IT-kurs
Du har valgt: Uppsala County
Nullstill
Filter
Ferdig

-

2 dager 12 500 kr
01 Mar
Obtain all the competences and knowledge necessary to lead all the processes for implementing and complying with the requirements of the General Data Protection Regulatio... [+]
Course description GDPR Foundation training enables you to learn the basic elements to implement, manage and align a privacy framework with and based on the General Data Protection Regulation. During this training course, you will be able to understand the fundamental privacy principles and become familiar with the role of the Data Protection Officer. After completing this course, you can sit for the exam and apply for a “PECB GDPR Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.  Course Objectives Understand the General Data Protection Regulation requirements and the fundamental principles of privacy. Understand the obligations, roles and responsibilities of the Data Protection Officer Understand the concepts, approaches, methods and techniques to effectively align a privacy framework with the General Data Protection Regulation   Course Content Day 1: Introduction to the General Data Protection Regulation Course objectives and structure General data protection regulation Data protection principles, challenges and issues Rights of the data subject Data controllers, processors and the data protection officer Data protection authorities Day 2: Preparing for GDPR and Certification Exam Data mapping plan Risk assessment under GDPR Data protection impact assessment Privacy impact assessment (PIA) Personal data transfers to third parties Remedies, liabilities and penalties Certification process and closing the training [-]
Les mer
Oslo 2 dager 14 900 kr
03 Feb
10 Mar
10 Mar
Management of Portfolios (MoP®) approaches change projects and programmes from a strategic viewpoint. [+]
Portfolio management is a coordinated collection of strategic processes and decisions that enable an effective balance of organizational change and business as usual. Management of Portfolios (MoP®) approaches change projects and programmes from a strategic viewpoint. It provides an overview of all change activities including what is in the portfolio, what it is costing, what risks are faced, what progress is being made, and what the impact is on business as usual and the organization’s strategic objectives. Course description: The purpose of the Practitioner qualification is to confirm whether the candidate has achieved sufficient understanding of how to apply and tailor the MoP guidance and to analyze portfolio data, documentation and roles in relation to a scenario situation.A successful Practitioner candidate should, with suitable support, be able to advise on the implementation of appropriate practices and techniques, and apply the method to a live portfolio, but may not be sufficiently skilled to do this appropriately for all situations. Their individual expertise, the complexity of the portfolio, and the support provided will also influence the impact the Practitioner can achieve. Course objectives: Candidates should be able to apply and understand how to tailor MoP effectively. Specifically candidates should be able to demonstrate their ability to: define the business case to get senior management approval for portfolio management plan the implementation of portfolio management select and adapt MoP principles, practices and techniques to suit different organizationalenvironments evaluate examples of MoP information (including documents and role descriptions) analyse the solutions adopted in relation to a given scenario.   Course content Concepts covered Introduction to Portfolio Management Introduction to Portfolio Management, Course objectives, MOP Qualification, Target Audience, Exam Overview, The Practitioner exam, The MOP Syllabus Practical ExercisesSources of organizational Energy, Organizational energy states, Activity sequencing, Categorization/segmentation, Financial Appraisal, Multi criteria analysis, Portfolio Definition Cycle, Risk Management, MOP roles, MOP documents Group discussionBarriers to implementation, 3 Implementation approaches, Governance and alignment, Portfolio definition, Portfolio delivery, Implement, sustain and measure Exam preperation [-]
Les mer
Oslo 2 dager 14 900 kr
08 Feb
12 Apr
21 Jun
Kubernetes' architecture brings the first real way of operating docker containers in production. [+]
