IT-kurs
Du har valgt: Västra Götalands län
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Västra Götalands län ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn how to move new or changed hardware, software, documentation, processes, or any other component to live environments, and how to deploy components to other environm... [+]
Understand the purpose and key concepts of Deployment Management, highlighting its importance in managing the deployment of new or changed services into the live environment. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours of content   Mobile-optimised   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn how to improve user and customer experience, as well as the overall success of your service relationships. [+]
Understand the purpose and key concepts of the Service Desk practice, including how it serves as the central point of contact between the service provider and the users, facilitating effective communication. This eLearning is: Interactive Self-paced Device-friendly 2-3 hours content mobil-optimised practical exercises     Exam: 20 questions Multiple Choice 30 minutes Closed book Minimum required score to pass: (65%)   [-]
Les mer
Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of the Service Level Management Practice, elucidating its significance in defining, negotiating, and managing service levels to meet customer expectations. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to provide accurate and reliable information about the configuration of services and configuration support items when and where it is needed. [+]
Understand the purpose and key concepts of Service Configuration Management, including its role in maintaining accurate and reliable information about configuration items (CIs) within the IT infrastructure. This eLearning is: Interactive Self-paced Device-friendly 2-3 hours content Mobile-optimised Practical exercises   Exam: 20 questions Multiple Choice 30 Minutes Closed book Pass Mark: 65% [-]
Les mer
Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Relationship Management, Supplier Management, Service Level Management, Continual Improvement and Info... [+]
Understand the key concepts of Relationship Management, Supplier Management, Service Level Management, Continual Improvement, and Information Security Management, elucidating their significance in fostering collaboration, ensuring service quality, driving continual improvement, and maintaining information security. This eLearning is: Interactive Self-paced   Device-friendly   12 hours content   Mobile-optimised   Practical exercises   Exam: 60 questions Multiple choise 90 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
2 dager 5 900 kr
Word er verdens mest brukte tekstbehandlingsprogram. Vårt grunnkurs har som mål å gi deg grunnleggende kunnskaper samt å gi forståelse for hvordan man jobber med Wor... [+]
Kursinstruktør Geir Johan Gylseth Geir Johan Gylseth er utdannet ved Universitetet i Oslo med hovedvekt på Informatikk og har over 30 års erfaring som instruktør. Geir sin styrke ligger innenfor MS Office. Han har lang erfaring med skreddersøm av kurs, kursmanualer og oppgaver. Geir er en entusiastisk og dyktig instruktør som får meget gode evalueringer.   Kursinnhold Bruker du mye tid i Word på å få gjort enkle arbeidsoppgaver? Forskyver sidene seg når du skriver inn mer tekst? Deler ord seg på steder du ikke vil? Er det vanskelig å få plassert bilder og tegninger der du ønsker? Får du ikke sideskiftene der du ønsker? Blir ikke sidetallene dine slik du hadde tenkt deg?   Dette er vanlige problemstillinger mange sliter med og som blir borte etter endt kurs! På kun 2 dager vil du mestre de vanligste arbeidsoppgavene i Word. Du lærer gode rutiner og hurtigtastene du trenger for å kunne arbeide raskt og effektivt. Du vil kunne lage alt fra enkle til mer avanserte dokumenter, brev og rapporter og vil føle deg trygg på at det er du som kontrollerer Word og ikke omvendt! Du vil også få en rekke tips og triks du kan bruke i din arbeidsdag.  