundation for completing the available modules for Azure Fundamentals. Introduction to Azure fundamentals Fundamental Azure concepts After completing this module, students will be able to: Understand the benefits of cloud computing in Azure and how it can save you time and money. Explain concepts such as high availability, scalability, elasticity, agility, and disaster recovery. Module 2: Core Azure Services In this module, you learn about core Azure services like Azure database, Azure compute, Azure storage, and Azure Networking. Core Azure architectural components Core Azure workload products Azure networking services Azure storage services Azure database services After completing this module, students will be able to: Describe core Azure architecture components such as subscriptions, management groups, and resources. Summarize geographic distribution concepts such as Azure regions, region pairs, and availability zones. Understand the services available in Azure including compute, network, storage, and databases. Identify virtualization services such as Azure VMs, Azure Container Instances, and Azure Kubernetes. Compare Azure's database services such as Azure Cosmos DB, Azure SQL, and Azure Database for MySQL. Examine Azure networking resources such as Virtual Networks, VPN Gateways, and Azure ExpressRoute. Summarize Azure storage services such Azure Blob Storage, Azure Disk Storage, and Azure File Storage. Module 3: Core Solutions In this module, you'll learn about AI machine learning, Azure DevOps, monitoring fundamentals, management fundamentals, serverless computing fundamentals. and IoT fundamentals. Choose the best Azure IoT service Choose the best AI service Choose the best Azure serverless technology Choose the best tools with DevOps and GitHub Choose the best management tools Choose the best Azure monitoring service After completing this module, students will be able to: Choose the correct Azure AI service to address different kinds of business challenges. Choose the best software development process tools and services for a given business scenario. Choose the correct cloud monitoring service to address different kinds of business challenges. Choose the correct Azure management tool to address different kinds of technical needs. Choose the right serverless computing technology for your business scenario. Choose the best Azure IoT service for a given business scenario. Module 4: General security and networking features In this module, you will learn how to protect yourself against security threats, and secure your networks with Azure. Security Tools and Features Secure Network Connectivity After completing this module, students will be able to: Strengthen your security posture and protect against threats by using Microsoft Defender for Cloud. Collect and act on security data from many different sources by using Microsoft Sentinel. Manage dedicated physical servers to host your Azure VMs for Windows and Linux. Identify the layers that make up a defense in depth strategy. Explain how Azure Firewall enables you to control what traffic is allowed on the network. Configure network security groups to filter network traffic to and from Azure resources. Explain how Azure DDoS Protection helps protect your Azure resources from DDoS attacks. Module 5: Identity, Governance, Privacy, and Compliance In this module, you will learn about Azure identity services, how to build a cloud governance strategy, and privacy, compliance and data protection standards on Azure. Core Azure identity services Azure Governance Methodologies Privacy, Compliance, and Data Protection standards After completing this module, students will be able to: Explain the difference between authentication and authorization. Describe how Azure Active Directory provides identity and access management. Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play. Make organizational decisions about your cloud environment by using the CAF for Azure. Define who can access cloud resources by using Azure role-based access control. Apply a resource lock to prevent accidental deletion of your Azure resources. Apply tags to your Azure resources to help describe their purpose. Control and audit how your resources are created by using Azure Policy. Enable governance at scale across multiple Azure subscriptions by using Azure Blueprints. Explain the types of compliance offerings that are available on Azure. Gain insight into regulatory standards and compliance on Azure. Explain Azure capabilities that are specific to government agencies. Module 6: Azure Pricing and Lifecycle In this module, you will learn how to plan and manage Azure