Kubernetes' architecture brings the first real way of operating docker containers in production. This solution was first developed by Google, and TCP Cloud was the world's first real-world testing enterprise deployment experience. We will introduce you to this platform and also present the test results we talked about at the KubeCon 2016 conference. The training provides a detailed description of each step necessary to operate the Kubernetes environment. The training is aimed at developing skills in container virtualization to a level where the training participant will be able to install, configure, and deploy the docker environment. The training covers the architecture of best practices, workflow creation and component interaction, which is the best preparation for solving real problems encountered by experts in the Kubernetes area. Are you experienced in Kubernetes? Check out our Kubernetes Advanced course.   Course content: Use of Containers How Containers Work - From VM to Container, cgroup, namespaces Working with Containers (Docker, Podman) Start container and troubleshoot Persistent storage in containers Working with containers Best-practice - Container Images Operation image registers Networking in containers New safety risks for containers Docker daemon production setting Using docker-compose for simple orchestration The basics of Kubernetes Introduction to Container Orchestration and Kubernetes Architecture and Concepts of Kubernetes Access and control of the cluster Run the application in the Kubernetes cluster Advanced applications Ingress and LoadBalancer for web applications Use persistent storage Manage configuration and passwords Application tracking and troubleshooting Customize Kubernetes running applications Helm [-]
Les mer
Oslo 3 dager 15 900 kr
15 Mar
15 Mar
19 May
The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of De... [+]
As organizations are facing new entrants in their respective markets, they need to stay competitive and release new and updated products on a regular basis rather than one or two times a year. The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. The course includes the latest thinking, principles and practices from the DevOps community including real-world case studies from high performing organizations including ING Bank, Ticketmaster, Capital One, Alaska Air, Target, Fannie Mae, Societe Generale, and Disney that engage and inspire learners, leveraging multimedia and interactive exercises that bring the learning experience to life, including the Three Ways as highlighted in the Phoenix Project by Gene Kim and the latest from the State of DevOps and DevOps Institute Upskilling  reports. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. The course is designed for a broad audience, enabling those on the business side to obtain an understanding of microservices and containers. Those on the technical side will obtain an understanding as to the business value of DevOps to reduce cost (15-25% overall IT cost reduction) with increased quality (50-70% reduction in change failure rate) and agility (up to 90% reduction in provision and deployment time) to support business objectives in support of digital transformation initiatives. Unique and exciting exercises will be used to apply the concepts covered in the course and sample documents, templates, tools, and techniques will be provided to use after the class. This certification positions learners to successfully complete the DevOps Foundation examination. COURSE OBJECTIVES The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results   Course outline: Exploring DevOps Defining DevOps Why Does DevOps Matter? Core DevOps Principles The Three Ways The First Way The Theory of Constraints The Second Way The Third Way Chaos Engineering Learning Organizations Key DevOps Practices Continuous Delivery Site Reliability & Resilience Engineering DevSecOps ChatOps Kanban Business and Technology Frameworks Agile ITSM Lean Safety Culture Learning Organizations Sociocracy/Holacracy Continuous Funding Culture, Behaviors & Operating Models Defining Culture Behavioral Models Organizational maturity models Target Operating Models Automation & Architecting DevOps Toolchains CI/CD Cloud Microservices/Containers DevOps Toolchain Measurement, Metrics, and Reporting The Importance of Metrics Technical Metrics Business Metrics Measuring & Reporting Metrics Sharing, Shadowing and Evolving Collaborative Platforms Immersive, Experiential Learning DevOps Leadership Evolving Change [-]
Les mer
Oslo 1 dag 8 900 kr
18 Mar
10 Jun
10 Jun
This Atlassian Confluence Essentials Training course explains how WIKI products in general, and Confluence in particular, help organisations to collaborate. [+]
