Alle kategorier
Du har valgt: IT-kurs
Nullstill
Filter
Ferdig

-

Mer enn 100 treff i IT-kurs
 

3 dager 1 500 kr
PowerPoint 2010 er et presentasjonsprogram som brukes når vi skal vise fram data – enten det er tekst, bilder, tall eller tegninger. [+]
PowerPoint 2010 er et presentasjonsprogram som brukes når vi skal vise fram data – enten det er tekst, bilder, tall eller tegninger. Programmet kan brukes til å lage lysark som skrives ut, eller vi kan vise presentasjonen ved hjelp av PC + videokanon. På kurset vil grunnleggende funksjoner vektlegges, men vi vil og se på hvordan en bygger opp og setter sammen en presentasjon. Forkunnskaper: Du må ha kunnskaper tilsvarende PC-begynnerkurs. Brukere av Powerpoint 2007 kan og følge dette kurset. [-]
Les mer
Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Strategist: Direct, Plan and improve er en modul innen ITIL®. Modulen er en nøkkelkomponenten i både ITIL® 4 Managing Professional og ITIL® 4 Strategic Leader-løp... [+]
Modulen dekker bruk og effekt av Lean og agile arbeidsmåter, og hvordan dette kan utnyttes til fordel for organisasjonen. Kurset vil gi kandidatene en praktisk og strategisk metode for å planlegge og levere kontinuerlig forbedring med nødvendig smidighet.  E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 12 moduler. Les mer om ITIL® 4 på AXELOS sine websider Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert.   [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Oslo 2 dager 16 900 kr
18 Sep
01 Dec
Modern Application Architecture [+]
Modern Application Architecture [-]
Les mer
Nettkurs 12 måneder 12 000 kr
ITIL® 4 Specialist: Drive Stakeholder Value dekker alle typer engasjement og interaksjon mellom en tjenesteleverandør og deres kunder, brukere, leverandører og partnere. [+]
Kurset fokuserer på konvertering av etterspørsel til verdi via IT-relaterte tjenester. Modulen dekker sentrale emner som SLA-design, styring av flere leverandører, kommunikasjon, relasjonsstyring, CX- og UX-design, kartlegging av kunder og mer. E-læringskurset inneholder 18 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på  AXELOS sine websider. Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. [-]
Les mer
5 dager 25 500 kr
MS-100: Microsoft 365 Identity and Services [+]
MS-100: Microsoft 365 Identity and Services [-]
Les mer
Virtuelt klasserom 5 dager 38 000 kr
(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the re... [+]
COURSE OVERVIEW A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration. This professional competence is measured against a globally recognized body of knowledge. The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)²’s Certified Information Systems Security Professional (CISSP) and CSA’s Certificate of Cloud Security Knowledge (CCSK). As an (ISC)2 Official Training Provider, we use courseware developed by (ISC)² –creator of the CCSP CBK –to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CCSP and have completed intensive training to teach (ISC)² content. Please Note: An exam voucher is included with this course   TARGET AUDIENCE Experienced cybersecurity and IT/ICT professionals who are involved in transitioning to and maintaining cloud-basedsolutions and services. Roles include:• Cloud Architect• Chief Information Security Officer (CISO)• Chief Information Officer (CIO)• Chief Technology Officer (CTO)• Engineer/Developer/Manager• DevOps• Enterprise Architect• IT Contract Negotiator• IT Risk and Compliance Manager• Security Administrator• Security Analyst• Security Architect• Security Consultant• Security Engineer• Security Manager• Systems Architect• Systems Engineer• SecOps   COURSE OBJECTIVES After completing this course you should be able to:   Describe the physical and virtual components of and identify the principle technologies of cloud based systems Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations Contrast between forensic analysis in corporate data center and cloud computing environments Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing Identify and explain the six phases of the data lifecycle Explain strategies for protecting data at rest and data in motion Describe the role of encryption in protecting data and specific strategies for key management Compare a variety of cloud-based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements Contrast security aspects of Software Development Lifecycle (SDLC) in standard data center and cloud computing environments Describe how federated identity and access management solutions mitigate risks in cloud computing systems Conduct gap analysis between baseline and industry-standard best practices Develop Service Level Agreements (SLAs) for cloud computing environments Conduct risk assessments of existing and proposed cloud-based environments State the professional and ethical standards of (ISC)² and the Certified Cloud Security Professional COURSE CONTENT   Domain 1. Cloud Concepts, Architecture and Design Domain 2. Cloud Data Security Domain 3. Cloud Platform & Infrastructure Security Domain 4. Cloud Application Security Domain 5. Cloud Security Operations Domain 6. Legal, Risk and Compliance TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)² - Certified Cloud Security Professional  Gaining this accreditation is not just about passing the exam, there are a number of other criterias that need to be met including 5  years of cumulative, paid work experience in  information technology, of which 3 years must be in information security and 1 year in 1 or more of the 6 domains of the CCSP CBK. Earning CSA’s CCSK certificate can be substituted for 1 year of experience in 1 or more of the 6 domains of the CCSP CBK. Earning (ISC)²’s CISSP credential can be substituted for the entire CCSP experience requirement. Full details can be found at https://www.isc2.org/Certifications/CCSP Those without the required experience can take the exam to become an Associate of (ISC)²  . The Associate of (ISC)² will then have 6 years to earn the 5 years required experience.   [-]
