IT-kurs
Vestfold
Du har valgt: Sandefjord
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Sandefjord ) i IT-kurs
 

Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Specialist: Drive Stakeholder Value dekker alle typer engasjement og interaksjon mellom en tjenesteleverandør og deres kunder, brukere, leverandører og partnere. [+]
Kurset fokuserer på konvertering av etterspørsel til verdi via IT-relaterte tjenester. Modulen dekker sentrale emner som SLA-design, styring av flere leverandører, kommunikasjon, relasjonsstyring, CX- og UX-design, kartlegging av kunder og mer. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på  AXELOS sine websider. Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Strategist: Direct, Plan and improve er en modul innen ITIL®. Modulen er en nøkkelkomponenten i både ITIL® 4 Managing Professional og ITIL® 4 Strategic Leader-løp... [+]
Modulen dekker bruk og effekt av Lean og agile arbeidsmåter, og hvordan dette kan utnyttes til fordel for organisasjonen. Kurset vil gi kandidatene en praktisk og strategisk metode for å planlegge og levere kontinuerlig forbedring med nødvendig smidighet.  E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 12 moduler. Les mer om ITIL® 4 på AXELOS sine websider Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert.   [-]
Les mer
Virtuelt eller personlig 1 dag 5 950 kr
AutoCAD P&ID Grunnkurs er ment for deg som skal bruke AutoCAD P&ID som verktøy til P&I-diagrammer. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   AutoCAD P&ID grunnkurs Her er et utvalg av temaene du vil lære på kurset: Opprette og håndtere P&ID-prosjekter Tegne og redigere P&ID-diagrammer Eksportere og Importere data via Excel Uttrekk av lister og rapporter Du vil lære å opprette og håndtere P&ID-prosjekter, tegne diagrammer med de verktøy og kommandoer som er designet til formålet, og bruke toolpalettenes utstyr, ventiler, fittings og instrumenter. I tillegg til å bruke valideringsverktøyet til å kvalitetssikre ditt prosjekt, eksportfunksjonen til å skape 'nøytrale' AutoCAD-kopier av dine P&ID-tegninger samt å lage forskjellige rapporter og datauttrekk for f.eks. utstyr, ventiler, instrumenter osv.   Dette er et populært kurs, meld deg på nå!   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Oslo 1 dag 9 900 kr
22 Sep
22 Sep
01 Dec
ITIL® 4 Practitioner: Change enablement [+]
ITIL® 4 Practitioner: Change Enablement [-]
Les mer
1 dag 8 000 kr
This one-day course will provide foundational level knowledge on Azure concepts; core Azure services; core solutions and management tools; general security and network se... [+]
COURSE OVERVIEW This course does not provide an Azure pass or time in the classroom for students to do any hands-on activities. TARGET AUDIENCE  This course is suitable for program managers and technical sales, with a general IT background. These students want to learn about our offerings, see how components are implemented, and ask questions about products and features. COURSE OBJECTIVES   Discuss the basics of cloud computing and Azure, and how to get started with Azure's subscriptions and accounts. Describe the advantages of using cloud computing services, learning to differentiate between the categories and types of cloud computing, and how to examine the various concepts, resources, and terminology that are necessary to work with Azure architecture. Outline the core services available with Microsoft Azure. Discuss the core solutions that encompass a wide array of tools and services from Microsoft Azure. Describe the general security and network security features, and how you can use the various Azure services to help ensure that your cloud resources are safe, secure, and trusted. Discuss the identity, governance, privacy, and compliance features, and how Azure can help you secure access to cloud resources, what it means to build a cloud governance strategy, and how Azure adheres to common regulatory and compliance standards. Discuss the factors that influence cost, tools you can use to help estimate and manage your cloud spend, and how Azure's service-level agreements (SLAs) can impact your application design decisions. COURSE CONTENT Module 1: Cloud Concepts In this module, you'll take an entry level end-to-end look at Azure and its capabilities, which will provide you with a solid foundation for completing the available modules for Azure Fundamentals. Introduction to Azure fundamentals Fundamental Azure concepts After completing this module, students will be able to: Understand the benefits of cloud computing in Azure and how it can save you time and money. Explain concepts such as high availability, scalability, elasticity, agility, and disaster recovery. Module 2: Core Azure Services In this module, you learn about core Azure services like Azure database, Azure compute, Azure storage, and Azure Networking. Core Azure architectural components Core Azure workload products Azure networking services Azure storage services Azure database services After completing this module, students will be able to: Describe core Azure architecture components such as subscriptions, management groups, and resources. Summarize geographic distribution concepts such as Azure regions, region pairs, and availability zones. Understand the services available in Azure including compute, network, storage, and databases. Identify virtualization services such as Azure VMs, Azure Container Instances, and Azure Kubernetes. Compare Azure's database services such as Azure Cosmos DB, Azure SQL, and Azure Database for MySQL. Examine Azure networking resources such as Virtual Networks, VPN Gateways, and Azure ExpressRoute. Summarize Azure storage services such Azure Blob Storage, Azure Disk Storage, and Azure File Storage. Module 3: Core Solutions In this module, you'll learn about AI machine learning, Azure DevOps, monitoring fundamentals, management fundamentals, serverless computing fundamentals. and IoT fundamentals. Choose the best Azure IoT service Choose the best AI service Choose the best Azure serverless technology Choose the best tools with DevOps and GitHub Choose the best management tools Choose the best Azure monitoring service After completing this module, students will be able to: Choose the correct Azure AI service to address different kinds of business challenges. Choose the best software development process tools and services for a given business scenario. Choose the correct cloud monitoring service to address different kinds of business challenges. Choose the correct Azure management tool to address different kinds of technical needs. Choose the right serverless computing technology for your business scenario. Choose the best Azure IoT service for a given business scenario. Module 4: General security and networking features In this module, you will learn how to protect yourself against security threats, and secure your networks with Azure. Security Tools and Features Secure Network Connectivity After completing this module, students will be able to: Strengthen your security posture and protect against threats by using Microsoft Defender for Cloud. Collect and act on security data from many different sources by using Microsoft Sentinel. Manage dedicated physical servers to host your Azure VMs for Windows and Linux. Identify the layers that make up a defense in depth strategy. Explain how Azure Firewall enables you to control what traffic is allowed on the network. Configure network security groups to filter network traffic to and from Azure resources. Explain how Azure DDoS Protection helps protect your Azure resources from DDoS attacks. Module 5: Identity, Governance, Privacy, and Compliance In this module, you will learn about Azure identity services, how to build a cloud governance strategy, and privacy, compliance and data protection standards on Azure. Core Azure identity services Azure Governance Methodologies Privacy, Compliance, and Data Protection standards After completing this module, students will be able to: Explain the difference between authentication and authorization. Describe how Azure Active Directory provides identity and access management. Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play. Make organizational decisions about your cloud environment by using the CAF for Azure. Define who can access cloud resources by using Azure role-based access control. Apply a resource lock to prevent accidental deletion of your Azure resources. Apply tags to your Azure resources to help describe their purpose. Control and audit how your resources are created by using Azure Policy. Enable governance at scale across multiple Azure subscriptions by using Azure Blueprints. Explain the types of compliance offerings that are available on Azure. Gain insight into regulatory standards and compliance on Azure. Explain Azure capabilities that are specific to government agencies. Module 6: Azure Pricing and Lifecycle In this module, you will learn how to plan and manage Azure costs, and how to choose the right Azure