Objectives & Outcomes Users will dive into the system to create content with ease.We’ll look at managing the structure and organisation of spaces with templates and help you to work with attachments and files.Finally, you’ll be able to work together through various collaboration techniques using dynamic and meaningful content macros. Course outline: Optional Module: Introduction to Wikis Module 1: Introduction to Confluence Accessing Confluence Key Concepts Pages Spaces The Dashboard Permissions Menus The Browse menu The People directory The User menu Module 2: Creating Page Content Create pages Edit pages using the Text Editor Collaborative editing Change page layouts Create a Table Attachments Module 3: Collaboration Sharing and Notifications Favorites Comments & inline comments Restrictions Module 4: Dynamic Confluence Content Introduction to Macros Text Formatting Macros HTML Macro Space Macros Module 5: Page Management part 1 Page drafts Copy pages Deleting pages Moving pages Module 6: Page Management part 2 Page history and versioning Page locations & hierarchies Labels Exporting / Importing Pages [-]
Les mer
Oslo 2 dager 14 900 kr
08 Feb
26 Apr
28 Jun
You will learn how to properly "dockerize" applications to make them robust and stable. [+]
The course is designed for anyone who wants to learn how to run the Docker in an extensive application infrastructure, both within your company, and from outside vendors. You will learn how to properly "dockerize" applications to make them robust and stable. Gradually, we go through the whole process from installing the Docker Server, through the creation of a dockerized version of the application, to deployment on the production infrastructure. And all this while adhering to best practices for creating and running such applications. On practical examples, we will try out all of the advanced techniques that Docker and its ecosystem offer. Thanks to the extensive practical experience of the lecturers, we will also focus on the most common problems and mistakes most commonly made by Docker users.   Course goals: Course participants will learn: Create your own Docker Images Advanced techniques of building images (multi-stage, on-build) How to Prepare Docker Image for Production Deployment Understand how the Docker works, including the detection of potential problems Operation of the production docker infrastructure Course content: Advanced operations with Docker Create your own instance using the Docker Machine Writing your own Dockerfile (best practices, multi-stage build) Working with Docker Image Docker Compose Practical practice of the subject matter Docker Images for Production Deployment Images (safety, labeling, dumb-init) Image Registry (hosted, on-premise) Continous Integration, Continuous Delivery Practical practice of the subject matter Docker in production deployment Security practices Volumes / Storages Networking Logging Running, Running and Orchestration of Docker Applications in Production Deployment (Docker Swarm, Kubernetes, Openshift) Application monitoring Operating systems for Docker operation Practical practice of the subject matter [-]
Les mer
Oslo 3 dager 17 900 kr
25 Jan
08 Mar
10 May
The ITIL® 4 Specialist: Create, Deliver and Support module focuses on the integration of different value streams and activities to create, deliver and support IT-enabled ... [+]
The ITIL ® 4 Specialist: Create, Deliver and Support module is part of the Managing Professional stream for ITIL 4 and participants need to pass the related certification exam for working towards the Managing Professional (MP) designation. The ITIL® 4 Specialist: Create, Deliver and Support module focuses on the integration of different value streams and activities to create, deliver and support IT-enabled products and services whilst also covering supporting practices, methods, and tools.   Course Description: The ITIL® 4 Specialist: Create, Deliver and Support course is a 3-days course based on the ITIL® 4 Specialist: Create, Deliver and Support exam specification from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, you will acquire relevant knowledge to pass the ITIL® 4 Specialist: Create, Deliver, and Support certification exam.   Learning Objectives: The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Create, Deliver and Support exam specification: Understand how to plan and build a service value stream to create, deliver, and support services Know how relevant ITIL practices contribute to the creation, delivery and support across the SVS and value streamsKnow how to create, deliver and support services   Agenda Day 1: Module 1: Organization and Culture Organizational Structures  Team Culture  Continuous Improvement Culture  Collaborative Culture  Customer-Oriented Mindset  Positive Communication Module 2: Effective Teams Capabilities, Roles and Competencies  Workforce Planning  Employee Satisfaction Management  Results Based Measuring and Reporting Module 3: Information Technology to Create, Deliver and Support Service  Integration and Data Sharing  Reporting and