IT-kurs
Du har valgt: Sogn
Nullstill
Filter
Ferdig

-

3 dager 19 900 kr
02 Dec
This course will change the way you look at your C/C++ code. [+]
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed? This course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun. Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.   Participants attending this course will: Understand basic concepts of security, IT security and secure coding Realize the severe consequences of unsecure buffer handling Understand the architectural protection techniques and their weaknesses Have a practical understanding of cryptography Learn about XML security Learn about typical coding mistakes and how to avoid them Be informed about recent vulnerabilities in various platforms, frameworks and libraries Get sources and further readings on secure coding practices   Course Outline Day 1 IT security and secure coding x86 machine code, memory layout and stack operations Buffer overflow Day 2 Buffer overflow Practical cryptography XML security Common coding errors and vulnerabilities Day 3 Common coding errors and vulnerabilities Principles of security and secure coding Knowledge sources       [-]
Les mer
Oslo 2 dager 14 900 kr
07 Jan
04 Mar
29 Apr
Fast-paced, Interactive and Collaborative course in UX! [+]
Fast-paced UX is a broad field, covering psychology, research, analysis, design and prototyping. You will dive deeply into each topic, immersing yourself in the key skills and concepts. You will surface briefly (for coffee) before diving again... and again... Interactive We believe in learn-by-doing. So you will not be sitting through a two-day lecture. You will be on your feet, working in teams, getting hands-on practical experience. Because we know that people learn best when they get a chance to do it themselves. Collaborative We believe strongly in collaborative design: teamwork produces the best work. You will not be working solo. You will collaborate with your teammates on a genuine case study, to solve real design problems for a real company.    Course Outline A two-day program that follows the lifecycle of a UX project   MODULE 1: THEORY What is user experience? Functional, aesthetic and experience design The design process The remarkable benefits of the process User experience in the digital age Technology and complexity and usability What is wrong with software design Why UX became a necessity User experience and the web Active media v passive media Alan Cooper and personas Paradox of specificity What we need to know about users Goals, behaviours and context Mental models MODULE 2: RESEARCH Planning your research Deciding what you need to know Hypothesis and assumptions Bias and how to avoid it Desk research Benchmarking and heuristics Task analysis Third party research Qualitative research How to ask questions Interviews and observation Live usability test Quantitative research Online surveys Card sorting Analytics MODULE 3: RESEARCH ANALYSIS Harnessing your data The process of triangulation Identifying patterns Insight versus proof Personas The elements of a persona The pitfalls of personas Personas v marketing segments User scenarios and journeys Defining user scenarios Plotting a user journey Visualising your requirements From data to design Defining your feature set Prioritising your features Lean UX and the Minimum Viable Product MODULE 4: INTERACTION DESIGN Structure and organisation Mental models and concept models Information hierarchy and interaction flow Sitemaps and screenflows Interfaces and navigation Control, forgiveness and feedback Conventions and design patterns Storyboards and wireframes Designing for mobile Mobile mindsets Content versus navigation Tap targets Lean UX and design sprints Organising your sprint Design exercises Tips on facilitation MODULE 5: PROTOTYPING Planning your test Profiling your users Recruiting participants Creating a test script Building a prototype Minimum viable prototype Prototyping tools Building a prototype The test setup Desktop testing: hardware and software Mobile testing: hardware and software How to moderate a test Allowing participants to relax Giving instructions Open-ended questions [-]
Les mer
Oslo Stavanger 1 dag 9 900 kr
07 Dec
07 Dec
07 Dec
Med praktiske øvelser får du muligheten til å prøve de forskjellige applikasjonene selv, og lære hvordan du effektiv kan bruke Microsoft 365 både individuelt og med dine ... [+]
Microsofts skytjenester består av mange forskjellige samhandlings- og sikkerhetsfunksjoner. Med praktiske øvelser får du muligheten til å prøve de forskjellige applikasjonene selv, og lære hvordan du effektiv kan bruke Microsoft 365 både individuelt og med dine kollegaer. Vi har valgt å gjøre dette til et 2-dagers kurs for å sikre at du får tilstrekkelig kunnskap til å forstå sammenhengene, og kunne ta selvstendige valg når du er tilbake i arbeidshverdagen.   Etter kurset kan du  Bruke ulike tjenester i Microsoft 365, og velge hvilke verktøy som passer best til sine formål.    Kursinnhold  DAG 1  Hva er Microsoft 365?   Innhold og historie   Applikasjonene i Microsoft 365   Gjennomgang av de fleste applikasjonene i Microsoft 365 med tilhørende plattformstøtte (Mobil, nettbrett, PC/MAC)   Sammenheng og eksempler på bruksområder   Praktiske oppgaver på hvordan flere av applikasjoner kan brukes.  OneDrive  Lagre, del og synkroniser  Tilgjengelighet og oversikt  Jobbe med dokumenter  Deling  Samarbeid med deg selv   Enhetlig oppgavestyring   Microsoft To-Do og integrasjon med Teams og Planner   DAG 2  Microsoft Teams – Utnytt samhandling   Få en god oversikt over Microsoft Teams i sky, mobil og på PC.    