IT-kurs
Oppland
Du har valgt: Ringebu kommune
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Ringebu kommune ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of Information Security Management, elucidating its significance in safeguarding the confidentiality, integrity, and availability of organisational information assets. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn best practices for making new and changed services available for use, in line with your organisation's policies and any agreements between the organisation and its ... [+]
Understand the purpose and key concepts of Release Management, elucidating its significance in planning, scheduling, and controlling the build, test, and deployment of releases to ensure they deliver the expected outcomes. The eLearning course: Interactive Self-paced Device-friendly 2-3 hour content Mobile-optimised Practical exercises   Exam:   20 questions Multiple choise Closed book 30 minutes Minimum required score to pass: 65% [-]
Les mer
Virtuelt klasserom 2 dager 13 500 kr
XML er en moden standard for å utveksle informasjon mellom applikasjoner. Med XML og relaterte standarder som XSL(T) og XQuery er det mulig å utvikle distribuerte nettbas... [+]
Kursinstruktør Terje Berg-Hansen Terje Berg-Hansen har bred erfaring fra prosjektledelse, utvikling og drift med små og store databaser, både SQL- og NoSQL-baserte. I tillegg til å undervise i etablerte teknologier leder han også Oslo Hadoop User Group, og er levende interessert i nye teknologier, distribuerte databaser og Big Data Science.    Kursinnhold XML er en moden standard for å utveksle informasjon mellom applikasjoner. Med XML og relaterte standarder som XSL(T) og XQuery er det mulig å utvikle distribuerte nettbaserte tjenester for utveksling av data i et standardisert format.    Målsetting Deltakerne vil etter kurset ha en grunnleggende forståelse av og kjennskap til hvorfor og hvordan XML kan anvendes for å oppnå en bedre utveksling og deling av strukturert og ustrukturert informasjon.   Forkunnskaper Grunnleggende kunnskaper om internett, HTML og CSS er en fordel, men ikke nødvendig for å ta dette kurset.   Kursinnhold Introduksjon Introduksjon til XML og XML-relaterte teknologier, som XPath, XQuery og XSL XML-verktøy Editorer og verktøy for validering, søk og endring av XML Grunnleggende XML XML struktur og syntaks. Gjennomgang av målene for XML. Lage og utforme XML dokumenter Navnerom (namespaces) Oppretting og bruk av navnerom for å skille elementer og funksjoner med samme navn. Validering av  XML Gjennomgang av teknologier som Document Type Definitions (DTD's) og XML Schemas for å kontrollere og styre struktur og data i XML filer Presentasjon av XML Bruk av html og CSS til å presentere XML data Søking i XML Søk i XML-dokumenter med XPath . Introduksjon til XSL(T) Kort om XSL og XSL Transformations. Bruk av XSLT til å formatere, sortere, filtrere og konvertere XML Data   Gjennomføring Kurset gjennomføres med en kombinasjon av online læremidler, gjennomgang av temaer og problemstillinger og praktiske øvelser. Det er ingen avsluttende eksamen, men det er øvelsesoppgaver til hovedtemaene som gjennomgås.   [-]
Les mer
Virtuelt klasserom 2 dager 15 000 kr
This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional f... [+]
The course will cover general cloud computing concepts as well as general cloud computing models and services such as Public, Private and Hybrid cloud and Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service (SaaS). It will also cover some core Azure services and solutions, as well as key Azure pillar services concerning security, privacy, compliance and trust. It will finally cover pricing and support services available.   Agenda Module 1: Cloud Concepts -Learning Objectives-Why Cloud Services?-Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)-Public, Private, and Hybrid cloud models Module 2: Core Azure Services -Core Azure architectural components-Core Azure Services and Products-Azure Solutions-Azure management tools Module 3: Security, Privacy, Compliance and Trust -Securing network connectivity in Azure-Core Azure Identity services-Security tools and features-Azure governance methodologies-Monitoring and Reporting in Azure-Privacy, Compliance and Data Protection standards in Azure Module 4: Azure Pricing and Support -Azure subscriptions-Planning and managing costs-Support options available with Azure-Service lifecycle in Azure [-]
Les mer
2 dager 12 900 kr
10 Sep
11 Nov
Effektiv prosjektstyring med Microsoft Project [+]
Effektiv prosjektstyring med Microsoft Project [-]
Les mer
Bedriftsintern 1 dag 11 000 kr
This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform. [+]