Advanced Analytics  Collaboration and Workflow  Robotic Process Automation  Artificial Intelligence and Machine Learning  CI/CD  Information Model Day 2:  Module 3: Information Technology to Create, Deliver and Support Service  Integration and Data Sharing  Reporting and Advanced Analytics  Collaboration and Workflow  Robotic Process Automation  Artificial Intelligence and Machine Learning  CI/CD  Information Model Module 4: Value Stream Anatomy of a Value Stream  Designing a Value Stream Value Stream Mapping Module 5: Value Stream to Create, Deliver and Support Services Value Stream for Creation of a New Service  Module 6: Value Stream for User Support Value Stream Model for Restoration of a Live Service  Day 3:  Module 6: Value Stream for User Support Value Stream Model for Restoration of a Live Service  Module 7: Prioritize and Manage Work Managing Queues and Backlogs  Prioritizing Work  Shift-Left Approach Module 8: Commercial and Sourcing Considerations Build or Buy  Sourcing Models  Service Integration and Management Exam Preparation Exam   [-]
Les mer
Oslo 1 dag 8 900 kr
08 Mar
31 May
31 May
Clearvision's Atlassian Jira Core Essentials training course provides an understanding of using Jira concepts, issues and tracking. [+]
Objectives & Outcomes At the end of the Clearvision Jira Core Essentials training course students will understand basic Atlassian Jira concepts and will be able to use Jira to work with issues and provide change tracking and control for business projects.   Course outline: Module 1: JIRA Key Concepts Change & Defect Tracking. Introduction to JIRA What is an Issue? What is a Project? What is a Workflow? Module 2: Getting Started with JIRA Exploring the JIRA workspace Managing your user profile Module 3: Introduction to Issues Issues Types Fields Creating an Issue Viewing Issues Editing Issues Attachments Module 4: Introduction to Workflows Steps Transitions and Screens Moving through workflows The Workflow Viewer Module 5: Collaboration Collaboration Commenting on Issues Sharing Issues Mentions Voting Watching Module 6: Searching and Filters Quick Search Basic Search Advanced Search (JQL) Issue Navigator Detail View Configuring Filters Shared Filters Email Filter Results Advanced Searches Module 7: Reporting Standard Reports Custom Reports Utilizing Reports [-]
Les mer
Oslo 3 dager 19 900 kr
07 Apr
30 Jun
30 Jun
This course will change the way you look at your C/C++ code. [+]
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed? This course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun. Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.   Participants attending this course will: Understand basic concepts of security, IT security and secure coding Realize the severe consequences of unsecure buffer handling Understand the architectural protection techniques and their weaknesses Have a practical understanding of cryptography Learn about XML security Learn about typical coding mistakes and how to avoid them Be informed about recent vulnerabilities in various platforms, frameworks and libraries Get sources and further readings on secure coding practices   Course Outline Day 1 IT security and secure coding x86 machine code, memory layout and stack operations Buffer overflow Day 2 Buffer overflow Practical cryptography XML security Common coding errors and vulnerabilities Day 3 Common coding errors and vulnerabilities Principles of security and secure coding Knowledge sources       [-]
Les mer
Nettundervisning Sentrum 4 dager 24 900 kr
26 Jan
PowerCenter Level 2 Developer [+]
  This Informatica Powercenter developer Level 2 course extends the skills and knowledge of experienced Powercenter developers. Reviewing advanced topics with extended labs covering PowerCenter connection architecture, high availability, and session and workflow recovery. Objectives After successfully completing this course, students should be able to: Understand the Informatica PowerCenter architecture Determine the structure and use of PowerCenter Parameter Files Implement user-defined and advanced functions Normalize and Denormalize data using PowerCenter Use the Lookup transformation in Dynamic mode Call a SQL stored procedure from a PowerCenter mapping Create and configure a SQL transformation and its two modes of use Design error handling strategies appropriate for the intended purpose of a workflow Make use of the PowerCenter source-based, target-based, and user-based transaction control Utilize constraint-based loading in databases with referential integrity constraints Use the Transaction Control transformation for data-driven RDBMS transaction control Determine the proper use of built-in and optional, mapping-design recovery capabilities Build batch files that