IT-kurs
Nordland
Du har valgt: Vestvågøy
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Vestvågøy ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of Information Security Management, elucidating its significance in safeguarding the confidentiality, integrity, and availability of organisational information assets. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Oslo 5 dager 46 000 kr
13 Oct
13 Oct
SFWIPA: Securing Data Center Networks and VPNs with Cisco Firewall Threat Defense [+]
SFWIPA: Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense [-]
Les mer
Virtuelt eller personlig 3 dager 12 480 kr
Kurset som får deg godt i gang med Inventor [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon. Inventor grunnkurs Her er et utvalg av temaene du vil lære på kurset: Generelt Part-modellering (3D-komponenter) Samlinger Skjelettmodellering på basisnivå Tegninger i 2D Autodesk Inventor 3D CAD programvare brukes til produktdesign, rendering og simuleringer. Løsningen er viktig når smarte ideer skal bli til produksjonsklar design, og for å utvikle fremtidens produkter og tjenester. Inventor tilfører større kvalitet til utviklingsprosesser med smarte funksjoner som optimaliserer, gjør det enkelt å «se» modellen, og simulere hvordan konseptet/prototypen vil fungere i bruk.   Dette er et populært kurs, meld deg på nå!   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Installering og bruk av valgt databaseverktøy (MySQL). Flerbrukerproblematikk og databaseadministrasjon (DBA) i SQL. Bruk av SQL og innebygd funksjonalitet i databaseverk... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: IINI1003 Databaser eller tilsvarende forhåndskunnskaper Innleveringer: Tilsvarende 8 obligatoriske øvinger må være godkjent før endelig karakter settes. Personlig veileder: ja Vurderingsform: Individuell netteksamen, 2 timer. Ansvarlig: Tore Mallaug Eksamensdato: 13.12.13 / 16.05.14         Læremål: KUNNSKAPERKandidaten:- kjenner sentrale begreper innen flerbrukerproblematikk og databaseadministrasjon, og kan gjøre rede for disse- forstår hvordan innebygd funksjonalitet i relasjonsdatabasesystem kan utnyttes i en klient/tjener-arkitektur- vet hvordan ulike typer data kan lagres og representeres i et databasesystem; tekst, XML og temporale data.- kan gjøre rede for hvordan NoSQL-løsninger er et alternativ til relasjonsdatabaser i Web-løsninger FERDIGHETERKandidaten:- kan administrere en flerbrukerdatabase med SQL-kommandoer i et valgt databaseverktøy- lager sin egen (mest mulig normaliserte) relasjonsdatabase med nøkler og referanseintegritet som ikke bare lagrer strukturelle data, men også tekst og semi-strukturelle data (XML)- kan utnytte databaseverktøyet funksjonalitet til utvidet bruk av SQL i en klient/tjener-sammenheng for å støtte opp rundt applikasjoner mot databasen- kan utnytte databaseverktøyet til å lagre temporale data- kan utføre SQL-spørringer mot ulike typer data i en database GENERELL KOMPETANSEKandidaten:- viser en bevisst holdning til lagring og representasjon av ulike typer data i et informasjonssystem- viser en bevisst holdning til databasedesign for å unngå unødvendig dobbeltlagring av data i en database Innhold:Installering og bruk av valgt databaseverktøy (MySQL). Flerbrukerproblematikk og databaseadministrasjon (DBA) i SQL. Bruk av SQL og innebygd funksjonalitet i databaseverktøyet (bruk av funksjoner/prosedyrer og triggere). Utnytte databaseverktøyet i en klient/tjener -arkitektur. Se på forholdet database - applikasjon. Lagring av ulike typer data; tekst, XML (semi-strukturelle data), dato/tid (temporale data). Enkel bruk av NoSQL-løsning. MySQL blir brukt i eksempler, men noen utfyllende eksempler i Oracle kan forekomme i lærestoffet.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Databaser 2 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Virtuelt eller personlig 4 dager 7 950 kr
Datatilsynet har sett at det å ha en person med kunnskap om og fokus på personvern i en virksomhet kan gjøre en stor forskjell. [+]