services though SLAs and service lifecycle. Planning and Cost Management Azure Service Level Agreements (SLAs) and Lifecycle After completing this module, students will be able to: Use the Total Cost of Ownership Calculator. Describe the different ways you can purchase Azure products and services. Use the Pricing calculator to estimate the monthly cost of running your cloud workloads. Define the major factors that affect total cost and apply recommended practices to minimize cost. Describe what a service-level agreement (SLA) is and why SLAs are important. Identify factors, such as the service tier you choose, that can affect an SLA. Combine SLAs to compute a composite SLA. Describe the service lifecycle in Azure. TEST CERTIFICATION This course helps to prepare for exam AZ-900. FOLLOW ON COURSES M-AZ104, Microsoft Azure Administrator M-AZ204, Developing Solutions for Microsoft Azure M-AZ303, Microsoft Azure Architect Technologies M-DP200, Implementing an Azure Data Solution (DP-200) [-]
Les mer
Oslo Bergen 5 dager 34 000 kr
11 Aug
01 Sep
08 Sep
CCNA: Implementing and Administering Cisco Solutions [+]
CCNA: Implementing and Administering Cisco Solutions [-]
Les mer
Oslo Bergen 3 dager 20 900 kr
10 Sep
10 Sep
22 Sep
Implementing REST Services using Web API [+]
Implementing REST Services using Web API [-]
Les mer
Virtuelt klasserom 3 timer 1 990 kr
02 Sep
21 Oct
02 Dec
Vi utforsker mulighetene med diagrammer i Excel, går gjennom de mest brukte diagramvariantene og utforsker mulighetene. Vi tar også en kort innføring i pivottabeller slik... [+]
Kursinnhold Hva slags data kan brukes som grunnlag for et diagram Stolpediagram Sektordiagram Kombinert diagram Formatering av diagrammer Tips og triks Smarte løsninger Sparkline Hurtiganalyse Bruk av Excels diagrammer i andre Office-programmer [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
2 dager 7 900 kr
Etter fullført kurs skal du kunne tegne illustrasjoner og logoer, klargjøre illustrasjoner for utkjøring og ha oversikt over programmets bruksområder. [+]
Vil du lære å tegne illustrasjoner og logoer til bruk i alle medier? Illustrator tegner vektorgrafikk som kan forstørres ubegrenset, uten å tape kvalitet og kan derfor brukes overalt. Adobe Illustrator er verktøyet for illustratører og grafiske designere, men også et program for deg som vil lage litt enklere illustrasjoner til internett, Power Point og Word. På kurset lærer du å ta utgangspunkt i enkle basisformer og kombinere dem til kompliserte figurer, slik at det blir det lett for alle å tegne. Hvorfor ta dette kurset: Du får en grundig innføring i programmet Du vil lære konkrete tegne- og designoppgaver Du vil lære å redigere/endre Illustrator-filer du mottar Du vil lære å lage illustrasjoner og logoer Du vil lære å lage grafikk for bruk på internett, lesebrett eller mobil Du vil lære effektive arbeidsmetoder Du får kontroll på tegninger med mange elementer og lag Du vil lære om fargebruk og klargjøring av filer for trykk og nett Dette lærer du: Arbeidsmiljøet i programmet Tegning med tegneverktøyene og ved å kombinere enkle grunnformer Redigering og transformering av objekter Innsetting av tekst og bilder Tekstbearbeiding Lage bannerannonser Bruk av farger og forløpninger Lag og gjennomsiktighet [-]
Les mer
Oslo Bergen 4 dager 25 900 kr
25 Nov
25 Nov
16 Dec
Advanced Python Development [+]
Advanced Python Development [-]
Les mer
Oslo 5 dager 27 500 kr
15 Sep
15 Sep
17 Nov
PL-500T00: Microsoft Power Automate RPA Developer [+]
PL-500: Microsoft Power Automate RPA Developer [-]
Les mer
Virtuelt klasserom 4 dager 24 000 kr
This course provides the knowledge and skills to design and implement DevOps processes and practices. [+]
Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms TARGET AUDIENCE Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. COURSE OBJECTIVES Plan for the transformation with shared goals and timelines Select a project and identify project metrics and Key Performance Indicators (KPI's) Create a team and agile organizational structure Design a tool integration strategy Design a license management strategy (e.g., Azure DevOps and GitHub users) Design a strategy for end-to-end traceability from work items to working software Design an authentication and access strategy Design a strategy for integrating on-premises and cloud resources Describe the benefits of using Source Control Describe Azure Repos and GitHub Migrate from TFVC to Git Manage code quality, including technical debt SonarCloud, and other tooling solutions