use PMCMD and PMREP command line programs Apply PowerCenter Performance Tuning Methodology Describe the effect of mapping design on performance and apply these design principles to a mapping Calculate how much memory a session uses and tune session-level memory. Apply partitions, distribute the data and optimize the CPU memory usage Delivery method This is a public classroom instructor-led training with around 60% lecture and 40% hands on lab. Target Audience Data Integration developers who have taken the PowerCenter 10 Developer, Level 1 Prerequisites Understanding of RDBMS concepts Knowledge of SQL Informatica PowerCenter v10 Developer, Level 1 It is highly recomended that you have worked with Powercenter at least 3-6 months before taking this class. General Information   The course is taught in in English with an Norwegian Instructor, the course material is written in English. The course price includes course material and catering (coffees, lunch) daily. CGI reserves the right to make changes to courses and schedules. CGI may cancel a course if there are less than six (6) participants. Affecto is not responsible for any expenses related to course cancellation. This course can also be arranged onsite at customer location.   OM CGI CGI Group Inc. ble grunnlagt i 1976 og er verdens femte største uavhengige leverandør av tjenester innen IT- og forretningsprosesser. Med 74 000 medarbeidere over hele verden, leverer CGI en portefølje av ende-til-ende løsninger innen avanserte IT- og forretningskonsulenttjenester, systemintegrasjon og utsetting av IT- og forretningsprosesser. CGIs modell med kundenærhet, et globalt leveransenettverk og egne løsninger bidrar til at kundene hurtigere oppnår resultater og bidrar til deres digitale transformasjon. CGI har en samlet årlig omsetning på over 60 milliarder NOK. CGI-aksjene er notert på TSX (GIB.A) og NYSE (GIB). Hjemmeside: www.cgi.com [-]
Les mer
Nettstudier 2 semester 4 980 kr
På forespørsel
Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstilta... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: IFUD1012 Internett og sikkerhet Innleveringer: Øvinger: 3 av 5 må være godkjent. Vurderingsform: Skriftlig eksamen, 3 timer (60 %). Det gjennomføres 3 obligatoriske større øvingsarbeider gruppevis underveis i kurset. Disse får en midlertidig vurdering/tilbakemelding og kan deretter leveres på nytt til en samlet sluttvurdering som teller 40 % på karakteren. Ansvarlig: Ole Christian Eidheim Eksamensdato: 12.12.13 / 26.05.14         Læremål: Etter å ha gjennomført emnet Informasjonssikkerhetsstyring skal studenten ha følgende samlede læringsutbytter: KUNNSKAPER:Kandidaten:- kan gjøre rede for hva informasjonssikkerhet betyr for en bedrifts økonomi og omdømme- kan gjøre rede for hva standardene ISO 27001 og ISO 27002 inneholder og hvordan de benyttes i sikkerhetsarbeidet- kjenner til prinsippene i Demmings sirkel og kunne redegjøre for betydningen av disse for det kontinuerlige sikkerhetsarbeidet- kjenner til en trinnvis plan for innføring av et styringssystem for informasjonssikkerhet (ISMS) og kunne redegjøre for de kritiske suksessfaktorene i hver av fasene- kan redegjøre for forutsetninger og tiltak for å skape en sikkerhetskultur i en bedrift- kan redegjøre for den trinnvise prosessen frem mot sertifisering av et ISMS eller produkt- kan redegjøre for rollen til målinger og evalueringer i sikkerhetsarbeidet FERDIGHETER:Kandidaten kan:- kartlegge trusselbildet for en konkret bedrift- gjennomføre en risikoanalyse for en bedrift på en strukturert og systematisk måte- innføre tiltak for å redusere risikoverdien for kartlagte trusler som har for høy risikoverdi- velge og utarbeide relevante sikkerhetspolicyer for en konkret bedrift- utarbeide forslag til en organisasjonsstruktur for sikkerhetsarbeidet i en konkret bedrift- analysere behovet for sertifisering av ISMS for en konkret bedrift og gi anbefalinger om veien dit GENERELL KOMPETANSE:Kandidaten kan:- kommunisere med og forstå brukernes behov- involvere de ansatte i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med- involvere eksterne konsulenter i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med Innhold:Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstiltak, sikkerhetskultur, sikkerhet i informasjonssystemer, veien til sertifisering, måling og evaluering, kontinuerlig forbedringLes mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Informasjonssikkerhetsstyring 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
3 dager 20 000 kr
22 Feb
29 Mar
26 Apr
Gain the necessary knowledge about how to use Azure services to develop, train and deploy machine learning solutions. [+]