Through a combination of presentations, demos, and hands-on labs, participants get an overview of the Google Cloud platform and a detailed view of the data processing and machine learning capabilities. This course showcases the ease, flexibility, and power of big data solutions on Google Cloud Platform. Learning Objectives This course teaches participants the following skills: Identify the purpose and value of the key Big Data and Machine Learning products in the Google Cloud Platform Use Cloud SQL and Cloud Dataproc to migrate existing MySQL and Hadoop/Pig/Spark/Hive workloads to Google Cloud Platform Employ BigQuery and Cloud Datalab to carry out interactive data analysis Train and use a neural network using TensorFlow Employ ML APIs Choose between different data processing products on the Google Cloud Platform Course Outline Module 1: Introducing Google Cloud Platform -Google Platform Fundamentals Overview-Google Cloud Platform Big Data Products Module 2: Compute and Storage Fundamentals -CPUs on demand (Compute Engine)-A global filesystem (Cloud Storage)-CloudShell-Lab: Set up an Ingest-Transform-Publish data processing pipeline Module 3: Data Analytics on the Cloud -Stepping-stones to the cloud-CloudSQL: your SQL database on the cloud-Lab: Importing data into CloudSQL and running queries-Spark on Dataproc-Lab: Machine Learning Recommendations with Spark on Dataproc Module 4: Scaling Data Analysis -Fast random access-Datalab-BigQuery-Lab: Build machine learning dataset Module 5: Machine Learning -Machine Learning with TensorFlow-Lab: Carry out ML with TensorFlow-Pre-built models for common needs-Lab: Employ ML APIs Module 6: Data Processing Architectures -Message-oriented architectures with Pub/Sub-Creating pipelines with Dataflow-Reference architecture for real-time and batch data processing Module 7: Summary -Why GCP?-Where to go from here-Additional Resources [-]
Les mer
Nettkurs 24 timer 9 900 kr
Elæring AgilePM Foundation [+]
Elæring AgilePM Foundation [-]
Les mer
Virtuelt klasserom 4 dager 22 000 kr
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. [+]
COURSE OVERVIEW Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. TARGET AUDIENCE The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. COURSE OBJECTIVES Explain how Microsoft Defender for Endpoint can remediate risks in your environment Create a Microsoft Defender for Endpoint environment Configure Attack Surface Reduction rules on Windows 10 devices Perform actions on a device using Microsoft Defender for Endpoint Investigate domains and IP addresses in Microsoft Defender for Endpoint Investigate user accounts in Microsoft Defender for Endpoint Configure alert settings in Microsoft Defender for Endpoint Explain how the threat landscape is evolving Conduct advanced hunting in Microsoft 365 Defender Manage incidents in Microsoft 365 Defender Explain how Microsoft Defender for Identity can remediate risks in your environment. Investigate DLP alerts in Microsoft Cloud App Security Explain the types of actions you can take on an insider risk management case. Configure auto-provisioning in Azure Defender Remediate alerts in Azure Defender Construct KQL statements Filter searches based on event time, severity, domain, and other relevant data using KQL Extract data from unstructured string fields using KQL Manage an Azure Sentinel workspace Use KQL to access the watchlist in Azure Sentinel Manage threat indicators in Azure Sentinel Explain the Common Event Format and Syslog connector differences in Azure Sentinel Connect Azure Windows Virtual Machines to Azure Sentinel Configure Log Analytics agent to collect Sysmon events Create new analytics rules and queries using the analytics rule wizard Create a playbook to automate an incident response Use queries to hunt for threats Observe threats over time with livestream COURSE CONTENT Module 1: Mitigate threats using Microsoft Defender for Endpoint Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. Learn how Microsoft Defender for Endpoint can help your organization stay secure. Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security. Learn how to investigate incidents and alerts using Microsoft Defender for Endpoints. Perform advanced hunting and consult with threat experts. You will also learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings.. Lastly, you will learn about your environment's weaknesses by using Threat and Vulnerability Management in Microsoft Defender for Endpoint. Lessons M1 Protect against threats with Microsoft Defender for Endpoint Deploy the Microsoft Defender for Endpoint environment Implement Windows 10 security enhancements with Microsoft Defender for Endpoint Manage alerts and incidents in Microsoft Defender for Endpoint Perform device investigations in Microsoft Defender for Endpoint Perform actions on a device using Microsoft Defender for Endpoint Perform evidence and entities