Forstå forskjellen på team, kanaler, samtaler, filer og faner.    Finne relevant informasjon raskt og enkelt med søk, navigasjon og hurtigtaster.    Bruke Microsoft Teams som primært kommunikasjonsverktøy med direktemeldinger, samtaler med og uten video.    Hvordan best mulig benytte møtefunksjonalitet i Teams  Opprette et team med rettighetsstyring av medlemmer, gjester og eiere    Arbeide i prosjekter med Microsoft Teams og muligheten for enkel oppgavestyring.    Dokumenter («Mine» og firmaets)   Integrasjon mot andre tjenester og applikasjoner   SharePoint Online  Samhandling i SharePoint Online  Hub, kommunikasjons- og gruppeområder.  Byggestener i SharePoint Online (Dokumentbibliotek, lister m.fl)  Bruksområder  Andre applikasjoner  Flow  Oversikt over basisfunksjonalitet  Muligheter  Planner  Bruk av Planner i samhandling  Forms  Bruk av forms i Teams  Power BI  Oversikt over basisfunksjonalitet  Muligheter  [-]
Les mer
5 dager 30 000 kr
14 Dec
This course is just a great workshop that teaches how to implement securing technologies one at a time. [+]
This course is just a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them! Our goal is to teach you how to design and implement secure infrastructures based on the reasonable balance between security and comfort with great knowledge of attacker’s possibilities. This is a deep dive course on infrastructure services security, a must-go for enterprise administrators, security officers and architects. It is delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions. In this workshop you will investigate the critical tasks for a high-quality penetration test. We will look at the most efficient ways to map a network and discover target systems and services. Once it has been done, we will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of authored and commercial tools. In the attack summary we will always go through the securing techniques.   Exploits are not the only way to get to systems! We will go through the operating systems’ build in problems and explore how they can be beneficial for hackers! One of the most important things to conduct a successful attack is to understand how the targets work. To the bones! Afterwards everything is clear and the tool is just a matter of our need. The course covers all aspects of Windows infrastructure security from the hacker’s mind perspective! Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into operating systems. After the course you will gain penetration tester’s knowledge and tools. To get more practice we offer three extra weeks of labs online! All exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions!   Course content: Module 1: Hacking Windows Platform a) Detecting unnecessary servicesb) Misusing service accountsc) Implementing rights, permissions and privileges  Module 2: Top 50 tools: the attacker's best friends a) Practical walkthrough through toolsb) Using tools against scenariosc) Tools for Red Team / Pentestersd) Tools for Blue Team Module 3: Modern Malware a) Techniques used by modern malwareb) Advanced Persistent Threatsc) Fooling common protection mechanisms Module 4: Physical Access a) Misusing USB and other portsb) Offline Access techniquesc) BitLocker unlocking Module 5: Intercepting Communication a) Communicating through firewallsb) Misusing Remote Accessc) DNS based attacks Module 6: Hacking Web Server a) Detecting unsafe serversb) Hacking HTTPSc) Distributed Denial of Service attacks Module 7: Data in-Security a) Using incorrect file servers’ configurationb) Basic SQL Server attacksc) Detecting and attacking common network servers Module 8: Identity attacks a) Pass-the-Hash attacksb) Stealing the LSA Secretsc) Modern identity attacks techniques Module 9: Hacking automation a) Misusing administrative scriptsb) Script based scanningc) PowerShell for pen-testers Module 10: Designing Secure Windows Infrastructure a) Modern attacks and prevention techniquesb) Malware execution preventionc) Enterprise scale security challenges Module 11: Securing Windows Platform a) Defining and disabling unnecessary servicesb) Implementing secure service accountsc) Implementing rights, permissions and privilegesd) Code signing Module 12: Malware Protection a) Malware investigation techniquesb) Analyzing cases of real malwarec) Implementing protection mechanisms Module 13: Managing Physical Security a) Mitigating Offline Accessb) Implementing and managing BitLocker Module 14: Public Key Infrastructure Security a) Role and capabilities of the PKI in the infrastructureb) Designing PKI architecture overviewc) PKI security – Best practices Module 15: Securing Network Communication a) Deploying and managing Windows Firewall – advanced and useful featuresb) Deploying and configuring IPsecc) Deploying DNS and DNSSEC Module 16: Securing Web Server a) Configuring IIS features for securityb) Working with SSL Certificate Supportc) Monitoring Web Server resources and performanced) Deploying Distributed Denial of Service attack preventione) Deploying Network Load Balancing and Web FarmsModule Module 17: Mitigating the identity attacks a) Pass-the-Hash attack preventionb) LSA protection c) Credential Guard [-]
Les mer
Nettundervisning Sentrum 2 dager 7 900 kr
08 Dec
   Målet med kurset:   I dette grunnleggende kurset om IT-utvikling er målet at du som jobber eller må forholde deg til IT i hverdagen, uten og selv ha en IT-faglig bakgr... [+]