Gain the necessary knowledge about how to use Azure services to develop, train and deploy machine learning solutions. The course starts with an overview of Azure services that support data science. From there, it focuses on using Azure's premier data science service, Azure Machine Learning service, to automate the data science pipeline.   IMPORTANT NOTICE! This course is focused on Azure and does not teach the student how to do data science. It is assumed students already know that.   Course content Module 1: Doing Data Science on Azure Introduce the Data Science ProcessOverview of Azure Data Science OptionsIntroduce Azure Notebooks Module 2: Doing Data Science with Azure Machine Learning service Introduce Azure Machine Learning (AML) serviceRegister and deploy ML models with AML service Module 3: Automate Machine Learning with Azure Machine Learning service Automate Machine Learning Model SelectionAutomate Hyperparameter Tuning with HyperDrive Module 4: Manage and Monitor Machine Learning Models with the Azure Machine Learning service Manage and Monitor Machine Learning Models [-]
Les mer
Nettkurs 6 timer 299 kr
Lær Google Analytics på 1-2-3 med nettkurs fra Utdannet.no. [+]
Google Analytics er et gratis analyseverktøy fra Google som sporer trafikken fra nettstedet ditt. Google Analytics kan måle salg og konverteringer, gi detaljert innsikt i hvordan besøkende bruker nettstedet ditt, hvordan de ankom nettstedet, hvilke sider de besøkte og når de forlot nettstedet ditt. Google Analytics er en effektiv og brukervennlig rapporteringsplattform. Ved hjelp av noen få klikk kan du enkelt velge hvilke data du vil se og analysere. Du kan enkelt forstå hvilke deler av nettstedet ditt som gir gode resultater, hvilke sider som er mest populære, slik at du kan skape den beste brukeropplevelsen. I dette kurset vil kursinstruktør Espen Faugstad lære deg alt du trenger for å kunne bruke Google Analytics på en effektiv måte. Du kommer til å lære hvordan man installerer Google Analytics, samt hvordan man bruker Sanntid, Målgruppe, Trafikk, Adferd og Konverteringer. Med denne kunnskapen vil du få full oversikt over styrkene og svakhetene til nettstedet ditt.  Innhold Du lærer å koble Google Analytics til et nettsted Du lærer å konfigurere Google Analytics Du lærer å navigere rundt i Google Analytics Du lærer å finne statistikker i sanntid Du lærer å finne ut hvem som besøker et nettsted Du lærer å finne ut hvor de besøkende kommer fra Du lærer å finne ut hva de besøkende gjør Du lærer å måle konverteringer Du lærer å spore hendelser Du lærer å lage segmenter Du lærer å lage egendefinerte rapporter Du lærer å dele rapporter med andre [-]
Les mer
Oslo 5 dager 25 000 kr
15 Feb
15 Feb
12 Apr
This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation,... [+]
This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure. This course outlines how decisions in each theses area affects an overall solution. This course (together with AZ-304) will help you prepare for the new certification: Azure Solutions Architect Expert.   Skills gained Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes.   Course content Module 1: Implement VMs for Windows and Linux In this module, you will learn about Azure virtual machines including planning, creating, availability and extensions. This module includes: Select Virtual Machine Size Configure High Availability Implement Azure Dedicated Hosts Deploy and Configure Scale Sets Configure Azure Disk Encryption Module 2: Automate Deployment and Configuration of Resources In this module, you will learn about the tools an Azure Administrator uses to manage their infrastructure. This includes the Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Templates. This module includes: Azure Resource Manager Templates Save a Template for a VM Evaluate Location of New Resources Configure a Virtual Hard Disk Template Deploy from a Template Create and Execute an Automation Runbook Module 3: Implement Virtual Networking In this module, you will learn about basic virtual networking concepts like virtual networks and subnetting, IP addressing, network security groups, Azure Firewall, and Azure DNS: Virtual Network Peering Implement VNet Peering Module 4: Implement Load Balancing and Network Security In this module, you will learn about network traffic strategies including network routing and service endpoints, Azure Load Balancer, Azure Application Gateway, and Traffic Manager: Implement Azure Load Balancer Implement an Application Gateway Understand Web Application Firewall mplement Azure Firewall Implement Azure Front Door Implementing Azure Traffice Manager Implement Network Security Groups and Application Security Groups Implement Azure Bastion Module 5: Implement Storage Accounts In this module, you will learn about basic storage features including storage accounts, blob