investigations using Microsoft Defender for Endpoint Configure and manage automation using Microsoft Defender for Endpoint Configure for alerts and detections in Microsoft Defender for Endpoint Utilize Threat and Vulnerability Management in Microsoft Defender for Endpoint Lab M1: Mitigate threats using Microsoft Defender for Endpoint Deploy Microsoft Defender for Endpoint Mitigate Attacks using Defender for Endpoint After completing module 1, students will be able to: Define the capabilities of Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint environment settings Configure Attack Surface Reduction rules on Windows 10 devices Investigate alerts in Microsoft Defender for Endpoint Describe device forensics information collected by Microsoft Defender for Endpoint Conduct forensics data collection using Microsoft Defender for Endpoint Investigate user accounts in Microsoft Defender for Endpoint Manage automation settings in Microsoft Defender for Endpoint Manage indicators in Microsoft Defender for Endpoint Describe Threat and Vulnerability Management in Microsoft Defender for Endpoint Module 2: Mitigate threats using Microsoft 365 Defender Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender. Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data. Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise. Lessons M2 Introduction to threat protection with Microsoft 365 Mitigate incidents using Microsoft 365 Defender Protect your identities with Azure AD Identity Protection Remediate risks with Microsoft Defender for Office 365 Safeguard your environment with Microsoft Defender for Identity Secure your cloud apps and services with Microsoft Cloud App Security Respond to data loss prevention alerts using Microsoft 365 Manage insider risk in Microsoft 365 Lab M2: Mitigate threats using Microsoft 365 Defender Mitigate Attacks with Microsoft 365 Defender After completing module 2, students will be able to: Explain how the threat landscape is evolving. Manage incidents in Microsoft 365 Defender Conduct advanced hunting in Microsoft 365 Defender Describe the investigation and remediation features of Azure Active Directory Identity Protection. Define the capabilities of Microsoft Defender for Endpoint. Explain how Microsoft Defender for Endpoint can remediate risks in your environment. Define the Cloud App Security framework Explain how Cloud Discovery helps you see what's going on in your organization Module 3: Mitigate threats using Azure Defender Use Azure Defender integrated with Azure Security Center, for Azure, hybrid cloud, and on-premises workload protection and security. Learn the purpose of Azure Defender, Azure Defender's relationship to Azure Security Center, and how to enable Azure Defender. You will also learn about the protections and detections provided by Azure Defender for each cloud workload. Learn how you can add Azure Defender capabilities to your hybrid environment. Lessons M3 Plan for cloud workload protections using Azure Defender Explain cloud workload protections in Azure Defender Connect Azure assets to Azure Defender Connect non-Azure resources to Azure Defender Remediate security alerts using Azure Defender Lab M3: Mitigate threats using Azure Defender Deploy Azure Defender Mitigate Attacks with Azure Defender After completing module 3, students will be able to: Describe Azure Defender features Explain Azure Security Center features Explain which workloads are protected by Azure Defender Explain how Azure Defender protections function Configure auto-provisioning in Azure Defender Describe manual provisioning in Azure Defender Connect non-Azure machines to Azure Defender Describe alerts in Azure Defender Remediate alerts in Azure Defender Automate responses in Azure Defender Module 4: Create queries for Azure Sentinel using Kusto Query Language (KQL) Write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Azure Sentinel. This module will focus on the most used operators. The example KQL statements will showcase security related table queries. KQL is the query language used to perform analysis on data to create analytics, workbooks, and perform hunting in Azure Sentinel. Learn how basic KQL statement structure provides the foundation to build more complex statements. Learn how to summarize and visualize data with a KQL statement provides the foundation to build detections in Azure Sentinel. Learn how to use the Kusto Query Language (KQL) to manipulate string data ingested from log sources. Lessons M4 Construct KQL statements for Azure Sentinel Analyze query results using KQL Build multi-table statements using KQL Work with data in Azure Sentinel using Kusto Query Language Lab M4: Create queries for Azure Sentinel using Kusto Query Language (KQL) Construct Basic KQL Statements Analyze query results