Les mer
Oslo 1 dag 9 500 kr
20 Aug
20 Aug
26 Sep
AI-900: Microsoft Azure AI Fundamentals [+]
AI-900: Microsoft Azure AI Fundamentals [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Adm... [+]
COURSE OVERVIEW . This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.  Product Alignment: VMware Horizon 8 V2006 TARGET AUDIENCE Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. COURSE OBJECTIVES By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere® to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon® Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a Horizon environment Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment COURSE CONTENT 1  Course Introduction Introductions and course logistics Course objectives 2  Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon 3  Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes 4  vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere® Client™ to access your vCenter Server system and VMware ESXi™ hosts Create, provision, and remove a virtual machine 5  VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs 6  VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops 7  VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon® Connection Server™ inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies 8  VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams 9  Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools 10  Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm 11  Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool 12  Course Introduction Introductions and course logistics Course objectives 13  Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of Horizon Connection Server installation 14  VMware Horizon Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a Horizon administrator and custom roles Describe the roles available in a Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a Horizon environment 15  Workspace ONE Access & Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services 16  VMware Horizon Performance and Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Describe the 3D rendering options available in Horizon 8 List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options 17  Managing VMware Horizon Security Explain concepts relevant to secure Horizon connections Describe how to restrict Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces TEST CERTIFICATION VMware Certified Professional – Desktop and Mobility 2020 (VCP-DTM 2020) [-]
Les mer
Virtuelt klasserom 3 dager 20 000 kr
This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. [+]
COURSE OVERVIEW  This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure. TARGET AUDIENCE This course is aimed at Network Engineers looking to specialize in Azure networking solutions. An Azure Network engineer designs and implements core Azure networking infrastructure, hybrid networking connections, load balance traffic, network routing, private access to Azure services, network security and monitoring. The azure network engineer will manage networking solutions for optimal performance, resiliency, scale, and security. COURSE CONTENT Module 1: Azure Virtual Networks In this module you will learn how to design and implement fundamental Azure Networking resources such as virtual networks, public and private IPs, DNS, virtual network peering, routing, and Azure Virtual NAT. Azure Virtual Networks Public IP Services Public and Private DNS Cross-VNet connectivity Virtual Network Routing Azure virtual Network NAT Lab 1: Design and implement a Virtual Network in Azure Lab 2: Configure DNS settings in Azure Lab 3: Connect Virtual Networks with Peering After completing module 1, students will be able to: Implement virtual networks Configure public IP services Configure private and public DNS zones Design and implement cross-VNET connectivity Implement virtual network routing Design and implement an Azure Virtual Network NAT   Module 2: Design and Implement Hybrid Networking In this module you will learn how to design and implement hybrid networking solutions such as Site-to-Site VPN connections, Point-to-Site VPN connections, Azure Virtual WAN and Virtual WAN hubs. Site-to-site VPN connection Point-to-Site VP connections Azure Virtual WAN Lab 4: Create and configure a local gateway Create and configure a virtual network gateway Create a Virtual WAN by using Azure Portal Design and implement a site-to-site VPN connection Design and implement a point-to-site VPN connection Design and implement authentication Design and implement Azure Virtual WAN Resources   Module 3: Design and implement Azure ExpressRoute In this module you will learn how to design and implement Azure ExpressRoute, ExpressRoute Global Reach, ExpressRoute FastPath and ExpressRoute Peering options. ExpressRoute ExpressRoute Direct ExpressRoute FastPath ExpressRoute Peering Lab 5: Create and configure ExpressRoute Design and implement Expressroute Design and implement Expressroute Direct Design and implement Expressroute FastPath   Module 4: load balancing non-HTTP(S) traffic in Azure In this module you will learn how to design and implement load balancing solutions for non-HTTP(S) traffic in Azure with Azure Load balancer and Traffic Manager. Content Delivery and Load Blancing Azure Load balancer Azure Traffic Manager Azure Monitor Network Watcher Lab 6: Create and configure a public load balancer to load balance VMs using the Azure portal Lab:7 Create a Traffic Manager Profile using the Azure portal Lab 8: Create, view, and manage metric alerts in Azure Monitor Design and implement Azure Laod Balancers