Build organizational knowledge on code quality Explain how to structure Git repos Describe Git branching workflows Leverage pull requests for collaboration and code reviews Leverage Git hooks for automation Use Git to foster inner source across the organization Explain the role of Azure Pipelines and its components Configure Agents for use in Azure Pipelines Explain why continuous integration matters Implement continuous integration using Azure Pipelines Design processes to measure end-user satisfaction and analyze user feedback Design processes to automate application analytics Manage alerts and reduce meaningless and non-actionable alerts Carry out blameless retrospectives and create a just culture Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure Implement compliance and security in your application infrastructure Describe the potential challenges with integrating open-source software Inspect open-source software packages for security and license compliance Manage organizational security and compliance policies Integrate license and vulnerability scans into build and deployment pipelines Configure build pipelines to access package security and license ratings   COURSE CONTENT Module 1: Get started on a DevOps transformation journey Module 1 Lessons Introduction to DevOps Choose the right project Describe team structures Choose the DevOps tools Plan Agile with GitHub Projects and Azure Boards Introduction to source control Describe types of source control systems Work with Azure Repos and GitHub Lab 1: Agile planning and portfolio management with Azure Boards   Lab 2: Version controlling with Git in Azure Repos   After completing Module 1, students will be able to: Understand what DevOps is and the steps to accomplish it Identify teams to implement the process Plan for the transformation with shared goals and timelines Plan and define timelines for goals Understand different projects and systems to guide the journey Select a project to start the DevOps transformation Identify groups to minimize initial resistance Identify project metrics and Key Performance Indicators (KPI's) Understand agile practices and principles of agile development Create a team and agile organizational structure Module 2: Development for enterprise DevOps Module 2 Lessons Structure your Git Repo Manage Git branches and workflows Collaborate with pull requests in Azure Repos Explore Git hooks Plan foster inner source Manage Git repositories Identify technical debt Lab 3: Version controlling with Git in Azure Repos   After completing Module 2, students will be able to: Understand Git repositories Implement mono repo or multiple repos Explain how to structure Git Repos Implement a change log Describe Git branching workflows Implement feature branches Implement GitFlow Fork a repo Leverage pull requests for collaboration and code reviews Give feedback using pull requests Module 3: Implement CI with Azure Pipelines and GitHub Actions Module 3 Lessons Explore Azure Pipelines Manage Azure Pipeline agents and pools Describe pipelines and concurrency Explore Continuous integration Implement a pipeline strategy Integrate with Azure Pipelines Introduction to GitHub Actions Learn continuous integration with GitHub Actions Design a container build strategy Lab 4: Configuring agent pools and understanding pipeline styles   Lab 5: Enabling continuous integration with Azure Pipelines   Lab 6: Integrating external source control with Azure Pipelines   Lab 7: Implementing GitHub Actions by using DevOps Starter   Lab 8: Deploying Docker Containers to Azure App Service web apps   After completing Module 3, students will be able to: Describe Azure Pipelines Explain the role of Azure Pipelines and its components Decide Pipeline automation responsibility Understand Azure Pipeline key terms Choose between Microsoft-hosted and self-hosted agents Install and configure Azure pipelines Agents Configure agent pools Make the agents and pools secure Use and estimate parallel jobs Module 4: Design and implement a release strategy Module 4 Lessons Introduction to continuous delivery Create a release pipeline Explore release strategy recommendations Provision and test environments Manage and modularize tasks and templates Automate inspection of health Lab 9: Creating a release dashboard   Lab 10: Controlling deployments using Release Gates   After completing Module 4, students will be able to: Explain continuous delivery (CD) Implement continuous delivery in your development cycle Understand