IT-kurs
Du har valgt: Telemark
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Telemark ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Learn best practices for making new and changed services available for use, in line with your organisation's policies and any agreements between the organisation and its ... [+]
Understand the purpose and key concepts of Release Management, elucidating its significance in planning, scheduling, and controlling the build, test, and deployment of releases to ensure they deliver the expected outcomes. The eLearning course: Interactive Self-paced Device-friendly 2-3 hour content Mobile-optimised Practical exercises   Exam:   20 questions Multiple choise Closed book 30 minutes Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Receive practical guidance on the processes and activities of Problem Management, including their roles in the service value chain. [+]
Understand the purpose and key concepts of Problem Management, including its role in identifying and managing the root causes of incidents to prevent recurrence.   This eLearning is: Interactive   Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettkurs 2 timer 3 120 kr
Bluebeam Revu er en komplett PDF-løsning, som lar deg opprette og redigere PDF-dokumenter og tegninger. Videre kan du markere opp og gjøre mengdeuttak fra tegningene, sam... [+]
På dette online-kurset vil du lære: Publisering, redigering, kommentering og markering Sikkerhet, digitale stempler og digital signatur Opprette og lagre symboler og tilpassede markeringsverktøy i Tool Chest Skybasert samarbeid og deling av dokumenter i Bluebeam Studio eXtreme-funksjoner (OCR – Tekstfjerning - Skjema-opprettelse - Batch Link) Noen eXtreme-funksjoner blir vist/nevnt i kurset [-]
Les mer
Virtuelt klasserom 3 dager 20 000 kr
Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. [+]
 This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure. TARGET AUDIENCE This course is designed for data scientists with existing knowledge of Python and machine learning frameworks like Scikit-Learn, PyTorch, and Tensorflow, who want to build and operate machine learning solutions in the cloud. COURSE CONTENT Module 1: Introduction to Azure Machine Learning In this module, you will learn how to provision an Azure Machine Learning workspace and use it to manage machine learning assets such as data, compute, model training code, logged metrics, and trained models. You will learn how to use the web-based Azure Machine Learning studio interface as well as the Azure Machine Learning SDK and developer tools like Visual Studio Code and Jupyter Notebooks to work with the assets in your workspace. Getting Started with Azure Machine Learning Azure Machine Learning Tools Lab : Creating an Azure Machine Learning WorkspaceLab : Working with Azure Machine Learning Tools After completing this module, you will be able to Provision an Azure Machine Learning workspace Use tools and code to work with Azure Machine Learning Module 2: No-Code Machine Learning with Designer This module introduces the Designer tool, a drag and drop interface for creating machine learning models without writing any code. You will learn how to create a training pipeline that encapsulates data preparation and model training, and then convert that training pipeline to an inference pipeline that can be used to predict values from new data, before finally deploying the inference pipeline as a service for client applications to consume. Training Models with Designer Publishing Models with Designer Lab : Creating a Training Pipeline with the Azure ML DesignerLab : Deploying a Service with the Azure ML Designer After completing this module, you will be able to Use designer to train a machine learning model Deploy a Designer pipeline as a service Module 3: Running Experiments and Training Models In this module, you will get started with experiments that encapsulate data processing and model training code, and use them to train machine learning models. Introduction to Experiments Training and Registering Models Lab : Running ExperimentsLab : Training and Registering Models After completing this module, you will be able to Run code-based experiments in an Azure Machine Learning workspace Train and register machine learning models Module 4: Working with Data Data is a fundamental element in any machine learning workload, so in this module, you will learn how to create and manage datastores and datasets in an Azure Machine Learning workspace, and how to use them in model training experiments. Working with Datastores Working with Datasets Lab : Working with DatastoresLab : Working with Datasets After completing this module, you will be able to Create and consume datastores Create and consume datasets Module 5: Compute Contexts One of the key benefits of the cloud is the ability to leverage compute resources on demand, and use them to scale machine learning processes to an extent that would be infeasible on your own hardware. In this module, you'll learn how to manage experiment environments that ensure consistent runtime consistency for experiments, and how to create and use compute targets for experiment runs. Working with Environments Working with Compute Targets Lab : Working with EnvironmentsLab : Working with Compute Targets After completing this module, you will be