Mange har blitt mer og mer oppmerksomme på de rettighetene de har når det kommer til hvordan opplysninger om dem behandles. Enten du er ansatt, kunde, pasient eller en som surfer på internett, så ønsker du at dine personopplysninger skal bli behandlet med respekt og fortrolighet. Datatilsynet har sett at det å ha en person med kunnskap om og fokus på personvern i en virksomhet kan gjøre en stor forskjell. Våre instruktører har mange års erfaring innen databehandling og it-systemer sin håndtering av personopplysninger. Kurset vil derfor gi deg innsikt i hvordan personopplysningsloven med GDPR får en praktisk anvendelse i din virksomhet. Lover og regler blir grundig forklart og eksemplifisert. Det blir oppgaveløsning med praktiske caser og faktiske hendelser, for eksempel lovlig bruk av samtykke, brudd på personopplysningssikkerheten, mv. Følgende emner blir blant annet gjennomgått:– Saklig og geografisk virkeområde for GDPR– Forskjellen på behandlingsansvarlig og databehandler– De grunnleggende prinsippene som loven bygger på– Lovlige hjemler som behandlingsgrunnlag– Respekt for personers rettigheter– Vurdering av personvernkonsekvenser (DPIA)– Utarbeidelse av behandlingsprotokoll– Krav til databehandleravtaler– Personvernombudets oppgaver– Personopplysningssikkerheten og risikovurdering – Overføring av data (utenfor EU/EØS) [-]
Les mer
Virtuelt klasserom 3 timer 2 500 kr
04 Sep
23 Oct
04 Dec
Vi går gjennom oppbygging av pivottabeller og pivotdiagrammer og jobber oss inn i mer detaljerte og avanserte måter å presentere dataene samt tips og triks for å få tabel... [+]
Datagrunnlaget Gruppering Formatering Tallformater Visningsalternativer Feltinnstillinger Beregnede felt Bruk av flere pivottabeller i samme arbeidsbok Slicere som virker på flere pivottabeller eller pivotdiagrammer Tabellfunksjonalitet   Analyse av pivotdiagram Bruk av pivotdiagram i andre programmer   et er fordelaktig å ha to skjermer - en til å følge kurset og en til å gjøre det kursholder demonstrerer. Kurset gjennomføres i sanntid med nettundervisning via Teams. Det blir mulighet for å stille spørsmål, ha diskusjoner, demonstrasjoner og øvelser. Du vil motta en invitasjon til Teams fra kursholder.   [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Fi... [+]
COURSE OVERVIEW The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment TARGET AUDIENCE This course is aimed at Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff. COURSE OBJECTIVES After you complete this course, you will be able to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports COURSE CONTENT 1 - Palo Alto Networks Portfolio and Architecture 2 - Configuring Initial Firewall Settings 3 - Managing Firewall Configurations 4 - Managing Firewall Administrator Accounts 5 - Connecting the Firewall to Production Networks with Security Zones 6 - Creating and Managing Security Policy Rules 7 - Creating and Managing NAT Policy Rules 8 - Controlling Application Usage with App-ID 9 - Blocking Known Threats Using Security Profiles 10 - Blocking Inappropriate Web Traffic with URL Filtering 11 - Blocking Unknown Threats with Wildfire 12 - Controlling Access to Network Resources with User-ID 13 - Using Decryption to Block Threats in Encrypted Traffic 14 - Locating Valuable Information Using Logs and Reports 15 - What's Next in Your Training and Certification Journey Supplemental Materials Securing Endpoints with GlobalProtect Providing Firewall Redundancy with High Availability Connecting Remotes Sites using VPNs Blocking Common Attacks Using Zone Protection   FURTHER INFORMATION Level: Introductory Duration: 5 days Format: Lecture and hands-on labs Platform support: Palo Alto Networks next-generation firewalls running PAN-OS® operating system version 11.0     [-]
Les mer
Virtuelt klasserom 4 dager 22 000 kr
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. [+]
COURSE OVERVIEW Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. TARGET AUDIENCE The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. COURSE OBJECTIVES Explain how Microsoft Defender for Endpoint can remediate risks in your environment Create a Microsoft Defender for Endpoint environment Configure Attack Surface Reduction rules on Windows 10 devices Perform actions on a device using Microsoft Defender for Endpoint Investigate domains and IP addresses in Microsoft Defender for Endpoint Investigate user accounts in Microsoft Defender for Endpoint Configure alert settings in Microsoft Defender for Endpoint Explain how the threat landscape is evolving Conduct advanced hunting in Microsoft 365 Defender Manage incidents in Microsoft 365 Defender Explain how Microsoft Defender for Identity can remediate risks in your environment. Investigate DLP alerts in Microsoft Cloud App Security Explain the types of actions you can take on an insider risk management case. Configure auto-provisioning in Azure Defender Remediate alerts in Azure Defender Construct KQL statements Filter searches based on event time, severity, domain, and other relevant data using KQL Extract data from unstructured string fields using KQL Manage an Azure Sentinel workspace Use KQL