releases and deployment Identify project opportunities to apply CD Explain things to consider when designing your release strategy Define the components of a release pipeline and use artifact sources Create a release approval plan Implement release gates Differentiate between a release and a deployment Module 5: Implement a secure continuous deployment using Azure Pipelines Module 5 Lessons Introduction to deployment patterns Implement blue-green deployment and feature toggles Implement canary releases and dark launching Implement A/B testing and progressive exposure deployment Integrate with identity management systems Manage application configuration data Lab 11: Configuring pipelines as code with YAML   Lab 12: Setting up and running functional tests   Lab 13: Integrating Azure Key Vault with Azure DevOps   After completing Module 5, students will be able to: Explain the terminology used in Azure DevOps and other Release Management Tooling Describe what a Build and Release task is, what it can do, and some available deployment tasks Implement release jobs Differentiate between multi-agent and multi-configuration release job Provision and configure target environment Deploy to an environment securely using a service connection Configure functional test automation and run availability tests Setup test infrastructure Use and manage task and variable groups Module 6: Manage infrastructure as code using Azure and DSC Module 6 Lessons Explore infrastructure as code and configuration management Create Azure resources using Azure Resource Manager templates Create Azure resources by using Azure CLI Explore Azure Automation with DevOps Implement Desired State Configuration (DSC) Implement Bicep Lab 14: Azure deployments using Azure Resource Manager templates   After completing Module 6, students will be able to: Understand how to deploy your environment Plan your environment configuration Choose between imperative versus declarative configuration Explain idempotent configuration Create Azure resources using ARM templates Understand ARM templates and template components Manage dependencies and secrets in templates Organize and modularize templates Create Azure resources using Azure CLI Module 7: Implement security and validate code bases for compliance Module 7 Lessons Introduction to Secure DevOps Implement open-source software Software Composition Analysis Static analyzers OWASP and Dynamic Analyzers Security Monitoring and Governance Lab 15: Implement security and compliance in Azure Pipelines   Lab 16: Managing technical debt with SonarQube and Azure DevOps   After completing Module 7, students will be able to: Identify SQL injection attack Understand DevSecOps Implement pipeline security Understand threat modeling Implement open-source software Explain corporate concerns for open-source components Describe open-source licenses Understand the license implications and ratings Work with Static and Dynamic Analyzers Configure Microsoft Defender for Cloud Module 8: Design and implement a dependency management strategy Module 8 Lessons Explore package dependencies Understand package management Migrate, consolidate, and secure artifacts Implement a versioning strategy Introduction to GitHub Packages Lab 17: Package management with Azure Artifacts   After completing Module 8, students will be able to: Define dependency management strategy Identify dependencies Describe elements and componentization of a dependency management Scan your codebase for dependencies Implement package management Manage package feed Consume and create packages Publish packages Identify artifact repositories Migrate and integrate artifact repositories Module 9: Implement continuous feedback Module 9 Lessons Implement tools to track usage and flow Develop monitor and status dashboards Share knowledge within teams Design processes to automate application analytics Manage alerts, Blameless retrospectives and a just culture Lab 18: Monitoring application performance with Application Insights   Lab 19: Integration between Azure DevOps and Microsoft Teams   Lab 20: Sharing Team Knowledge using Azure Project Wikis   After completing Module 9, students will be able to: Implement tools to track feedback Plan for continuous monitoring Implement Application Insights Use Kusto Query Language (KQL) Implement routing for mobile applications Configure App Center Diagnostics Configure alerts Create a bug tracker Configure Azure Dashboards Work with View Designer in Azure Monitor [-]
Les mer