   Målet med kurset:   I dette grunnleggende kurset om IT-utvikling er målet at du som jobber eller må forholde deg til IT i hverdagen, uten og selv ha en IT-faglig bakgrunn, skal kunne få en økt forståelse av de abstrakte delene i et moderne IT-prosjektløp. Det legges også fokus på innovasjon og hvordan organisasjoner kan legge til rette for økt innovativt arbeid. Bakgrunn: Siden den første mikroprosessoren kom i 1971 har innovasjon og tjenestedesign dreid som om digitale IT-systemer i stadig større grad. I følge Evans Data Corporation var det i 2019 26,4 millioner datautviklere i verden. Det samme tallet er forventet å øke til 45 millioner innen 2030. De aller fleste yrker og bransjer har de seneste tiårene stått ovenfor en forandring som har ført til at digitale hjelpemidler og IT-systemer er blitt en godt integrert del av hverdagen. Likevel kan det være utfordrende for ikke-tekniske personer å beskrive tekniske behov eller beslutte teknologivalg i forbindelse med strategier for organisasjoner eller selskaper. IT-bransjen er preget av haugevis med abstrakte konsepter som kan være vanskelig å navigere både seg selv og andre gjennom. Dette kurset ble utviklet for å hjelpe privatpersoner og ansatte som møter IT i hverdagen og som ønsker å utvide sine kunnskaper for å kunne ta veloverveide IT-beslutninger, og for å henge med på IT-fagspråket en møter hos kunder og innad i bedriften.   Hva du vil lære:   Future of Business Future of Business er en studie gjort av CGI om hvordan teknologi påvirker samfunnet, individer og selskaper. Hvilke trender har vokst frem i dag og hvilke teknologier vil være bærebjelker inn i fremtiden?   Innovasjon i IT Hvordan kan fokus på innovasjon skape nye muligheter og verdi for kunder, ansatte og eiere? Hvordan skal et selskap legge til rette for organisk innovasjon?   Introduksjon til programmering Teknisk introduksjon til programmering. Hva er programmering? Hva kreves for å kjøre et program? Hvem kan gjøre det? Hvilke programmeringsspråk finnes, og hva skal en velge til hvilke formål? Enkle eksempler og noen få oppgaver   Introduksjon til moderne IT-applikasjoner Hvordan bygges en moderne applikasjon. Hva er forskjellene mellom frontend og backend? Hvordan bruker en databaser og hva er en server? Hva er et VM, Docker og Kubernetes? Hva finnes av fallgruver og hva inngår i iterativ DevOps-utvikling?   IT-strategi Hvordan skal en bedrift forholde seg til ulike metoder for automatisering? Bør organisasjonen velge scripting, Excel, hyllevare eller systemutvikling? Styrker og svakhet. Hva inngår i Design Thinking?   Hvordan organisere, lagre og dele kode i et utviklerteam Hvilke samhandlingsverktøy finnes for utviklere? Hva er Git? Hva inngår i et desentralisert versjonskontroll-system? Hvordan gjøres testdrevet utvikling?   Cloud, on-premise vs hybrid Hva er skytjenester? Microsoft Azure, Amazon Web Services og Google Cloud. Hvordan er prismodellene for å benytte seg av skytjenester?  Hvilke tjenester kan en bruke fra en skytjener?   Prosjektmetodikk Hva skiller å jobbe smidig mot å jobbe vannfall? Typiske utfordringer i et IT-prosjekt. Hvordan anvendes prosjektmodeller? XLPM og Difi prosjektveiviser. Prosjektspesifikasjon og scope – hvordan brukes dette effektivt?   Dataplattform Hvordan kan en moderne dataplattform hente ut ny innsikt og potensielt nye tjenester fra den eksisterende dataen i et selskap? Hva er datavarehus og Data Lakes? Hvordan kan dette brukes sammen med moderne rapporteringsverktøy innenfor BI?   Maskinlæring Hva er maskinlæring? Hvilke typiske verktøy benyttes for AI? Hvor intelligent er dagens systemer? Eksempler på maskinlæringsalgoritmer   Sikkerhet Hva inngår i Cybersecurity? Hva er «man in the middle»-angrep, DOS/DDoS-angrep og malware? Hvordan kan bedrifter sikre seg?   OM CGI CGI Group Inc. ble grunnlagt i 1976 og er verdens femte største uavhengige leverandør av tjenester innen IT- og forretningsprosesser. Med 74 000 medarbeidere over hele verden, leverer CGI en portefølje av ende-til-ende løsninger innen avanserte IT- og forretningskonsulenttjenester, systemintegrasjon og utsetting av IT- og forretningsprosesser. CGIs modell med kundenærhet, et globalt leveransenettverk og egne løsninger bidrar til at kundene hurtigere oppnår resultater og bidrar til deres digitale transformasjon. CGI har en samlet årlig omsetning på over 60 milliarder NOK. CGI-aksjene er notert på TSX (GIB.A) og NYSE (GIB). Hjemmeside: www.cgi.com [-]
Les mer
Oslo 3 dager 18 900 kr
09 Dec
09 Dec
07 Apr
This course is based around the following areas: Code reuse, Performance, Correctness, Refactoring and Function Components getting the same capabilities as Class Componen... [+]