Design and implement Azure Traffic Manager Monitor Networks with Azure Monitor Use Network Watcher   Module 5: Load balancing HTTP(S) traffic in Azure In this module you will learn how to design and implement load balancing solutions for HTTP(S) traffic in Azure with Azure Application gateway and Azure Front Door. Azure Application Gateway Azure Front Door Lab 9: Create a Front Door for a highly available web application using the Azure portal Lab 10: Create and Configure an Application Gateway Design and implement Azure Application Gateway Implement Azure Front Door   Module 6: Design and implement network security In this module you will learn to design and imponent network security solutions such as Azure DDoS, Azure Firewalls, Network Security Groups, and Web Application Firewall. Azure DDoS Protection Azure Firewall Network Security Groups Web Application Firewall on Azure Front Door Lab 11: Create a Virtual Network with DDoS protection plan Lab 12: Deploy and Configure Azure Firewall Lab 13: Create a Web Application Firewall policy on Azure Front Door Configure and monitor an Azure DDoS protection plan implement and manage Azure Firewall Implement network security groups Implement a web application firewall (WAF) on Azure Front Door   Module 7: Design and implement private access to Azure Services In this module you will learn to design and implement private access to Azure Services with Azure Private Link, and virtual network service endpoints. Define Azure Private Link and private endpoints Design and Configure Private Endpoints Integrate a Private Link with DNS and on-premises clients Create, configure, and provide access to Service Endpoints Configure VNET integration for App Service Lab 14: restrict network access to PaaS resources with virtual network service endpoints Lab 15: create an Azure private endpoint Define the difference between Private Link Service and private endpoints Design and configure private endpoints Explain virtual network service endpoints Design and configure access to service endpoints Integrate Private Link with DNS Integrate your App Service with Azure virtual networks   TEST CERTIFICATION This course helps to prepare for exam AZ-700 [-]
Les mer
Oslo 1 dag 7 900 kr
14 Aug
14 Aug
PowerPoint med Presentasjonsteknikk [+]
PowerPoint med Presentasjonsteknikk [-]
Les mer
Virtuelt klasserom 3 dager 24 000 kr
The Developing on Amazon Web Services AWS course is designed to help individuals design and build secure, reliable and scalable AWS-based applications. [+]
COURSE OVERVIEW The Developing on Amazon Web Services AWS course is designed to help individuals design and build secure, reliable and scalable AWS-based applications. In this course, we cover fundamental concepts and baseline programming for developing applications on AWS. We also show you how to work with AWS code libraries, SDKs, and IDE toolkits so that you can effectively develop and deploy code on the AWS platform.   TARGET AUDIENCE This course is intended for Developers COURSE CONTENT Note: course outline may vary slightly based on the regional location and/or language in which the class is delivered. Day 1: Getting Started Working with the AWS code library, SDKs, and IDE toolkits Introduction to AWS security features Service object models and baseline concepts for working with Amazon Simple Storage Service (S3) and Amazon DynamoDB Day 2: Working with AWS Services Service object models and baseline concepts for working with the Amazon Simple Queue Service (SQS) and the Amazon Simple Notification Service (SNS) Applying AWS security features Day 3: Application Development and Deployment Best Practices Application deployment using AWS Elastic Beanstalk Best practices for working with AWS services   [-]
Les mer
3 dager 4 515 kr
På forespørsel
Kandidaten skal bl.a. kunne begrunne IT-investeringer og få kjennskap til noen av de juridiske og etiske aspekter ved bruken av IT [+]
Kursinnhold• Organisasjoner og bruk av IT• IT- ledelse  • Verdsettelse av IT• Den globale nettverksøkonomien• Prosjektledelse• Samarbeid og kommunikasjon• Juridiske og etiske problemstillinger   UndervisningsformKlasseromsundervisning med prosjektor hvor deltakerne får tildelt PC med nødvendig programvare installert. Praktisk trening med øvingsoppgaver for å aktivisere kunnskapen.   InstruktørerVi har erfarne instruktørene med høy kompetanse, lang erfaring og dyktige pedagogiske evner.   MålsetningModul Plan, ser på organisasjoner og deres bruk av IT, både som en tilrettelegger for effektive informasjonsystemer, og som en plattform for innovasjon. Modulen krever at kandidaten skal ha en grundig forståelse av organisasjoner, deres strategier og forretningsprosesser, samt de globale trender og muligheter som er involvert. Kandidaten skal kjenne igjen de viktigste problemstillinger knyttet til styringen av IT, som for eksempel å velge riktig teknologi, eller å velge mellom utvikling av interne systemer eller outsourcing. Kandidaten skal også kunne begrunne IT-investeringer og få kjennskap til noen av de juridiske og etiske aspekter ved bruken av IT. Kandidaten skal bli oppmerksomm på kravet om en profesjonell tilnærming til prosjektledelse og kvalitetsikring. Kandidaten skal også forstå betydningen av teambygging og effektivt kommunikasjon når man presenterer sin analyse eller beslutning for organisasjonen. [-]
Les mer
1 dag 3 700 kr
Kurset i Google Analytics er for deg som ønsker å øke den relevante trafikken til dine nettsteder. Det holder ikke med å øke trafikken til nettsidene, om brukerne ik... [+]
Kursinnhold: De ulike begrepene som blir brukt i Google Analytics Segmentering av brukere i statistikken Hvordan lese relevant statistikk Hva du kan bruke tallene til videre i din markedsføring Hvordan nettsidene dine fungerer og hvor konverteringene kommer fra [-]
Les mer