Alt du lærer får du repetert gjennom aktiv oppgaveløsning slik at du husker det du har lært når du kommer tilbake på jobb. Kursdokumentasjon, lunsj og pausemat er selvsagt inkludert! Kursholderne har mer enn 20 års Word erfaring som de gjerne deler med deg! Kurset passer for deg med liten erfaring og som ønsker å lære Word fra grunnen av. Kurset passer også for deg som er selvlært og som ønsker å jobbe mer effektivt. Meld deg på Word-kurs allerede i dag og sikre deg plass!   Bli kjent med Word OppstartÅpning Visninger Navigering Nye dokumenter Innskriving Lagring og lukking   Redigering Merking Sletting og erstatting Symboler og spesialtegn Angremuligheter Sammenslåing og deling av avsnitt Flytting og kopiering Søking og erstatting   Formatering Hva er formatering? Tegnformatering Avsnittsformatering Justering Innrykk Punktlister og nummererte lister Kopiering av format Stiler   Sideformatering Inndelinger Marger Papirretning og størrelse Topptekst og bunntekst Sidetall og dokumentinformasjon Forsider og tomme sider Hardt sideskift Dokumenttema   Språkverktøy Autokorrektur Byggeblokker  Stave- og grammatikkontroll Orddeling Dato og klokkeslett   Utskrift Utskriftsformat Forhåndsvisning Utskrift   Tabeller Utforming av tabeller Merking Innsetting og sletting Flytting og kopiering Tabellstiler Radhøyde og kolonnebredde Justering Kantlinjer og skyggelegging   Bilder og objekter Bruk av bilder Utklipp og bildefiler Tekstbryting og plassering   Fletting Utskriftsfletting Hoveddokument Datakilde Innsetting av flettefelt Fletting     [-]
Les mer
Virtuelt klasserom 2 dager 13 500 kr
Dette er et 2-dagers påbyggingskurs i SQL-programmering. Målsettingen er at etter gjennomført kurs vil deltakerne være fortrolige med mer avanserte søk etter data i SQL-d... [+]
Dette er et 2-dagers påbyggingskurs i SQL-programmering. Målsettingen er at etter gjennomført kurs vil deltakerne være fortrolige med mer avanserte søk etter data i SQL-databaser, oppretting av egne funksjoner og eksportering av data i ulike formater, som XML- og JSON.   Innhold Vi bruker Oracle, PostgreSQL og Microsoft SQL-server i kurset og belyser forskjellene mellom disse i håndteringen av avanserte SQL-setninger.   Agenda Gruppering med delsummer ved bruk av Rollup og Cube. Betingelseslogikk i søk med CASE ... WHEN ... THEN ... ELSE Oppretting av egne funksjoner med SQL Oppretting og bruk av Materialized Views Bruk av Common Table Expressions (CTE) Bruk av komplekse felt og sammensatte datatyper (arrays, egne datatyper etc.) - opprette komplekse felt, sette inn data og søke etter data i komplekse felt. Eksportere data som JSON / XML Bruk av Vindusfunksjoner til bl.a. å regne ut kumulative summer, rangeringer mm. Krysstabuleringer med PIVOT-funksjoner Bruk av SELF JOINS Behandling av geografiske data med SQL   Gjennomføring Kurset gjennomføres med en kombinasjon av online læringsmidler, gjennomgang av temaer og problemstillinger og praktiske øvelser. Det er ingen avsluttende eksamen, men det er øvingsoppgaver til hvert av hovedtemaene som gjennomgås.   Kursinstruktør: Terje Berg-Hansen har bred erfaring fra prosjektledelse, utvikling og drift med små og store databaser, både SQL- og NoSQL-baserte. I tillegg til å undervise i etablerte og nye teknologier jobber han med programmering, webutvikling og administrasjon av Linux-servere. Han er levende interessert i nye teknologier, distribuerte databaser og Data Science.   [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
2 dager 12 900 kr
10 Sep
11 Nov
Effektiv prosjektstyring med Microsoft Project [+]
Effektiv prosjektstyring med Microsoft Project [-]
Les mer
Nettkurs 2 timer 1 990 kr
Instruktørbasert opplæring: Delta på webinar å lær hvordan man bygger en prosjektplan for å få god kontroll med gjennomføringen! [+]