Are you an experienced React developer and curious to deeply dive into  advanced topics and the changes of 2019? This course is based around the following areas: Code reuse, Performance, Correctness, Refactoring and Function Components getting the same capabilities as Class Components. React is introducing new functionality to address challenges that come with  above areas. This course shows you what you can do to make your React program  easier to build, smaller, faster and correct. Some of the changes will be released during 2019, but that doesn’t mean we  cannot explore the changes and write demos. The course will be a combination of many demos, presentations and hands-on  labs.   What you will learn: Patterns New Context API (React 16.3) Hooks (~Q1 2019) Profiler (React 16.5) Performance Concurrent Mode (~Q2 2019) Suspense (React 16.6 and ~Q3 2019) Considerations for maintainable projects  Jest Storybook   Content: Patterns:  Container pattern Props and state destructuring in render method Higher-Order Components Render-props Transclusion Implicit State pattern (see: Context)  New Context API (React 16.3): Provider Consumer  Using Hooks (~Q1 2019): Function components with state: useState() & useReducer() Function components with side effects: useEffect() Function components with context: useContext() Other React Hooks Refactoring Class components Writing Hooks (~Q1 2019): Writing Custom Hooks  Profiler (React 16.5) DevTools changes How to use Profiler API  Performance: MemoCompontent memo() useCallback() Hook useMemo() Hook react-virtualized Concurrent Mode (~Q2 2019): Preparations: Strict Mode (16.6) Responsive rendering without blocking the main thread Working with priorities  Suspense (React 16.6 and ~Q3 2019): Preparations: Strict Mode (16.6) Suspense component & lazy() (16.6)  Code splitting (16.6) Time slicing Data fetching Considerations for maintainable projects: Naming Code & folder organisation more?  Jest: Unit tests Testing asynchronous code Setup & Teardown Mocks Snapshot testing Integration tests Test React Applications  Storybook: Writing stories Using popular addons: Actions, Console, etc. Manual testing  Appendix: Using Redux and React with Hooks redux-react-hooks  [-]
Les mer
Oslo 2 dager 14 500 kr
04 Feb
04 Feb
15 Apr
The Lean IT Foundation Training is two days. During the training, you will learn the fundamentals of Lean and how to apply Lean in an IT domain. [+]
The Lean IT Foundation Training is two days. During the training, you will learn the fundamentals of Lean and how to apply Lean in an IT domain. In the training you will practice with exercises to build hands-on skills. The training will introduce you to the softer aspects of Lean IT like change approaches and how to change people’s behavior and attitude. All the exercises are related to ICT, but no technical IT knowledge is required.   Course description: This course is delivered using an exciting case study designed to further enhance the candidates understanding of Lean IT. Students who have attended this course are prepared to successfully take the associated Lean IT Foundation certification exam which is a requirement for attending any of the further Lean courses available in this track. At the end of this course, you will be able to: Understand the concepts behind Lean and how Lean can be applied in IT Analyze customer value and translate the voice of the customer to processes Understand Lean concepts as customer value, value streams, flow, pull, perfection Diagnose and improve processes with value stream mapping Problem solving with the Kaizen approach Work with the DMAIC improvement cycle Designate improvement activities that improve process results Understand what behaviors & attitudes are essential within Lean organizations Prepare the student to take the Lean IT Foundation Certification exam   Course Outline 1. INTRUDUCTION TO LEAN Introduction The history of Lean The key elements of Lean The concept of Waste, Variability and Inflexibility The five dimensions of Lean IT 2. THE COSTUMER Customer Value Voice of the Customer Value-add and non-value-add work Critical-to-quality tree Value streams in IT Cost of Poor Quality 3. THE PROCESS The concept of a process SIPOC diagramming Creating a Value Stream Map Analyzing a Value Stream Map 4. PERFORMANCE What is performance? Key Performance Indicators Operational Process Efficiency Skills and Knowledge Matrix 5. ORGANISATION Organizational structure and customer focus Performance Dialogue Visible Management Day Start and Week board 6. PROBLEM SOLVING Structured Problem Solving KAIZEN approach 7. BEHAVIOR & ATTITUDE Lean Leadership & Behavior Organizational Change Change Story 8. EXAM PREPERATION Sample Exam How to prepare for the exam Check Out   [-]
Les mer
Oslo 3 dager 18 900 kr
09 Dec
09 Dec
03 Feb
If you are getting started with programming and you are aiming to use C# and .NET, then this is the course for you. [+]
The course explains essential programming concepts and object-oriented techniques, and explores fundamental C# syntax in this context. After attending this course, you will be ready to start writing simple C# and .NET applications. You will also be well prepared for the C# 7 Development course, which dives deeper into C# syntax and .NET APIs.    What you will learn: Fundamental programming concepts Essential C# syntax Object oriented concepts How to implement OO in C# High-level introduction to the .NET Framework   Course outline: Programming Fundamentals: Types of programming languages; Structuring programs; Some simple code examples Getting Started with C# and .NET: Overview of C#; Overview of .NET; Compiling C# code at the command line; Using Visual Studio to create and build a simple console application Core C# Syntax: Basic syntax rules; Getting started with C# variables; Going further with C# variables; Getting started with C# operators Flow of Control Concepts: What is flow control; Making decisions; Making loops; Putting it all together to create algorithms Flow of Control in C#: Writing if and if-else statements; Writing switch statements; Writing for and for-each loops Writing and Calling Methods: What are methods; Defining and calling methods; Parameters and return values Introduction to Object Oriented Concepts: What is OO; Abstraction via classes; Encapsulation; Inheritance; OO design Classes and Objects in C#: Defining a simple class; Namespaces; Fields, constructors, methods, and properties; Creating new objects; Static members; A quick overview of some useful classes in .NET Arrays and Collections: Creating a simple array; Overview of generics; Creating simple collections and dictionaries; Overview of collection operations Inheritance: What is inheritance; Defining subclasses and superclasses in C#; Polymorphism Additional Techniques: Overview of delegates and lambdas; Exceptions; Interfaces High-Level Tour of the .NET Framework: Creating a GUI application; Creating a web application; Creating a REST web service; Database access   [-]