costs, and how to choose the right Azure services though SLAs and service lifecycle. Planning and Cost Management Azure Service Level Agreements (SLAs) and Lifecycle After completing this module, students will be able to: Use the Total Cost of Ownership Calculator. Describe the different ways you can purchase Azure products and services. Use the Pricing calculator to estimate the monthly cost of running your cloud workloads. Define the major factors that affect total cost and apply recommended practices to minimize cost. Describe what a service-level agreement (SLA) is and why SLAs are important. Identify factors, such as the service tier you choose, that can affect an SLA. Combine SLAs to compute a composite SLA. Describe the service lifecycle in Azure. TEST CERTIFICATION This course helps to prepare for exam AZ-900. FOLLOW ON COURSES M-AZ104, Microsoft Azure Administrator M-AZ204, Developing Solutions for Microsoft Azure M-AZ303, Microsoft Azure Architect Technologies M-DP200, Implementing an Azure Data Solution (DP-200) [-]
Les mer
Virtuelt eller personlig 3 dager 12 400 kr
Utvikle 3D-modeller og lage realistiske bilder og animasjoner av disse. [+]
AutoCAD 3D introduksjonskurs: Deltagerne skal kunne skille mellom ulike modelltyper, og kjenne til grunnprinsipper for 3D-modellering og bruk av koordinatsystem, samt beherske bruk av betraktningsvinkler og skjermnavigering. Koordinatsystemer Angivelse av punkter i rommet Solid modellering Surface modellering Mesh modellering Sette opp Layout i paperspace, projeksjoner og snitt Lagstruktur og lagdefinisjon, farger, linjetyper, målsetting Lyssetting, naturlig sollys og lokale lyskilder Knytte materialer til objekt eller til lag Renderfunksjoner Animasjon og video [-]
Les mer
Nettkurs 3 timer 549 kr
Dette nettkurset er perfekt for deg som allerede har noen grunnleggende ferdigheter i Python og ønsker å lære objektorientert programmering (OOP). Med OOP vil du kunne re... [+]
Dette nettkurset fokuserer på objektorientert programmering (OOP) i Python og er ideelt for de som allerede har grunnleggende ferdigheter i Python og ønsker å utvide sine kunnskaper. OOP gir deg muligheten til å skrive kode som er mer strukturert, gjenbrukbar og enklere å vedlikeholde. Kurset, ledet av erfaren systemutvikler og instruktør Magnus Kvendseth Øye, vil veilede deg gjennom nøkkelkonsepter innen OOP i Python. I løpet av kurset vil du lære å se på koden din som en samling av dynamiske objekter som samhandler med hverandre. Du vil utforske følgende emner: Kapittel 1: Introduksjon Kapittel 2: Klasser og egenskaper Kapittel 3: Metoder Kapittel 4: Representasjon Kapittel 5: Arv Kapittel 6: Prosjekt Kapittel 7: Avslutning Med Magnus Kvendseth Øye som din veileder, vil du få en solid forståelse av hvordan du kan bruke OOP-prinsipper i Python for å skape ren, effektiv og strukturert kode. Dette kurset gir deg muligheten til å ta dine Python-ferdigheter til neste nivå.   Varighet: 3 timer og 8 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Vår tjeneste fungerer på samme måte som strømmetjenester for musikk eller TV-serier, der våre kunder betaler en fast månedspris for tilgang til alle kursene vi har tilgjengelig. Vi har opplevd betydelig vekst de siste årene, med over 30 000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling engasjerende, spennende og tilgjengelig for alle, og vi har støtte fra Innovasjon Norge og Forskningsrådet. [-]
Les mer
Virtuelt klasserom 5 dager 31 000 kr
This five-day VMware course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and ... [+]
COURSE OVERVIEW  This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. Product Alignment: VMware ESXi 8.0 VMware vCenter 8.0 TARGET AUDIENCE System administrators System engineers COURSE OBJECTIVES By the end of the course, you should be able to meet the following objectives: Install and configure ESXi hosts Deploy and configure vCenter Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users Create virtual networks using vSphere standard switches and distributed switches Create and configure datastores using storage technologies supported by vSphere Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create content libraries for managing templates and deploying virtual machines Manage virtual machine resource allocation Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion Create and configure a vSphere cluster that is enabled with vSphere High Availability (HA) and vSphere Distributed Resource Scheduler Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date COURSE CONTENT 1 Course Introduction Introductions and course logistics Course objectives 2 vSphere and Virtualization Overview