using KQL Build multi-table statements using KQL Work with string data using KQL statements After completing module 4, students will be able to: Construct KQL statements Search log files for security events using KQL Filter searches based on event time, severity, domain, and other relevant data using KQL Summarize data using KQL statements Render visualizations using KQL statements Extract data from unstructured string fields using KQL Extract data from structured string data using KQL Create Functions using KQL Module 5: Configure your Azure Sentinel environment Get started with Azure Sentinel by properly configuring the Azure Sentinel workspace. Traditional security information and event management (SIEM) systems typically take a long time to set up and configure. They're also not necessarily designed with cloud workloads in mind. Azure Sentinel enables you to start getting valuable security insights from your cloud and on-premises data quickly. This module helps you get started. Learn about the architecture of Azure Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements. As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Azure Sentinel. Lessons M5 Introduction to Azure Sentinel Create and manage Azure Sentinel workspaces Query logs in Azure Sentinel Use watchlists in Azure Sentinel Utilize threat intelligence in Azure Sentinel Lab M5 : Configure your Azure Sentinel environment Create an Azure Sentinel Workspace Create a Watchlist Create a Threat Indicator After completing module 5, students will be able to: Identify the various components and functionality of Azure Sentinel. Identify use cases where Azure Sentinel would be a good solution. Describe Azure Sentinel workspace architecture Install Azure Sentinel workspace Manage an Azure Sentinel workspace Create a watchlist in Azure Sentinel Use KQL to access the watchlist in Azure Sentinel Manage threat indicators in Azure Sentinel Use KQL to access threat indicators in Azure Sentinel Module 6: Connect logs to Azure Sentinel Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Azure Sentinel. The primary approach to connect log data is using the Azure Sentinel provided data connectors. This module provides an overview of the available data connectors. You will get to learn about the configuration options and data provided by Azure Sentinel connectors for Microsoft 365 Defender. Lessons M6 Connect data to Azure Sentinel using data connectors Connect Microsoft services to Azure Sentinel Connect Microsoft 365 Defender to Azure Sentinel Connect Windows hosts to Azure Sentinel Connect Common Event Format logs to Azure Sentinel Connect syslog data sources to Azure Sentinel Connect threat indicators to Azure Sentinel Lab M6: Connect logs to Azure Sentinel Connect Microsoft services to Azure Sentinel Connect Windows hosts to Azure Sentinel Connect Linux hosts to Azure Sentinel Connect Threat intelligence to Azure Sentinel After completing module 6, students will be able to: Explain the use of data connectors in Azure Sentinel Explain the Common Event Format and Syslog connector differences in Azure Sentinel Connect Microsoft service connectors Explain how connectors auto-create incidents in Azure Sentinel Activate the Microsoft 365 Defender connector in Azure Sentinel Connect Azure Windows Virtual Machines to Azure Sentinel Connect non-Azure Windows hosts to Azure Sentinel Configure Log Analytics agent to collect Sysmon events Explain the Common Event Format connector deployment options in Azure Sentinel Configure the TAXII connector in Azure Sentinel View threat indicators in Azure Sentinel Module 7: Create detections and perform investigations using Azure Sentinel Detect previously uncovered threats and rapidly remediate threats with built-in orchestration and automation in Azure Sentinel. You will learn how to create Azure Sentinel playbooks to respond to security threats. You'll investigate Azure Sentinel incident management, learn about Azure Sentinel events and entities, and discover ways to resolve incidents. You will also learn how to query, visualize, and monitor data in Azure Sentinel. Lessons M7 Threat detection with Azure Sentinel analytics Threat response with Azure Sentinel playbooks Security incident management in Azure Sentinel Use entity behavior analytics in Azure Sentinel Query, visualize, and monitor data in Azure Sentinel Lab M7: Create detections and perform investigations using Azure Sentinel Create Analytical Rules Model Attacks to Define Rule Logic Mitigate Attacks using Azure Sentinel Create Workbooks in Azure Sentinel After completing module 7, students will be able to: Explain the importance of Azure Sentinel Analytics. Create rules from templates. Manage rules with modifications. Explain Azure Sentinel SOAR capabilities. Create a playbook to