Les mer
Oslo 1 dag 8 900 kr
04 Dec
04 Dec
26 Feb
This course explores the advantages of cloud computing for your business and the fundamentals of AWS, including financial benefits. This course also introduces compliance... [+]
In this classroom course, you will learn the benefits of cloud computing and how a cloud strategy can help you meet your business objectives. This course explores the advantages of cloud computing for your business and the fundamentals of AWS, including financial benefits. This course also introduces compliance and security concepts to help you consider the AWS platform within your cloud computing strategy.Course Objectives  By attending this course, you will be able to: Identify the value and advantages of the AWS Cloud. Recognize the valuable ways that the AWS platform can be used. Understand the robust security capabilities, controls, and assurances in place to maintain data and network security. Articulate the financial impact the AWS Cloud can have on an organization’s cost management, while minimizing the risks associated with consumption-based pricing models.   Course outline: Getting started with the cloud Leveraging AWS for competitive advantages Cloud economics Security and compliance Migrating to the cloud [-]
Les mer
Nettkurs 1 dag 8 500 kr
18 Feb
25 Mar
17 Jun
Bli en terminal-ninja og lær å bruke funksjonaliteten i Linux Bash - skallet til vanlige oppgaver, systemadministrasjon, utvikling og data science. [+]
Vi går gjennom praktiske øvelser og tips og triks for bruk av bl.a.  Passordløs ssh, scp og sftp ved bruk av nøkler Redigere flere dokumenter samtidig med vim Håndtere av brukere og grupper Navigere og håndtere filsystemer, mapper og filer, inkludert eierskap og tilganger Analyse av loggfiler og andre tabulære data med grep, cut, sort, unic, sed, awk, wc mm. Hente av eksterne filer med wget, og bruke eksterne api'er med curl Installere og konfigurere programvare med apt/yum/dnf og vim Sette opp og administrere brannmur med ufw Sjekke sikkerheten med nmap og ncrack Monitorering med top og htop Håndtere prosesser med ps, pstree, kill, killall, bg og fg Håndtere daemons med systemctl Logg-sjekk med journalctl og logwatch Backup, komprimering og arkivering med tar, rsync, zip, gzip og bzip2 Sette opp jobber i crontab og bruke anacron til å kjøre jobber til fastsatte tider Bruke drop-down terminal-emulatorer som guake og yakuake Bruke tmux/screen for å kjøre flere terminal sessions samtidig, bevare sessions etter utlogging osv. Kryptering og dekryptering med gnupg, inkludert lage nøkkelsett og publisere offentlig nøkkel på nøkkelservere. Workshopen holdes på norsk og går over en hel dag, fra 9-15, for tiden online, med dedikert lærer og Microsoft Teams som kommunikasjonsplattform. Kursdatoer er ikke helt avklart ennå, men kontakt kurs@bouvet.no for påmelding!  [-]
Les mer
Oslo 4 dager 20 900 kr
01 Dec
02 Feb
02 Feb
In this course you will learn all about React and its ecosystem. Afterwards you are able to add React parts immediately to both existing and new websites. [+]
Is the HTML of your SPA also filled with unmaintainable semi code? Is data binding debugging and performance causing you headaches? Don't you remember how data finds its way to the UI? Lets react! Facebook created a new functional approach to tackle traditional complexities in JavaScript: ReactJS (open source). Maligned in 2013, embraced in 2015 by the largest websites in the world. Lets build fast components in a lasting and meaningful way. In this course you will learn all about React and its ecosystem. Afterwards you are able to add React parts immediately to both existing and new websites.   Content: Introduction: What is React? Why React? Module 1: Language constructs for React & Redux EcmaScript 2015 and later (JavaScript) JSX Babel transpiler Module 2: Basic Render Fragments Properties & State Databinding Events Module 3: Building Apps Functional vs Class components, single responsibility Multiple components Reusable components (prop-types / typescript) Module 4: Component Life Component lifecycle Fetch server data Module 5: Developer experience Debugging Developer tools Unit testing Updating to new React versions Module 6: Good to know Error Boundaries Forms DOM interactions Portals Wrapping existing components Optimizations (using shouldComponentUpdate). Module 7: Setting up a project Webpack ESLint Hot Module Replacement Create-react-app Zeit Next Module 8: Redux Basics Redux Basics Redux Dev Tools Module 9: React patterns (partly used by Redux) Pattern: Higher Order Components Pattern: Render Props Context (Pattern: Implicit state) Module 10: Advanced Redux Presentational vs Container Components React-Redux Async actions Redux Middleware Redux Undo Module 11: React Router Static routing No match (like a 404) Dynamic routing Redirection Prompt Module 12: Isomorphic Applications Server side rendering (universal/isomorphic applications), ReactJS.NET, Search Engine Optimization (SEO) Module 13: Styling Animations CSS, Inline styles Module 14: Future Suspense Time Slicing [-]