to access the watchlist in Azure Sentinel Manage threat indicators in Azure Sentinel Explain the Common Event Format and Syslog connector differences in Azure Sentinel Connect Azure Windows Virtual Machines to Azure Sentinel Configure Log Analytics agent to collect Sysmon events Create new analytics rules and queries using the analytics rule wizard Create a playbook to automate an incident response Use queries to hunt for threats Observe threats over time with livestream COURSE CONTENT Module 1: Mitigate threats using Microsoft Defender for Endpoint Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. Learn how Microsoft Defender for Endpoint can help your organization stay secure. Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security. Learn how to investigate incidents and alerts using Microsoft Defender for Endpoints. Perform advanced hunting and consult with threat experts. You will also learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings.. Lastly, you will learn about your environment's weaknesses by using Threat and Vulnerability Management in Microsoft Defender for Endpoint. Lessons M1 Protect against threats with Microsoft Defender for Endpoint Deploy the Microsoft Defender for Endpoint environment Implement Windows 10 security enhancements with Microsoft Defender for Endpoint Manage alerts and incidents in Microsoft Defender for Endpoint Perform device investigations in Microsoft Defender for Endpoint Perform actions on a device using Microsoft Defender for Endpoint Perform evidence and entities investigations using Microsoft Defender for Endpoint Configure and manage automation using Microsoft Defender for Endpoint Configure for alerts and detections in Microsoft Defender for Endpoint Utilize Threat and Vulnerability Management in Microsoft Defender for Endpoint Lab M1: Mitigate threats using Microsoft Defender for Endpoint Deploy Microsoft Defender for Endpoint Mitigate Attacks using Defender for Endpoint After completing module 1, students will be able to: Define the capabilities of Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint environment settings Configure Attack Surface Reduction rules on Windows 10 devices Investigate alerts in Microsoft Defender for Endpoint Describe device forensics information collected by Microsoft Defender for Endpoint Conduct forensics data collection using Microsoft Defender for Endpoint Investigate user accounts in Microsoft Defender for Endpoint Manage automation settings in Microsoft Defender for Endpoint Manage indicators in Microsoft Defender for Endpoint Describe Threat and Vulnerability Management in Microsoft Defender for Endpoint Module 2: Mitigate threats using Microsoft 365 Defender Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender. Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data. Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise. Lessons M2 Introduction to threat protection with Microsoft 365 Mitigate incidents using Microsoft 365 Defender Protect your identities with Azure AD Identity Protection Remediate risks with Microsoft Defender for Office 365 Safeguard your environment with Microsoft Defender for Identity Secure your cloud apps and services with Microsoft Cloud App Security Respond to data loss prevention alerts using Microsoft 365 Manage insider risk in Microsoft 365 Lab M2: Mitigate threats using Microsoft 365 Defender Mitigate Attacks with Microsoft 365 Defender After completing module 2, students will be able to: Explain how the threat landscape is evolving. Manage incidents in Microsoft 365 Defender Conduct advanced hunting in Microsoft 365 Defender Describe the investigation and remediation features of Azure Active Directory Identity Protection. Define the capabilities of Microsoft Defender for Endpoint. Explain how Microsoft Defender for Endpoint can remediate risks in your environment. Define the Cloud App Security framework Explain how Cloud Discovery helps you see what's going on in your organization Module 3: Mitigate threats using Azure Defender Use Azure Defender integrated with Azure Security Center, for Azure, hybrid cloud, and on-premises workload protection and security. Learn the purpose of Azure Defender, Azure Defender's relationship to Azure Security Center, and how to enable Azure Defender. You will also learn about the protections and detections provided by Azure Defender for each cloud workload. Learn how you can add Azure Defender capabilities to your hybrid environment. Lessons M3 Plan for cloud workload protections using Azure Defender Explain cloud workload