automate an incident response. Investigate and manage incident resolution. Explain User and Entity Behavior Analytics in Azure Sentinel Explore entities in Azure Sentinel Visualize security data using Azure Sentinel Workbooks. Module 8: Perform threat hunting in Azure Sentinel In this module, you'll learn to proactively identify threat behaviors by using Azure Sentinel queries. You'll also learn to use bookmarks and livestream to hunt threats. You will also learn how to use notebooks in Azure Sentinel for advanced hunting. Lessons M8 Threat hunting with Azure Sentinel Hunt for threats using notebooks in Azure Sentinel Lab M8 : Threat hunting in Azure Sentinel Threat Hunting in Azure Sentinel Threat Hunting using Notebooks After completing this module, students will be able to: Describe threat hunting concepts for use with Azure Sentinel Define a threat hunting hypothesis for use in Azure Sentinel Use queries to hunt for threats. Observe threats over time with livestream. Explore API libraries for advanced threat hunting in Azure Sentinel Create and use notebooks in Azure Sentinel [-]
Les mer
2 dager 12 900 kr
Ønsker du å jobbe med ulike tegninger i Visio, men føler du ikke mestrer programmet? Vil du i tillegg kunne lage egne maler for å jobbe mer effektivt? Da er ”Visio ... [+]
Ønsker du å jobbe med ulike tegninger i Visio, men føler du ikke mestrer programmet? Vil du i tillegg kunne lage egne maler for å jobbe mer effektivt? Da er ”Visio Grunnleggende” kurset for deg! Kurset kan også spesialtilpasses og holdes bedriftsinternt i deres eller våre lokaler.   Kursinnhold:   Dag 1    Hva er Visio? Få oversikt. Bli kjent med programvinduet og hvordan du kan tilpasse det etter dine behov. Mal. Hvordan er en mal bygd opp og hvordan jobbe med en tegning? Formatering. Lær å formatere og hva formateringsbegrepet betyr. Sjablonger og figurer. Hva er sjablonger og figurer?   Å jobbe effektivt med Visio Bygge opp en tegning. Lær å bygge opp en tegning fra bunnen av. Hurtigtaster. Effektiv bruk av tastatur og mus. Formatering. Bruk formatering for å gjøre tegningene oversiktlige og informasjonen mest mulig tilgjengelig. Ark. Lær å jobbe med flere ark, navngi dem, slette dem, bruke bakgrunner etc. Praktisk oppgaveløsing. Jobb med skreddersydde oppgaver innenfor dagens temaer. Andre Office-programmer. Lær å bruke Visio-tegninger i andre Office-programmer.   Flytskjema og organisasjonskart Koblinger. Lær å koble figurer på en effektiv måte. Oppsett. Hvordan sørge for at figurene står plassert på en nøyaktig og oversiktlig måte? Navigasjon. Bygge opp praktisk navigasjon mellom sidene i en større tegning.   Dag 2    Nettverksdiagram Figurdata. Knytt praktisk informasjon til figurene i tegningen. Rapporter. Hvordan hente ut rapporter fra en tegning?   Prosjektplaner Tidslinje. Illustrere faser i et prosjekt på en oversiktlig måte. Gantt-diagram. Vise prosjektinformasjon på en mer detaljert måte. Utskrift. Få oversikt over de vanligste problemstillingene ved utskrift.   Egne maler Maler. Hva er maler, deres styrke og hvordan kan jeg utnytte dem best mulig i mitt arbeid? Sjablonger. Bygge opp en egen samling med de figurene du skal bruke. Figurer. Lær å lage egne tilpassede figurer. Praktisk oppgaveløsing. Jobb med skreddersydde oppgaver innenfor dagens temaer.   4 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Små kursgrupper 4. Kvalitets- og startgaranti   [-]
Les mer
Virtuelt eller personlig 3 dager 12 900 kr
AutoCAD Plant 3D er en omfattende integrert løsning som er faglig engasjerende med fokus på effektiv prosjektgjennomføring. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   AutoCAD plant 3D grunnkurs  Her er et utvalg av temaene du vil lære på kurset: Prosjektoppsetning og Modullinjer/net Design av stålkonstruksjoner Utstyr (opprettelse av utstyr og import av utstyr bl.a. fra Inventor) Rørdesign i 3D-modellen Redigering av stål, utstyr og rørtrekk Opprettelse av arrangementstegninger og rørisometritegninger  Uttrekk av mengdedata i listeform Kurset  gir  en innføring i systemets oppbygging med rørdesign i sentrum. Videre gjennomgås de enkelte modulene i henhold til følgende arbeidsflyt: P&ID. Integrert i løsningen er velkjente AutoCAD P&ID og vi tar utgangspunkt i et enkelt flytdiagram som representerer det skjematiske designet for minifabrikken vi skal modellere Stål/Struktur. Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no   [-]
Les mer
Oslo 5 dager 27 500 kr
15 Sep
15 Sep
24 Nov
https://www.glasspaper.no/kurs/ms-203-microsoft-365-messaging/ [+]
MS-203: Microsoft 365 Messaging (Exchange) [-]
Les mer
1 dag 8 000 kr
This one-day course will provide foundational level knowledge on Azure concepts; core Azure services; core solutions and management tools; general security and network se... [+]