Les mer
Oslo 4 dager 20 000 kr
15 Dec
15 Dec
23 Feb
This course provides students with the skills and knowledge required to successfully create and maintain the cloud and edge portions of an Azure IoT solution. [+]
The course includes full coverage of the core Azure IoT services such as IoT Hub, Device Provisioning Services, Azure Stream Analytics, Time Series Insights, and more. In addition to the focus on Azure PaaS services, the course includes sections on IoT Edge, device management, monitoring and troubleshooting, security concerns, and Azure IoT Central.   Topics covered: Create, configure, and manage an Azure IoT hub. Provision devices by using IoT Hub and DPS, including provisioning at scale. Establish secure 2-way communication between devices and IoT Hub. Implement message processing by using IoT Hub routing and Azure Stream Analytics. Configure the connection to Time Series Insights and support business integration requirements. Implement IoT Edge scenarios using marketplace modules and various edge gateway patterns. Implement IoT Edge scenarios that require developing and deploying custom modules and containers. Implement device management using device twins and direct methods. Implement solution monitoring, logging, and diagnostics testing. Recognize and address security concerns and implement Azure Security Center for IoT. Build an IoT Solution by using Azure IoT Central and recongize SaaS opportunities for IoT.   Module 1: Introduction to IoT and Azure IoT Services In this module, students will begin by examining the business considerations for various IoT implementations and reviewing how the Azure IoT Reference Architecture supports IoT solutions. This module also provides students with an overview of the Azure services commonly used in an IoT solution and provides an introduction to the Azure portal.Lessons Business Opportunities for IoT Introduction to IoT Solution Architecture IoT Hardware and Cloud Services Lab Scenarios for this Course   Lab: Getting Started with AzureLab : Setting Started with Azure IoT ServicesAfter completing this module, students will be able to: Explain how IoT and Azure IoT could be applied to their business Describe the core components of an Azure IoT Solution Architecture Describe the Azure IoT Services and how they relate to an IoT solution Create an Azure account and use the Azure portal to create an IoT Hub and DPS service   Module 2: Devices and Device Communication In this module, students will take a closer look at the Azure IoT Hub service and will learn how to configure secure two-way communication between IoT hub and devices. Students will also be introduced to IoT Hub features such as Device Twins and IoT Hub Endpoints that will be explored in more depth as the course continues.Lessons IoT Hub and Devices IoT Developer Tools Device Configuration and Communication   Lab: Setup the Development EnvironmentLab : Connect IoT Device to AzureAfter completing this module, students will be able to: Explain the core features of the IoT Hub services Describe the lifecycle of an Azure IoT device Describe how IoT Hub manages device identities and implements other security features Register devices with the IoT Hub using the Azure portal, Azure CLI, and Visual Studio Code Implement the IoT Hub Device and Service SDKs   Module 3: Device Provisioning at Scale In this module, students will focus on device provisioning and how to configure and manage the Azure Device Provisioning Service. Students will learn about the enrollment process, auto-provisioning and re-provisioning, disenrollment, and how to implement various attestation mechanisms.Lessons Device Provisioning Service Terms and Concepts Configure and Manage the Device Provisioning Service Device Provisioning Tasks   Lab: Individual Enrollment of Devices in DPSLab : Automatic Enrollment of Devices in DPSAfter completing this module, students will be able to: Explain the process of device provisioning and the features of the Device Provisioning Service Explain the security considerations associated with device provisioning and how they are managed Implement the Device Provisioning Service SDKs Manage the device enrollment process, including deprovisioning and disenrollment   Module 4: Message Processing and Analytics In this module, students will examine how IoT Hub and other Azure services can be used to process messages. Students will begin with an investigation of how to configure message and event routing and how to implement routing to built-in and custom endpoints. Students will learn about some of the Azure storage options that are common for IoT solutions. To round out his module, students will implement Azure Stream Analytics and queries for a number of ASA patterns.Lessons Messages and Message Processing Data Storage Options Azure Stream Analytics   Lab: Device Message RoutingLab : Filtering and Aggregating Message DataAfter completing this module, students will be able to: Configure message and event routing Route data to the built-in and custom endpoints Implement message enrichment Implement Azure Stream Analytics Inputs, Queries, and Outputs Store message data in a warm storage for historical purposes and additional analysis Use an Azure Function within a message processing and analytics solution   