protections in Azure Defender Connect Azure assets to Azure Defender Connect non-Azure resources to Azure Defender Remediate security alerts using Azure Defender Lab M3: Mitigate threats using Azure Defender Deploy Azure Defender Mitigate Attacks with Azure Defender After completing module 3, students will be able to: Describe Azure Defender features Explain Azure Security Center features Explain which workloads are protected by Azure Defender Explain how Azure Defender protections function Configure auto-provisioning in Azure Defender Describe manual provisioning in Azure Defender Connect non-Azure machines to Azure Defender Describe alerts in Azure Defender Remediate alerts in Azure Defender Automate responses in Azure Defender Module 4: Create queries for Azure Sentinel using Kusto Query Language (KQL) Write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Azure Sentinel. This module will focus on the most used operators. The example KQL statements will showcase security related table queries. KQL is the query language used to perform analysis on data to create analytics, workbooks, and perform hunting in Azure Sentinel. Learn how basic KQL statement structure provides the foundation to build more complex statements. Learn how to summarize and visualize data with a KQL statement provides the foundation to build detections in Azure Sentinel. Learn how to use the Kusto Query Language (KQL) to manipulate string data ingested from log sources. Lessons M4 Construct KQL statements for Azure Sentinel Analyze query results using KQL Build multi-table statements using KQL Work with data in Azure Sentinel using Kusto Query Language Lab M4: Create queries for Azure Sentinel using Kusto Query Language (KQL) Construct Basic KQL Statements Analyze query results using KQL Build multi-table statements using KQL Work with string data using KQL statements After completing module 4, students will be able to: Construct KQL statements Search log files for security events using KQL Filter searches based on event time, severity, domain, and other relevant data using KQL Summarize data using KQL statements Render visualizations using KQL statements Extract data from unstructured string fields using KQL Extract data from structured string data using KQL Create Functions using KQL Module 5: Configure your Azure Sentinel environment Get started with Azure Sentinel by properly configuring the Azure Sentinel workspace. Traditional security information and event management (SIEM) systems typically take a long time to set up and configure. They're also not necessarily designed with cloud workloads in mind. Azure Sentinel enables you to start getting valuable security insights from your cloud and on-premises data quickly. This module helps you get started. Learn about the architecture of Azure Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements. As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Azure Sentinel. Lessons M5 Introduction to Azure Sentinel Create and manage Azure Sentinel workspaces Query logs in Azure Sentinel Use watchlists in Azure Sentinel Utilize threat intelligence in Azure Sentinel Lab M5 : Configure your Azure Sentinel environment Create an Azure Sentinel Workspace Create a Watchlist Create a Threat Indicator After completing module 5, students will be able to: Identify the various components and functionality of Azure Sentinel. Identify use cases where Azure Sentinel would be a good solution. Describe Azure Sentinel workspace architecture Install Azure Sentinel workspace Manage an Azure Sentinel workspace Create a watchlist in Azure Sentinel Use KQL to access the watchlist in Azure Sentinel Manage threat indicators in Azure Sentinel Use KQL to access threat indicators in Azure Sentinel Module 6: Connect logs to Azure Sentinel Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Azure Sentinel. The primary approach to connect log data is using the Azure Sentinel provided data connectors. This module provides an overview of the available data connectors. You will get to learn about the configuration options and data provided by Azure Sentinel connectors for Microsoft 365 Defender. Lessons M6 Connect data to Azure Sentinel using data connectors Connect Microsoft services to Azure Sentinel Connect Microsoft 365 Defender to Azure Sentinel Connect Windows hosts to Azure Sentinel Connect Common Event Format logs to Azure Sentinel Connect syslog data sources to Azure Sentinel Connect threat indicators to Azure Sentinel Lab M6: Connect logs to Azure Sentinel Connect Microsoft services to Azure