Explain basic virtualization concepts Describe how vSphere fits in the software-defined data center and the cloud infrastructure Recognize the user interfaces for accessing vSphere Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs 3 Installing and Configuring ESXi Install an ESXi host Recognize ESXi user account best practices Configure the ESXi host settings using the DCUI and VMware Host Client 4 Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter Deploy vCenter Server Appliance Configure vCenter settings Use the vSphere Client to add and manage license keys Create and organize vCenter inventory objects Recognize the rules for applying vCenter permissions View vCenter logs and events 5 Configuring vSphere Networking Configure and view standard switch configurations Configure and view distributed switch configurations Recognize the difference between standard switches and distributed switches Explain how to set networking policies on standard and distributed switches 6 Configuring vSphere Storage Recognize vSphere storage technologies Identify types of vSphere datastores Describe Fibre Channel components and addressing Describe iSCSI components and addressing Configure iSCSI storage on ESXi Create and manage VMFS datastores Configure and manage NFS datastores 7 Deploying Virtual Machines Create and provision VMs Explain the importance of VMware Tools Identify the files that make up a VM Recognize the components of a VM Navigate the vSphere Client and examine VM settings and options Modify VMs by dynamically increasing resources Create VM templates and deploy VMs from them Clone VMs Create customization specifications for guest operating systems Create local, published, and subscribed content libraries Deploy VMs from content libraries Manage multiple versions of VM templates in content libraries 8 Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances Migrate VMs using vSphere vMotion Describe the role of Enhanced vMotion Compatibility in migrations Migrate VMs using vSphere Storage vMotion Take a snapshot of a VM Manage, consolidate, and delete snapshots Describe CPU and memory concepts in relation to a virtualized environment Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits 9 Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster Recognize use cases for vSphere DRS settings Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures Identify options for configuring network redundancy in a vSphere HA cluster Recognize vSphere HA design considerations Recognize the use cases for various vSphere HA settings Configure a vSphere HA cluster Recognize when to use vSphere Fault Tolerance 10 Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster Describe features of the vCenter Update Planner Run vCenter upgrade prechecks and interoperability reports Recognize features of vSphere Lifecycle Manager Distinguish between managing hosts using baselines and managing hosts using images Describe how to update hosts using baselines Describe ESXi images Validate ESXi host compliance against a cluster image and update ESXi hosts Update ESXi hosts using vSphere Lifecycle Manager Describe vSphere Lifecycle Manager automatic recommendations Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware   [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
The Implementing and Operating Cisco Enterprise Network Core Technologies course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterpri... [+]
COURSE OVERVIEW  Learn how to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. The automation and programmability of Enterprise networks is also incorporated in this course. This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 CE credits toward recertification   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 3 days of self study. The self-study content will be provided as part of the digital courseware that you receive at the beginning of the course and should be part of your preparation for the exam. Additional lab access will be provided at the end of the class, this will be valid for 60 hours or 90 days whichever is the shorter. It will be possible to complete all but 7 of the labs after the class. TARGET AUDIENCE Network engineers involved in the installation, support and troubleshooting of enterprise networks. COURSE OBJECTIVES After completing this course you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using EtherChannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Centre™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Centre and vManage COURSE CONTENT Examining Cisco Enterprise Network Architecture Cisco Enterprise Architecture Model Campus LAN