able to Create and use environments Create and use compute targets Module 6: Orchestrating Operations with Pipelines Now that you understand the basics of running workloads as experiments that leverage data assets and compute resources, it's time to learn how to orchestrate these workloads as pipelines of connected steps. Pipelines are key to implementing an effective Machine Learning Operationalization (ML Ops) solution in Azure, so you'll explore how to define and run them in this module. Introduction to Pipelines Publishing and Running Pipelines Lab : Creating a PipelineLab : Publishing a Pipeline After completing this module, you will be able to Create pipelines to automate machine learning workflows Publish and run pipeline services Module 7: Deploying and Consuming Models Models are designed to help decision making through predictions, so they're only useful when deployed and available for an application to consume. In this module learn how to deploy models for real-time inferencing, and for batch inferencing. Real-time Inferencing Batch Inferencing Lab : Creating a Real-time Inferencing ServiceLab : Creating a Batch Inferencing Service After completing this module, you will be able to Publish a model as a real-time inference service Publish a model as a batch inference service Module 8: Training Optimal Models By this stage of the course, you've learned the end-to-end process for training, deploying, and consuming machine learning models; but how do you ensure your model produces the best predictive outputs for your data? In this module, you'll explore how you can use hyperparameter tuning and automated machine learning to take advantage of cloud-scale compute and find the best model for your data. Hyperparameter Tuning Automated Machine Learning Lab : Tuning HyperparametersLab : Using Automated Machine Learning After completing this module, you will be able to Optimize hyperparameters for model training Use automated machine learning to find the optimal model for your data Module 9: Interpreting Models Many of the decisions made by organizations and automated systems today are based on predictions made by machine learning models. It's increasingly important to be able to understand the factors that influence the predictions made by a model, and to be able to determine any unintended biases in the model's behavior. This module describes how you can interpret models to explain how feature importance determines their predictions. Introduction to Model Interpretation using Model Explainers Lab : Reviewing Automated Machine Learning ExplanationsLab : Interpreting Models After completing this module, you will be able to Generate model explanations with automated machine learning Use explainers to interpret machine learning models Module 10: Monitoring Models After a model has been deployed, it's important to understand how the model is being used in production, and to detect any degradation in its effectiveness due to data drift. This module describes techniques for monitoring models and their data. Monitoring Models with Application Insights Monitoring Data Drift Lab : Monitoring a Model with Application InsightsLab : Monitoring Data Drift After completing this module, you will be able to Use Application Insights to monitor a published model Monitor data drift   [-]
Les mer
5 dager 25 500 kr
MS-500: Microsoft 365 Security Administrator [+]
MS-500: Microsoft 365 Security Administrator [-]
Les mer
Oslo 5 dager 46 000 kr
21 Jul
08 Sep
10 Nov
https://www.glasspaper.no/kurs/sise-implementing-and-configuring-cisco-identity-services-engine/ [+]
SISE: Implementing and Configuring Cisco Identity Services Engine [-]
Les mer
Oslo 2 dager 16 900 kr
04 Sep
04 Sep
20 Nov
SAFe® 6.0 DevOps [+]
SAFe® DevOps Certification [-]
Les mer
3 dager 7 900 kr
Etter fullført kurs skal du kunne frilegge, retusjere og sammenkopiere bilder. [+]
Vil du komme igang med Photoshop? På dette kurset lærer du å korrigere farger og kontraster i bilder for å oppnå en bedre kvalitet. Du lærer å retusjere bort uønskede elementer og fjerne rynker. Du lærer å sammenkopiere flere elementer ved hjelp av lag og masker og lagre bilder til ulike medier, med ulik oppløsning og ulike filformater. Når du har vært gjennom dette Photoshop-kurset kan du bearbeide din egen eller andres ide fra skisse til et ferdig bilde. Du kan lagre bildet til det mediet det skal brukes i med høy kvalitet. Dette lærer du: Fjerne bakgrunnen i bildene Fargekorrigering slik at du får spennende og fine bilder Retusjering Sette sammen flere bilder Bruk av masker Jobbe med tekst og form Lagre bilder til ulike medier, med ulik oppløsning og ulike filformater Optimalisering av bilder til web https://igm.no/photoshop-kurs/ [-]
Les mer
2 dager 6 500 kr
Vil du jobbe enklere og mer effektivt i InDesign? På dette kurset vil du lære å lage gode, avanserte og tidsbesparende maler for sider, tekst og objekter, samt gjenbru... [+]