Sentinel Connect Windows hosts to Azure Sentinel Connect Linux hosts to Azure Sentinel Connect Threat intelligence to Azure Sentinel After completing module 6, students will be able to: Explain the use of data connectors in Azure Sentinel Explain the Common Event Format and Syslog connector differences in Azure Sentinel Connect Microsoft service connectors Explain how connectors auto-create incidents in Azure Sentinel Activate the Microsoft 365 Defender connector in Azure Sentinel Connect Azure Windows Virtual Machines to Azure Sentinel Connect non-Azure Windows hosts to Azure Sentinel Configure Log Analytics agent to collect Sysmon events Explain the Common Event Format connector deployment options in Azure Sentinel Configure the TAXII connector in Azure Sentinel View threat indicators in Azure Sentinel Module 7: Create detections and perform investigations using Azure Sentinel Detect previously uncovered threats and rapidly remediate threats with built-in orchestration and automation in Azure Sentinel. You will learn how to create Azure Sentinel playbooks to respond to security threats. You'll investigate Azure Sentinel incident management, learn about Azure Sentinel events and entities, and discover ways to resolve incidents. You will also learn how to query, visualize, and monitor data in Azure Sentinel. Lessons M7 Threat detection with Azure Sentinel analytics Threat response with Azure Sentinel playbooks Security incident management in Azure Sentinel Use entity behavior analytics in Azure Sentinel Query, visualize, and monitor data in Azure Sentinel Lab M7: Create detections and perform investigations using Azure Sentinel Create Analytical Rules Model Attacks to Define Rule Logic Mitigate Attacks using Azure Sentinel Create Workbooks in Azure Sentinel After completing module 7, students will be able to: Explain the importance of Azure Sentinel Analytics. Create rules from templates. Manage rules with modifications. Explain Azure Sentinel SOAR capabilities. Create a playbook to automate an incident response. Investigate and manage incident resolution. Explain User and Entity Behavior Analytics in Azure Sentinel Explore entities in Azure Sentinel Visualize security data using Azure Sentinel Workbooks. Module 8: Perform threat hunting in Azure Sentinel In this module, you'll learn to proactively identify threat behaviors by using Azure Sentinel queries. You'll also learn to use bookmarks and livestream to hunt threats. You will also learn how to use notebooks in Azure Sentinel for advanced hunting. Lessons M8 Threat hunting with Azure Sentinel Hunt for threats using notebooks in Azure Sentinel Lab M8 : Threat hunting in Azure Sentinel Threat Hunting in Azure Sentinel Threat Hunting using Notebooks After completing this module, students will be able to: Describe threat hunting concepts for use with Azure Sentinel Define a threat hunting hypothesis for use in Azure Sentinel Use queries to hunt for threats. Observe threats over time with livestream. Explore API libraries for advanced threat hunting in Azure Sentinel Create and use notebooks in Azure Sentinel [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration: Microsoft 365 tenant and service management, Office 365 management, and Microsoft 36... [+]
COURSE OVERVIEW  In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management. This begins with an overview of Office 365 product functionality, including Exchange Online, SharePoint Online, Microsoft Teams, additional product resources, and device management. You will then transition to configuring Office 365, with a primary focus on configuring Office client connectivity to Office 365. Finally, you will examine how to manage Office 365 ProPlus deployments, from user-driven client installations to centralized Office 365 ProPlus deployments. You will wrap up this section by learning how to configure Office Telemetry and Microsoft Analytics. The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multi-factor authentication and self-service password management. This section wraps up with a comprehensive look at implementing application and external access. You will learn how to add and manage applications in Azure Active Directory, including how to configure multi-tenant applications. You will then examine how to configure Azure AD Application Proxy, including how to install and register a connector and how to publish an on-premises app for remote access. Finally, you will examine how to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths. COURSE OBJECTIVES Designing, configuring, and