Delta på webinar å lær hvordan man bygger en prosjektplan for å få god kontroll med gjennomføringen! Webinaret varer i 2 timer og består av to økter à 45 min. Etter hver økt er det 10 min spørsmålsrunde. Mellom øktene er det 10 min pause. Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.   Kursinnhold:   Tabeller og felt i Project Forskjellige typer felt. Forskjeller mellom felt i aktiviteter og ressurser Legge til og fjerne felt Opprette og tilpasse felt Endre eksisterende tabeller Opprette nye tabeller   Forskjellige visninger Sortering Filtrering - Innebygde filetere. Definere nye filtre Gruppering. Benytte grupper til bedre oversikt og kontroll   3 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Gratis support   [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation,... [+]
Agenda Module 1: Implement VMs for Windows and Linux -Select Virtual Machine Size-Configure High Availability-Implement Azure Dedicated Hosts-Deploy and Configure Scale Sets-Configure Azure Disk Encryption Module 2: Automate Deployment and Configuration of Resources -Azure Resource Manager Templates-Save a Template for a VM-Evaluate Location of New Resources-Configure a Virtual Hard Disk Template-Deploy from a Template-Create and Execute an Automation Runbook Module 3: Implement Virtual Networking -Virtual Network Peering-Implement VNet Peering Module 4: Implement Load Balancing and Network Security -Implement Azure Load Balancer-Implement an Application Gateway-Understand Web Application Firewall-Implement Azure Firewall-Implement Azure Front Door-Implementing Azure Traffice Manager-Implement Network Security Groups and Application Security Grou-Implement Azure Bastion Module 5: Implement Storage Accounts -Storage Accounts-Blob Storage-Storage Security-Managing Storage-Accessing Blobs and Queues using AAD-Configure Azure Storage Firewalls and Virtual Networks Module 6: Implement Azure Active Directory -Overview of Azure Active Directory-Users and Groups-Domains and Custom Domains-Azure AD Identity Protection-Implement Conditional Access-Configure Fraud Alerts for MFA-Implement Bypass Options-Configure Trusted IPs-Configure Guest Users in Azure AD-Manage Multiple Directori Module 7: Implement and Manage Azure Governance -Create Management Groups, Subscriptions, and Resource Groups-Overview of Role-Based Access Control (RBAC)-Role-Based Access Control (RBAC) Roles-Azure AD Access Reviews-Implement and Configure an Azure Policy-Azure Blueprints Module 8: Implement and Manage Hybrid Identities -Install and Configure Azure AD Connect-Configure Password Sync and Password Writeback-Configure Azure AD Connect Health Module 9: Manage Workloads in Azure -Migrate Workloads using Azure Migrate-VMware - Agentless Migration-VMware - Agent-Based Migration-Implement Azure Backup-Azure to Azure Site Recovery-Implement Azure Update Management Module 10: Implement Cloud Infrastructure Monitoring -Azure Infrastructure Security Monitoring-Azure Monitor-Azure Workbooks-Azure Alerts-Log Analytics-Network Watcher-Azure Service Health-Monitor Azure Costs-Azure Application Insights-Unified Monitoring in Azure Module 11: Manage Security for Applications -Azure Key Vault-Azure Managed Identity Module 12: Implement an Application Infrastructure -Create and Configure Azure App Service-Create an App Service Web App for Containers-Create and Configure an App Service Plan-Configure Networking for an App Service-Create and Manage Deployment Slots-Implement Logic Apps-Implement Azure Functions Module 13: Implement Container-Based Applications -Azure Container Instances-Configure Azure Kubernetes Service Module 14: Implement NoSQL Databases -Configure Storage Account Tables-Select Appropriate CosmosDB APIs Module 15: Implement Azure SQL Databases -Configure Azure SQL Database Settings-Implement Azure SQL Database Managed Instances-High-Availability and Azure SQL Database [-]
Les mer
Oslo 1 dag 9 900 kr
18 Aug
18 Aug
ITIL® 4 Practitioner: Relationship Management [+]
ITIL® 4 Practitioner: Relationship Management [-]
Les mer