Vil du jobbe enklere og mer effektivt i InDesign? På dette kurset vil du lære å lage gode, avanserte og tidsbesparende maler for sider, tekst og objekter, samt gjenbruk via biblioteker. Etter kurset kan du lage egne maler som automatiserer mange arbeidsprosesser og sparer deg for mye tid og arbeid. Gode maler kvalitetsikrer produktetene dine og gir deg mere tid til å være kreativ. Hvem passer kurset for? Kurset passer for deg som jobber i Adobe InDesign og ønsker å utnytte programmets potensiale. Forhåndskunnskap i InDesign: «InDesign grunnkurs» eller tilsvarende kunnskap. Dette lærer du: God, effektiv og avansert bruk av maler for sider, tekst og objekter i Adobe InDesign Spar på elementer du lager med CC Libraries Lage automatisk innholdsfortegnelse Bruk av tabell Tekstlenker og registerlinjer Hvordan tilpasse en layout til ulike størrelser i samme dokument Lage egne tastatursnarveier https://igm.no/indesign-kurs-videregaende/ [-]
Les mer
Oslo 2 dager 16 900 kr
25 Sep
25 Sep
18 Dec
htWeb Security for Developers [+]
httpWeb Security for Developers [-]
Les mer
Oslo 2 dager 16 900 kr
18 Sep
18 Sep
04 Dec
SAFe® 6.0 Scrum Master [+]
SAFe® Scrum Master Certification [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Fi... [+]
COURSE OVERVIEW The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment TARGET AUDIENCE This course is aimed at Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff. COURSE OBJECTIVES After you complete this course, you will be able to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports COURSE CONTENT 1 - Palo Alto Networks Portfolio and Architecture 2 - Configuring Initial Firewall Settings 3 - Managing Firewall Configurations 4 - Managing Firewall Administrator Accounts 5 - Connecting the Firewall to Production Networks with Security Zones 6 - Creating and Managing Security Policy Rules 7 - Creating and Managing NAT Policy Rules 8 - Controlling Application Usage with App-ID 9 - Blocking Known Threats Using Security Profiles 10 - Blocking Inappropriate Web Traffic with URL Filtering 11 - Blocking Unknown Threats with Wildfire 12 - Controlling Access to Network Resources with User-ID 13 - Using Decryption to Block Threats in Encrypted Traffic 14 - Locating Valuable Information Using Logs and Reports 15 - What's Next in Your Training and Certification Journey Supplemental Materials Securing Endpoints with GlobalProtect Providing Firewall Redundancy with High Availability Connecting Remotes Sites using VPNs Blocking Common Attacks Using Zone Protection   FURTHER INFORMATION Level: Introductory Duration: 5 days Format: Lecture and hands-on labs Platform support: Palo Alto Networks next-generation firewalls running PAN-OS® operating system version 11.0     [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
OFFICIAL (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL TRAINING - INCLUDING EXAM [+]
COURSE OVERVIEW The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the cybersecurity market. CISSP validates a cybersecurity professional’s deep technical and managerial knowledge and experience to effectively design, engineer and manage an organization’s overall security posture. Please note an exam voucher is included as part of this course TARGET AUDIENCE Cybersecurity professionals with at least 5 years in the information security field. Member data has shown that amajority of CISSP holders are in middle management and a much smaller proportion are in senior or junior/entry-level positions. Roles include:• Chief Information Officer• Chief Information Security Officer• Chief Technology Officer• Compliance Manager / Officer• Director of Security• Information Architect• Information Manager / Information RiskManager or Consultant• IT Specialist / Director / Manager• Network / System Administrator• Security Administrator• Security Architect / Security Analyst• Security Consultant• Security Manager• Security Systems Engineer / Security EngineerSectorsCISSP is relevant across all sectors and industries, including:• Aerospace• Automotive• Banking, financial services, insurance (BFSI)• Construction• Cybersecurity• Energy• Engineering• Government• Healthcare, IT products, services, consulting• Manufacturing• Pharma• Retail• Telecom COURSE OBJECTIVESAfter completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age. Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections. Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function. List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7. Identify standard terms for applying physical and logical access controls to environments related to their security practice. Appraise various access control models to meet business security requirements. Name primary methods for designing and validating test and audit strategies that support business requirements. Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures. Recognize risks to an organization’s operational endeavours and assess specific threats, vulnerabilities and controls. Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security. COURSE CONTENT Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security Architecture and Engineering Domain 4: Communication and Network Security Domain 5: Identity and Access Management (IAM) Domain 6: Security Assessment and Testing Domain 7: Security Operations Domain 8: Software Development Security TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)2 Certified Information Systems Security Professional Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification Please note an exam voucher is included as part of this course   [-]
Les mer
Oslo 5 dager 39 500 kr
22 Sep
22 Sep
17 Nov
CCSP: Certified Cloud Security Professional [+]
CCSP: Certified Cloud Security Professional [-]
Les mer