Module 5: Insights and Business Integration In this module, students will learn about the Azure services and other Microsoft tools that can be used to generate business insights and enable business integration. Students will implement Azure Logic Apps and Event Grid, and they will configure the connection and data transformations for data visualization tools such as Time Series Insights and Power BI.Lessons Business Integration for IoT Solutions Data Visualization with Time Series Insights Data Visualization with Power BI   Lab: Integrate IoT Hub with Event GridLab : Explore and Analyze Time Stamped Data with Time Series InsightsAfter completing this module, students will be able to: Explain the options for business integration within an IoT solution and how to achieve them Develop business integration support using Logic Apps and Event Grid Configure IoT Data for Visualization in Time Series Insights Configure IoT Data for Visualization in Power BI   Module 6: Azure IoT Edge Deployment Process In this module, students will learn how to deploy a module to an Azure IoT Edge device. Students will also learn how to configure and use an IoT Edge device as a gateway device.Lessons Introduction to Azure IoT Edge Edge Deployment Process Edge Gateway Devices   Lab: Introduction to IoT EdgeLab : Set Up an IoT Edge GatewayAfter completing this module, students will be able to: Describe the difference between an IoT device and an IoT Edge device Configure an IoT Edge device Implement an IoT Edge deployment using a deployment manifest Configure an IoT Edge device as a gateway device   Module 7: Azure IoT Edge Modules and Containers In this module, students will develop and deploy custom edge modules, and will implement support for an offline scenario that relies on local storage. Students will use Visual Studio Code to build custom modules as containers using a supported container engine.Lessons Develop Custom Edge Modules Offline and Local Storage   Lab: Develop, Deploy, and Debug a Custom Module on Azure IoT EdgeLab : Run an IoT Edge Device in Restricted Network and OfflineAfter completing this module, students will be able to: Explain the requirements for building a custom edge module Configure Visual Studio Code for developing containerized modules Deploy a custom module to an IoT Edge device Implement local storage on an IoT Edge device in support of an offline scenario   Module 8: Device Management In this module, students will learn how to implement device management for their IoT solution. Students will develop device management solutions that use devoice twins and solutions that use direct methods.Lessons Introduction to IoT Device Management Manage IoT and IoT Edge Devices Device Management at Scale   Lab: Remotely Monitor and Control Devices with Azure IoT HubLab : Automatic Device ManagementAfter completing this module, students will be able to: Describe the most common device management patterns and configuration best practices Describe when and how to use device twins and direct methods to implement device management Implement device management for various patterns using device twins and direct methods Implement device management at scale using automatic device management and jobs   Module 9: Solution Testing, Diagnostics, and Logging In this module, students will configure logging and diagnostic tools that help developers to test their IoT solution. Students will use IoT Hub and Azure Monitor to configure alerts and track conditions such as device connection state that can be used to troubleshoot issues.Lessons Monitoring and Logging Troubleshooting   Lab: Configure Metrics and Logs in Azure IoT HubLab : Monitor and Debug Connection FailuresAfter completing this module, students will be able to: Describe the options for monitoring and logging an Azure IoT solution Configure Azure Monitor to support of an IoT solution Configure IoT Hub Metrics to support of an IoT solution Implement diagnostics logging Troubleshoot IoT device connection and communication issues Module 10: Azure Security Center and IoT Security Considerations In this module, students will examine the security considerations that apply to an IoT solution. Students will begin by investigating security as it applies to the solution architecture and best practices, and then look at how Azure Security Center for IoT supports device deployment and IoT Hub integration. Students then use Azure Security Center for IoT Agents to enhance the security of their solution.Lessons Security Fundamentals for IoT Solutions Introduction to Azure Security Center for IoT Enhance Protection with Azure Security Center for IoT Agents   Lab: Implementing Azure Security Center for IoTAfter completing this module, students will be able to: Describe security concerns and best practices for an IoT solution Describe the Azure IoT Security Architecture and Threat Modeling Describe the features and support provided by Azure Security Center for IoT Configure Security Agents and Security Module Twins Aggregate Azure Security Center for IoT Events   Module 11: Build an IoT Solution with IoT Central In this module, students will learn how configure and implement Azure IoT Central as a SaaS solution for IoT. Students will begin with a high-level investigation of IoT Central and how it works. With a basic understanding of IoT central establish, students will move on to creating and managing device templates, and then managing devices in their IoT Central application.Lessons Introduction to IoT Central Create and Manage Device Templates Manage Devices in Azure IoT Central   Lab: Get Started with Azure IoT CentralLab : Implementing IoT Solutions with Azure IoT CentralAfter completing this module, students will be able to: Describe the difference between Azure IoT Central and the Azure IoT PaaS services Describe the features provided by Azure IoT Central Describe the purpose and components of a Device Template Create and publish a Device Template Manage devices using rules and notifications Mange devices at scale using jobs     [-]