storage, Azure files and File Sync, storage security, and storage tools: Storage Accounts Blob Storage Storage Security Managing Storage Accessing Blobs and Queues using AAD Configure Azure Storage Firewalls and Virtual Networks Module 6: Implement Azure Active Directory In this module, you will learn how to secure identities with Azure Active Directory, and implement users and groups: Overview of Azure Active Directory Users and Groups Domains and Custom Domains Azure AD Identity Protection Implement Conditional Access Configure Fraud Alerts for MFA Implement Bypass Options Configure Trusted IPs Configure Guest Users in Azure AD Manage Multiple Directori Module 7: Implement and Manage Azure Governance In this module, you will learn about managing your subscriptions and accounts, implementing Azure policies, and using Role-Based Access Control: Create Management Groups, Subscriptions, and Resource Groups Overview of Role-Based Access Control (RBAC) Role-Based Access Control (RBAC) Roles Azure AD Access Reviews Implement and Configure an Azure Policy Azure Blueprints Module 8: Implement and Manage Hybrid Identities In this module, you will learn how to install and configure Azure AD Connect and implement Azure AD Connect Health: Install and Configure Azure AD Connect Configure Password Sync and Password Writeback Configure Azure AD Connect Health Module 9: Manage Workloads in Azure In this module, you will learn how to migrate workloads using Azure Migrate, perform VMware agent-based and agent-less migrations, and perform Azure Backup and Azure Site Recovery: Migrate Workloads using Azure Migrate VMware - Agentless Migration VMware - Agent-Based Migration Implement Azure Backup Azure to Azure Site Recovery Implement Azure Update Management Module 10: Implement Cloud Infrastructure Monitoring In this module, you will learn about Azure Monitor, Azure Workbooks, Azure Alerts, Network Watcher, Azure Service Health, Azure Application Insights: Azure Infrastructure Security Monitoring Azure Monitor Azure Workbooks Azure Alerts Log Analytics Network Watcher Azure Service Health Monitor Azure Costs Azure Application Insights Unified Monitoring in Azure Module 11: Manage Security for Applications In this module, you will learn about Azure Key Vault and implementing authentication using Azure Managed Identities: Azure Key Vault Azure Managed Identity Module 12: Implement an Application Infrastructure In this module, you will learn how to create an App Service web App for Containers, create and configure an App Service Plan, and create and manage Deployment Slots: Create and Configure Azure App Service Create an App Service Web App for Containers Create and Configure an App Service Plan Configure Networking for an App Service Create and Manage Deployment Slots Implement Logic Apps Implement Azure Functions Module 13: Implement Container-Based Applications In this module, you will learn how to run Azure Container instances and how to deploy Kubernetes with AKS. Azure Container Instances Configure Azure Kubernetes Service Module 14: Implement NoSQL Databases In this module, you will learn about Azure Table Storage and recommend options for CosmsoDB APIs. Configure Storage Account Tables Select Appropriate CosmosDB APIs Module 15: Implement Azure SQL Databases In this module, you will create an Azure SQL Database single database, create an Azure SQL Database Managed Instance, and review high-availability and Azure SQL database. Configure Azure SQL Database Settings Implement Azure SQL Database Managed Instances High-Availability and Azure SQL Database [-]
Les mer
1 dag 8 800 kr
This 1-day workshop is aimed at Test Analysts wanting to improve their skills in test case design techniques. [+]
Most testers are familiar with techniques such as boundary value analysis and equivalence partitioning. However, this workshop focuses on two of the more unusual and more complex techniques: Classification Trees and Pairwise Testing. These techniques are often referred to as ""combinatorial techniques"" and will allow the testers to become more efficient with the use of their time in designing and executing specific tests. Learn how to use dependency rules to create efficient test cases within Classification Trees and how to apply both Orthogonal Arrays and Pairwise Algorithms, assessing which of these methods would be best for you. During the workshop you will learn how to use the Classification Tree Editor (a free test case design tool) and also All-Pairs algorithms to generate your pairwise tests. [-]
Les mer

Lukk Denne siden benytter seg av informasjonskapsler (cookies).
Du kan fortsette å bruke siden som vanlig hvis du godtar dette. Les mer om bruk av informasjonskapsler i vår personvernerklæring.