managing your Microsoft 365 tenant Office 365 product functionality Configuring Office 365 Managing Office 365 ProPlus deployments Planning and implementing identity synchronization Implementing application and external access COURSE CONTENT Module 1: Designing Your Microsoft 365 Tenant Planning Microsoft 365 in your On-premises Infrastructure Planning Your Identity and Authentication Solution Planning Your Service Setup Planning Your Hybrid Enviroment Planning Your Migration to Office 365 Module 2: Configuring Your Microsoft 365 Tenant Planning  Your Microsoft 365 Experience Configuring  Your Microsoft 365 Experience Managing User Accounts and Licenses in Microsoft 365 Managing Security Groups in Microsoft 365 Implementing Your Domain Services Leveraging FastTrack and Partner Services Module 3: Lab 1 - Configuring your Microsoft 365 Tenant Exercise 1 - Set up a Microsoft 365 Trial Tenant Module 4: Managing Your Microsoft 365 Tenant Configuring Tenant Roles Managing Tenant Health and Services Module 5: Lab 2 - Managing your Microsoft 365 Tenant Exercise 1 - Manage Administration Delegation Exercise 2 - Configure Office 365 Message Encryption (OME) Exercise 3 - Monitor and Troubleshoot Office 365 Module 6: Office 365 Overview Exchange Online Overview SharePoint Online Overview Teams Overview Additional Resources Overview Device Management Overview Module 7: Lab 3 - Office 365 Overview Exercise 1 - Exchange Online Overview Exercise 2 - SharePoint Online Overview Exercise 3 - Teams Overview Module 8: Configuring  Office 365 Office 365 Client Overview Configuring Office Client Connectivity to Office 365 Module 9: Managing Office 365 ProPlus Deployments Managing User-Driven Client Installations Managing Centralized Office 365 ProPlus Deployments Configuring Office Telemetry Configuring Microsoft Analytics Module 10: Lab 4 - Managing Office 365 ProPlus installations Exercise 1 - Prepare an Office 365 ProPlus Managed Installation Exercise 2 - Manage a Centralized Office 365 ProPlus Installation Exercise 3 - Deploy and Configure Office Telemetry Components Module 11: Planning and Implementing Identity Synchronization Introduction to Identity Synchronization Planning for Azure AD Connect Implementing Azure AD Connect Managing Synchronized Identities Password Management in Microsoft 365 Module 12: Lab 5 - Implementing Identity Synchronization Exercise 1 - Set up your organization for identity synchronization Exercise 2 - Implement Identity Synchronization Module 13: Implementing Application and External Access Implementing Applications in Azure AD Configuring Azure AD App Proxy Designing Solutions for External Access TEST CERTIFICATION This course helps you to prepare for exam MS100. But as this is part of an expert certification you should already own one of the Microsoft 365 Associate certifications:  Modern Desktop Teamwork Administrator Security Administrator Messaging Administrator. [-]
Les mer
4 dager 23 000 kr
This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. [+]
 Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments.Students for AZ-140: Configuring and Operating Windows Virtual Desktop on Microsoft Azure are interested in delivering applications on Windows Virtual Desktop and optimizing them to run in multi-session virtual environments. As a Windows Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Windows Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Windows Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Windows Virtual Desktop performance, and automate Windows Virtual Desktop management tasks. COURSE OBJECTIVES   Select an appropriate licensing model for Windows Virtual Desktop Implement networking for Windows Virtual Desktop Manage Windows Virtual Desktop session hosts by using Azure Bastion Configure storage for FSLogix components Create and manage session host images Implement Azure roles and role-based access control (RBAC) for Windows Virtual Desktop Configure user Windows Virtual Desktop experience settings Install and configure apps on a session host Implement business continuity and disaster recovery Monitor and manage Windows Virtual Desktop performance     COURSE CONTENT Module 1: Plan a Windows Virtual Desktop Architecture In this module, you will learn how to assess existing physical and virtual desktop environments, plan and configure name resolution for Active Directory (AD) and Azure Active Directory Domain Services (Azure AD DS), and plan for Windows Virtual Desktop client deployments. LESSONS M1 Windows Virtual Desktop Architecture Design the WVD