Design Fundamentals Traditional Multilayer Campus Layer Design Campus Distribution Layer Design   Understanding Cisco Switching Paths Layer 2 Switch Operation Control and Data Plane Cisco Switching Mechanisms Implementing Campus LAN Connectivity Revisiting VLANs Trunking with 802.1Q Inter-VLAN Routing Building Redundant Switched Topology Spanning-Tree Protocol Overview Spanning-Tree Protocol Operation Spanning-Tree Protocols Types and Features Multiple Spanning Tree Protocol PortFast and BPDU Implementing Layer 2 Port Aggregation (Self-Study) Need for EtherChannel EtherChannel Mode Interactions Layer 2 EtherChannel Configuration Guidelines EtherChannel Load-Balancing Options Troubleshoot EtherChannel Issues Understanding EIGRP EIGRP Features EIGRP Reliable Transport Establishing EIGRP Neighbour Adjacency EIGRP Metrics EIGRP Path Selection Explore EIGRP Path Selection Explore EIGRP Load Balancing and Sharing EIGRP for IPv6 Compare EIGRP and OSPF Routing Protocols Implementing OSPF Describe OSPF The OSPF Process OSPF Neighbour Adjacencies Building a Link-State Database OSPF LSA Types Compare Single-Area and Multi-Area OSPF OSPF Area Structure OSPF Network Types Optimizing OSPF OSPF Cost OSPF Route Summarization Benefits OSPF Route Filtering Tools Compare OSPFv2 and OSPFv3 Exploring EBGP Interdomain Routing with BGP BGP Operations Types of BGP Neighbour Relationships BGP Path Selection BGP Path Attributes Implementing Network Redundancy Need for Default Gateway Redundancy Define FHRP HSRP Advanced Features Cisco Switch High Availability Features Implementing NAT Define Network Address Translation NAT Address Types Explore NAT Implementations NAT Virtual Interface Introducing Virtualisation Protocols and Techniques Server Virtualisation Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Introducing Virtualisation Protocols and Techniques Server Virualization Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Understanding Virtual Private Networks and Interfaces Site-to-Site VPN Technologies IPSec VPN Overview IPSec: IKE IPsec Modes IPsec VPN Types Cisco IOS VTI Understanding Wireless Principles Explain RF Principles Describe Watts and Decibels Describe Antenna Characteristics Describe IEEE Wireless Standards Identify Wireless Component Roles Examining Wireless Deployment Options Wireless Deployment Overview Describe Autonomous AP Deployment Describe Centralized Cisco WLC Deployment Describe FlexConnect Deployment Cloud Deployment and Its Effect on Enterprise Networks Describe the Cloud-Managed Meraki Solution Cisco Catalyst 9800 Series Controller Deployment Options Describe Cisco Mobility Express Understanding Wireless Roaming and Location Services Wireless Roaming Overview Mobility Groups and Domains Wireless Roaming Types Describe Location Services Examining Wireless AP Operation Universal AP Priming Explore the Controller Discovery Process Describe AP Failover Explain High Availability Explore AP Modes Understanding Wireless Client Authentication Authentication Methods Pre-Shared Key (PSK) Authentication 802.1X User Authentication Overview PKI and 802.1X Certificate Based Authentication Introduction to Extensible Authentication Protocol EAP-Transport Layer Security (EAP-TLS) Protected Extensible Authentication Protocol EAP-FAST Guest Access with Web Auth Troubleshooting Wireless Client Connectivity Wireless Troubleshooting Tools Overview Spectrum Analysis Wi-Fi Scanning Packet Analysis Cisco AireOS GUI and CLI Tools Cisco Wireless Config Analyzer Express Common Wireless Client Connectivity Issues Overview Client to AP Connectivity WLAN Configuration Infrastructure Configuration Introducing Multicast Protocols (Self-study) Multicast Overview Internet Group Management Protocol Multicast Distribution Trees IP Multicasting Routing Rendezvous Point Introducing QoS (Self-study) Understand the Impact of User Applications on the Network Need for Quality of Service (QoS) Describe QoS Mechanisms Define and Interpret a QoS Policy Implementing Network Services Understanding Network Time Protocol Logging Services Simple Network Management Protocol Introducing NetFlow Flexible NetFlow Understanding Cisco IOS Embedded Event Manager Using Network Analysis Tools Troubleshooting Concepts Network Troubleshooting Procedures: Overview Network Troubleshooting Procedures: Case Study Basic Hardware Diagnostics Filtered Show Commands Cisco IOS IP SLAs Switched Port Analyzer(SPAN) Overview Remote SPAN (RSPAN) Encapsulated Remote Switched Port Analyzer(ERSAPN) Cisco Packet Capture Tools Overview Implementing Infrastructure Security ACL Overview ACL Wildcard Masking Types of ACLs Configure Numbered Access Lists