COURSE OVERVIEW This course does not provide an Azure pass or time in the classroom for students to do any hands-on activities. TARGET AUDIENCE  This course is suitable for program managers and technical sales, with a general IT background. These students want to learn about our offerings, see how components are implemented, and ask questions about products and features. COURSE OBJECTIVES   Discuss the basics of cloud computing and Azure, and how to get started with Azure's subscriptions and accounts. Describe the advantages of using cloud computing services, learning to differentiate between the categories and types of cloud computing, and how to examine the various concepts, resources, and terminology that are necessary to work with Azure architecture. Outline the core services available with Microsoft Azure. Discuss the core solutions that encompass a wide array of tools and services from Microsoft Azure. Describe the general security and network security features, and how you can use the various Azure services to help ensure that your cloud resources are safe, secure, and trusted. Discuss the identity, governance, privacy, and compliance features, and how Azure can help you secure access to cloud resources, what it means to build a cloud governance strategy, and how Azure adheres to common regulatory and compliance standards. Discuss the factors that influence cost, tools you can use to help estimate and manage your cloud spend, and how Azure's service-level agreements (SLAs) can impact your application design decisions. COURSE CONTENT Module 1: Cloud Concepts In this module, you'll take an entry level end-to-end look at Azure and its capabilities, which will provide you with a solid foundation for completing the available modules for Azure Fundamentals. Introduction to Azure fundamentals Fundamental Azure concepts After completing this module, students will be able to: Understand the benefits of cloud computing in Azure and how it can save you time and money. Explain concepts such as high availability, scalability, elasticity, agility, and disaster recovery. Module 2: Core Azure Services In this module, you learn about core Azure services like Azure database, Azure compute, Azure storage, and Azure Networking. Core Azure architectural components Core Azure workload products Azure networking services Azure storage services Azure database services After completing this module, students will be able to: Describe core Azure architecture components such as subscriptions, management groups, and resources. Summarize geographic distribution concepts such as Azure regions, region pairs, and availability zones. Understand the services available in Azure including compute, network, storage, and databases. Identify virtualization services such as Azure VMs, Azure Container Instances, and Azure Kubernetes. Compare Azure's database services such as Azure Cosmos DB, Azure SQL, and Azure Database for MySQL. Examine Azure networking resources such as Virtual Networks, VPN Gateways, and Azure ExpressRoute. Summarize Azure storage services such Azure Blob Storage, Azure Disk Storage, and Azure File Storage. Module 3: Core Solutions In this module, you'll learn about AI machine learning, Azure DevOps, monitoring fundamentals, management fundamentals, serverless computing fundamentals. and IoT fundamentals. Choose the best Azure IoT service Choose the best AI service Choose the best Azure serverless technology Choose the best tools with DevOps and GitHub Choose the best management tools Choose the best Azure monitoring service After completing this module, students will be able to: Choose the correct Azure AI service to address different kinds of business challenges. Choose the best software development process tools and services for a given business scenario. Choose the correct cloud monitoring service to address different kinds of business challenges. Choose the correct Azure management tool to address different kinds of technical needs. Choose the right serverless computing technology for your business scenario. Choose the best Azure IoT service for a given business scenario. Module 4: General security and networking features In this module, you will learn how to protect yourself against security threats, and secure your networks with Azure. Security Tools and Features Secure Network Connectivity After completing this module, students will be able to: Strengthen your security posture and protect against threats by using Microsoft Defender for Cloud. Collect and act on security data from many different sources by using Microsoft Sentinel. Manage dedicated physical servers to host your Azure VMs for Windows and Linux. Identify the layers that make up a defense in depth strategy. Explain how Azure Firewall enables you to control what traffic is allowed on the network. Configure network security groups to filter network traffic to and from Azure resources. Explain how Azure DDoS Protection helps protect your Azure resources from DDoS attacks. Module 5: Identity, Governance, Privacy, and Compliance In this module, you will learn about Azure identity services, how to build a cloud governance strategy, and privacy, compliance and data protection standards on Azure. Core Azure identity services Azure Governance Methodologies Privacy, Compliance, and Data Protection standards After completing this module, students will be able to: Explain the difference between authentication and authorization. Describe how Azure Active Directory provides identity and access management. Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play. Make organizational decisions about your cloud environment by using the CAF for Azure. Define who can access cloud resources by using Azure role-based access control. Apply a resource lock to prevent accidental deletion of your Azure resources. Apply tags to your Azure resources to help describe their purpose. Control and audit how your resources are created by using Azure Policy. Enable governance at scale across multiple Azure subscriptions by using Azure Blueprints. Explain the types of compliance offerings that are available on Azure. Gain insight into regulatory standards and compliance on Azure. Explain Azure capabilities that are specific to government agencies. Module 6: Azure Pricing and Lifecycle In this module, you will learn how to plan and manage Azure costs, and how to choose the right Azure services though SLAs and service lifecycle. Planning and Cost Management Azure Service Level Agreements (SLAs) and Lifecycle After completing this module, students will be able to: Use the Total Cost of Ownership Calculator. Describe the different ways you can purchase Azure products and services. Use the Pricing calculator to estimate the monthly cost of running your cloud workloads. Define the major factors that affect total cost and apply recommended practices to minimize cost. Describe what a service-level agreement (SLA) is and why SLAs are important. Identify factors, such as the service tier you choose, that can affect an SLA. Combine SLAs to compute a composite SLA. Describe the service lifecycle in Azure. TEST CERTIFICATION This course helps to prepare for exam AZ-900. FOLLOW ON COURSES M-AZ104, Microsoft Azure Administrator M-AZ204, Developing Solutions for Microsoft Azure M-AZ303, Microsoft Azure Architect Technologies M-DP200, Implementing an Azure Data Solution (DP-200) [-]
Les mer
2 dager 9 800 kr
Har du jobbet litt med Adobe Photoshop, men ønsker å lære mer på et grunnleggende nivå? Da er dette grunnkurset perfekt for deg! [+]
Ønsker du en kjapp og smertefri introduksjon i verdens mest populære bildebehandlingsprogram? Kurset kan også spesialtilpasses og holdes bedriftsinternt i deres eller våre lokaler.   Kursinnhold:   Dag 1    Innføring Fargemodellene RGB og CMYK Beskjæring av bildet til trykk eller skjerm Utskriftsoppløsning og kameraoppløsning Forstå hvordan oppløsning fungerer Hva er de vanligste filformatene å jobbe i   Arbeidsmiljø Menyer og paletter. Hva inneholder disse, og hvordan får du fram det du ønsker? Tilpasse arbeidsmiljøet. Flytte på paletter og lagre egne oppsett tilpasset dine behov Navigering og zoom. Fokuser på det du jobber med, se helheten, og gjør dette raskt og effektivt Adobe Bridge. Introduksjon til programmet som organiserer og forhåndsviser filer og gjør det enklere for deg å jobbe Nytt dokument. Hvordan lage og tilpasse nye dokumenter med marger, spalter, sidevisning med mer?   Retusjering Bli kjent med retusjeringsverktøyene Se på hvilke muligheter du har i nyere utgave av Photoshop Fjerne uønskede elementer i bilder   Lag Bli kjent med lagpaletten Opprette, slette og organisere lag Transformering av lag Lagstiler og justeringslag   Markeringer Lær å bruke de forskjellige markeringsverktøyene Gjøre endringer på markerte områder Kombiner markeringsverktøy for å kun få tak i det du ønsker Opprett lag på bakgrunn av markeringer   Dag 2   Bildejusteringer Justere kontrast og tonalitet i et bilde Jobbe med å gjøre bilde lysere og mørkere Justere farger i et bilde Bytte ut én farge med en annen   Kombiner ulike verktøy for å utnytte mulighetene i Photoshop Jobbe med et bilde med ulike verktøy Markering og bildejustering Markering og fjerning av bakgrunnselementer Bruke smartere markedsverktøy   Lagring Lær om de ulike filformatene vi bør kjenne til Lagring til web og komprimering av bilder Lagring til trykk   Jobbe med flere bilder Klippe ut fra et bilde og lime inn i et annet Tekstverktøyet og tekstpalettene Tegneverktøy   4 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Små kursgrupper 4. Kvalitets- og startgaranti   [-]
Les mer