architecture Design for user identities and profiles LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AZURE AD DS) LAB: PREPARE FOR DEPLOYMENT OF AZURE WINDOWS VIRTUAL DESKTOP (AD DS) After completing module 1, students will be able to: Understand Windows Virtual Desktop Components Understand personal and pooled desktops Recommend an operating system for a WVD implementation Plan a host pools architecture Module 2: Implement a WVD Infrastructure In this module, you will learn how to manage connectivity to the internet and on-premises networks, create a host pool by using the Azure portal, deploy host pools and hosts by using Azure Resource Manager templates, apply OS and application updates to a running WVD host, and create a master image. LESSONS M2 Implement and manage networking for WVD Implement and manage storage for WVD Create and configure host pools and session hosts Create and manage session host image LAB: CREATE AND CONFIGURE HOST POOLS AND SESSION HOSTS (AZURE AD DS) LAB: DEPLOY HOST POOLS AND SESSION HOSTS BY USING THE AZURE PORTAL (AD DS) LAB: IMPLEMENT AND MANAGE STORAGE FOR WVD (AZURE AD DS) LAB: DEPLOY HOST POOLS AND HOSTS BY USING AZURE RESOURCE MANAGER TEMPLATES LAB: DEPLOY AND MANAGE HOST POOLS AND HOSTS BY USING POWERSHELL After completing module 2, students will be able to: Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Windows Virtual Desktop network connectivity Configure WVD session hosts using Azure Bastion Configure storage for FSLogix components Configure disks and file shares Modify a session host image Create and use a Shared Image Gallery (SIG) Module 3: Manage Access and Security In this module, you will learn how to plan and implement Azure roles and RBAC for WVD, implement Conditional Access policies for connections, plan and implement MFA, and manage security by using Azure Security Center. LESSONS M3 Manage access Manage security LAB: CONFIGURE CONDITIONAL ACCESS POLICIES FOR CONNECTIONS TO WVD (AD DS) After completing module 3, students will be able to: Manage local roles, groups and rights assignment on WVD session hosts. Configure user restrictions by using AD group policies and Azure AD policies Understand Conditional Access policy components Prepare for Azure Active Directory (Azure AD)-based Conditional Access for Windows Virtual Desktop Implement Azure AD-based Conditional Access for Windows Virtual Desktop Module 4: Manage User Environments and Apps In this module, you will learn how to plan for FSLogix, install FSLogix, configure Cloud Cache, deploy an application as a RemoteApp, and implement and manage OneDrive for Business for a multi-session environment. LESSONS M4 Implement and manage FSLogix Configure user experience settings Install and configure apps on a session host LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AZURE AD DS) LAB: WINDOWS VIRTUAL DESKTOP PROFILE MANAGEMENT (AD DS) LAB: WINDOWS VIRTUAL DESKTOP APPLICATION PACKAGING (AD DS) After completing module 4, students will be able to: Configure Profile Containers Configure Azure Files to store profile containers for WVD in an AAD DS environment Implement FSLogix based profiles for Windows Virtual Desktop in Azure AD DS environment Implement FSLogix based profiles for Windows Virtual Desktop Prepare for and create MSIX app packages Implement MSIX app attach container for Windows Virtual Desktop in AD DS environmen Module 5: Monitor and maintain a WVD infrastructure In this module, you will learn how to plan and implement a disaster recovery plan for WVD, configure automation for WVD, implement autoscaling in host pools, and optimize session host capacity and performance. LESSONS M5 Plan and implement business continuity and disaster recovery Automate WVD management tasks Monitor and manage performance and health LAB: IMPLEMENT AUTOSCALING IN HOST POOLS (AD DS) After completing module 5, students will be able to: Plan and implement a disaster recovery plan for WVD Configure automation for WVD Monitor WVD by using Azure Monitor Customize Azure Workbooks for WVD monitoring Configure autoscaling of Windows Virtual Desktop session hosts Verify autoscaling of Windows Virtual Desktop session host [-]
Les mer
Virtuelt klasserom 4 dager 30 000 kr
29 Sep
In this course, the student will learn about the data engineering patterns and practices as it pertains to working with batch and real-time analytical solutions using Azu... [+]