Use ACLs to Filter Network Traffic Apply ACLs to Interfaces Configured Named Access Lists Control Plane Overview Control Plane Policing Implementing Secure Access Control Securing Device Access AAA Framework Overview Benefits of AAA Usage Authentication Options RADIUS and TACACS+ Enabling AAA and Configuring a Local User for Fallback Configuring RADIUS for Console and VTY Access Configuring TACACS+ for Console and VTY Access Configure Authorization and Accounting Understanding Enterprise Network Security Architecture (Self-study) Explore Threatscape Cisco Intrusion Prevention Systems Virtual Private Networks Content Security Logging Endpoint Security Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Firewall Concepts TrustSec MACsec Identity Management 802.1X for Wired and Wireless Endpoint Authentication MAC Authentication Bypass Web Authentication Exploring Automation and Assurance Using Cisco DNA Centre (Self-study) Need for Digital Transformation Cisco Digital Network Architecture Cisco Intent-Based Networking Cisco DNA Centre Automation Overview Cisco DNA Centre Platform Overview Cisco DNA Centre Design Cisco DNA Centre Inventory Overview Cisco DNA Centre Configuration and Management Overview Onboarding of Network Devices Using Cisco DNA Centre Cisco DNA Centre Software Image Management Overview Cisco DNA Assurance Key Features and Use Cases Cisco DNA Centre Assurance Implementation Workflow Examining the Cisco SD-Access Solution (Self-study) Need for Cisco SD-Access Cisco SD Access Overview Cisco SD-Access Fabric Components Cisco SD-Access Fabric Control Plane Based on LISP Cisco SD-Access Fabric Control Plane Based on VXLAN Cisco SD-Access Fabric Control Plane Based on Cisco TrustSec Role of Cisco ISE and Cisco DNA Centre in SD-Access Cisco SD-Access Wireless Integration Traditional Campus Interoperating with Cisco SD-Access Understanding the Working Principles of the Cisco SD-WAN Solution (Self-study) Need for Software Defined Networking for WAN Cisco SD-WAN Components and Functions Cisco SD-WAN Orchestration Plane Cisco SD-WAN Management Plane- vManage Cisco SD-WAN Control Plane - vSmart Cisco SD-WAN Data Plane - WAN Edge Cisco SD-WAN Programmatic APIs Cisco SD-WAN Automation and Analytics Cisco SD-WAN Terminology Cisco IOS XE and IOS XE SD-WAN Software Flexible Controller Deployment Options Cisco SD-WAN Security Understanding the Basics of Python Programming Describe Python Concepts String Data Types Numbers Data Types Boolean Data Types Script Writing and Execution Analyse Code Introducing Network Programmability Protocols Configuration Management Evolution of Device Management and Programmability Data Encoding Formats Understanding JSON Model Driven Programmability Stack Introduction to YANG Types of YANG Models Understanding NETCONF Explain NETCONF and YANG REST Understanding RESTCONF Protocol Introducing APIs in Cisco DNA Centre and vManage (Self-study) Application Programming Interfaces REST API Response Codes and Results REST API Security Cisco DNA Centre APIs Cisco SD-WAN REST API Overview Labs Lab 1: Investigate the CAM Lab 2: Analyse Cisco Express Forwarding Lab 3: Troubleshoot VLAN and Trunk Issues Lab 4: Tuning STP and Configuring RSTP Lab 5: Configure Multiple Spanning Tree Protocol Lab 6: Troubleshoot EtherChannel Lab 7: Implementing Multiarea OSPF Lab 8: Implement OSPF Tuning Lab 9: Apply OSPF Optimization Lab 10: Implement OSPFv3 Lab 11: Configure and Verify Single-Homed EBGP Lab 12: Implementing HSRP Lab 13: Configure VRRP Lab 14: Implement NAT Lab 15: Configure and Verify VRF Lab 16: Configure and Verify a GRE Tunnel Lab 17: Configure Static VTI Point-to-Point Tunnels Lab 18: Configure Wireless Client Authentication in a Centralized Deployment (No Extended Access) Lab 19: Troubleshoot Wireless Client Connectivity Issues (No Extended Access) Lab 20: Configure Syslog Lab 21: Configure and Verify Flexible NetFlow Lab 22: Configuring Cisco IOS Embedded Event Manager (EEM) Lab 23: Troubleshoot Connectivity and Analyse Traffic with Ping, Traceroute and Debug Lab 24: Configure and Verify Cisco IP SLA's Lab 25: Configure Standard and Extended ACLs Lab 26: Configure Control Plane Policing Lab 27: Implement Local and Server-Based AAA (No Extended Access) Lab 28: Writing and Troubleshooting Python Scripts (No Extended Access) Lab 29: Explore JSON Objects and Scripts in Python (No Extended Access) Lab 30: Use NETCONF via SSH (No Extended Access) Lab 31: Use RESTCONF with Cisco IOS XE Software (No Extended Access) [-]
Les mer
Oslo 3 dager 21 000 kr
08 Sep
08 Sep
15 Dec
ITIL® Strategist - Direct, Plan and Improve [+]
ITIL® Strategist - Direct, Plan and Improve [-]
Les mer