Les mer
Oslo 3 dager 22 900 kr
09 Dec
09 Dec
24 Feb
Building on concepts introduced in Architecting on AWS, Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic a... [+]
In this course, you will build on concepts introduced in Architecting on AWS. You will learn how to build complex solutions that incorporate data services, governance, and security on the AWS platform. You will also learn about specialized AWS services, including AWS Direct Connect and AWS Storage Gateway, that support hybrid architecture, and you will learn about best practices for building scalable, elastic, secure, and highly available applications on AWS. Course Objectives This course teaches you how to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises data center to the AWS Cloud Discuss billing implications of connecting multi-region VPCs Move large data from an on-premises data center to AWS Design large data stores for the AWS Cloud Understand different architectural designs for scaling a large website Protect your infrastructure from distributed denial of service (DDOS) attacks Secure your data on AWS with encryption Design protection of data at rest and data in transit Enhance the performance of your solutions Select the most appropriate AWS deployment mechanism   Delivery method:This course is delivered through a mix of: Instructor-led Training (ILT) Web-Based Training (WBT) Hands-on Labs   Hands-on activity:This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.   Course Outline:  Day 1 Review of Architecting for the Cloud Best Practices and the AWS Well-Architected Framework AWS Account Strategies Advanced Networking Architectures Deployment Management on AWS Day 2 Designing Large Datastores Moving Large Datastores into AWS Big Data Architectures Designing for Large Scale Applications Day 3 Building Resilience into Your Architecture Data Encryption and Key Management in AWS Securing Data on AWS Designing for Performance     [-]
Les mer
Bærum Hele landet 2 dager 9 900 kr
18 Jan
15 Feb
Autodesk Nastran In-CAD – Grunnkurs får deg godt i gang med Nastan In-CAD og finite element (FE) beregninger. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Her er et utvalg av temaene du vil lære på kurset: Generelt om Nastran In-CAD brukergrensesnitt Gjennomgang av hvilke typer FE-analyser som kan utføres med Nastran In-CAD Innføring i opprettelse av beregningsmodeller i Nastran In-CAD Gjennomføre analyser Vurdere beregningsresultater Presentasjon av beregningsresultater Det blir undervist i grunnleggende funksjonalitet og metodikk som gjør at deltakeren kan skape FE-beregningsmodeller med utgangspunkt i 3D-modeller i Inventor. Autodesk Nastan In-CAD – Grunnkurs er et kurs som alle Inventor-brukere bør gjennomføre for å komme i gang med FE-beregninger av konstruksjoner som modelleres i Inventor.   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Oslo 3 dager 15 500 kr
25 Jan
25 Jan
SIAM is a management methodology that can be applied in an environment where services are delivered using a number of service providers. [+]
SIAM is a management methodology that can be applied in an environment where services are delivered using a number of service providers. Adopting a different level of focus to traditional supplier management with one customer and multiple suppliers, with each supplier subject to individual management, SIAM concentrates on governance, coordination and integration of the service providers, to ensure maximum benefit is achieved by the customer organization. Beskrivelse: SIAM is an evolution of how to apply a framework for integrated service management across multiple service providers. It has developed as the service provider ecosystem in organizations has changed, from a single outsourced supplier model, to multiple outsourced suppliers. SIAM has evolved from the challenges associated with these more complex operating models.   Innhold: Service integration and management (SIAM) is a management methodology that can be applied in an environment that includes services sourced from a number of service providers. SIAM supports cross-functional, cross-process, and cross-provider integration. It creates an environment where all parties:Know their role, responsibilities and context in the ecosystemAre empowered to deliverAre held accountable for the outcomes they are required to deliver.  Day 1: Introduction About this course Module 1 – Introduction to SIAM Module 2 - The SIAM Ecosystem Module 3 – SIAM roles and responsibilities Module 3 continued Day 2: Review day 1 Module 4 – SIAM Implementation Roadmap Module 4 continued Module 5 - The SIAM Practices Module 6 – Processes to support SIAM Day 3: Review day 2 Module 7 – Challenges and risks Module 8 - SIAM and other practices Course review Self study Exam   [-]
Les mer

Lukk Denne siden benytter seg av informasjonskapsler (cookies).
Du kan fortsette å bruke siden som vanlig hvis du godtar dette. Les mer om bruk av informasjonskapsler i vår personvernerklæring.