The students will learn how to interactively explore data stored in files in a data lake. They will learn the various ingestion techniques that can be used to load data using the Apache Spark capability found in Azure Synapse Analytics or Azure Databricks, or how to ingest using Azure Data Factory or Azure Synapse pipelines. The students will also learn the various ways they can transform the data using the same technologies that is used to ingest data. The student will spend time on the course learning how to monitor and analyze the performance of analytical system so that they can optimize the performance of data loads, or queries that are issued against the systems. They will understand the importance of implementing security to ensure that the data is protected at rest or in transit. The student will then show how the data in an analytical system can be used to create dashboards, or build predictive models in Azure Synapse Analytics. After completing this course, students will be able to: Explore compute and storage options for data engineering workloads in Azure Design and Implement the serving layer Understand data engineering considerations Run interactive queries using serverless SQL pools Explore, transform, and load data into the Data Warehouse using Apache Spark Perform data Exploration and Transformation in Azure Databricks Ingest and load Data into the Data Warehouse Transform Data with Azure Data Factory or Azure Synapse Pipelines Integrate Data from Notebooks with Azure Data Factory or Azure Synapse Pipelines Optimize Query Performance with Dedicated SQL Pools in Azure Synapse Analyze and Optimize Data Warehouse Storage Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link Perform end-to-end security with Azure Synapse Analytics Perform real-time Stream Processing with Stream Analytics Create a Stream Processing Solution with Event Hubs and Azure Databricks Build reports using Power BI integration with Azure Synpase Analytics Perform Integrated Machine Learning Processes in Azure Synapse Analytics Course prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions.Recommended prerequisites:M-DP900 - Microsoft Azure Data FundamentalsM-AZ900 - Microsoft Azure Fundamentals Agenda Module 1: Explore compute and storage options for data engineering workloads This module provides an overview of the Azure compute and storage technology options that are available to data engineers building analytical workloads. This module teaches ways to structure the data lake, and to optimize the files for exploration, streaming, and batch workloads. The student will learn how to organize the data lake into levels of data refinement as they transform files through batch and stream processing. Then they will learn how to create indexes on their datasets, such as CSV, JSON, and Parquet files, and use them for potential query and workload acceleration. Module 2: Design and implement the serving layer This module teaches how to design and implement data stores in a modern data warehouse to optimize analytical workloads. The student will learn how to design a multidimensional schema to store fact and dimension data. Then the student will learn how to populate slowly changing dimensions through incremental data loading from Azure Data Factory. Module 3: Data engineering considerations for source files This module explores data engineering considerations that are common when loading data into a modern data warehouse analytical from files stored in an Azure Data Lake, and understanding the security consideration associated with storing files stored in the data lake. Module 4: Run interactive queries using Azure Synapse Analytics serverless SQL pools In this module, students will learn how to work with files stored in the data lake and external file sources, through T-SQL statements executed by a serverless SQL pool in Azure Synapse Analytics. Students will query Parquet files stored in a data lake, as well as CSV files stored in an external data store. Next, they will create Azure Active Directory security groups and enforce access to files in the data lake through Role-Based Access Control (RBAC) and Access Control Lists (ACLs). Module 5: Explore, transform, and load data into the Data Warehouse using Apache Spark This module teaches how to explore data stored in a data lake, transform the data, and load data into a relational data store. The student will explore Parquet and JSON files and use techniques to query and transform JSON files with hierarchical structures. Then the student will use Apache Spark to load data into the data warehouse and join Parquet data in the data lake with data in the dedicated SQL pool. Module 6: Data exploration and transformation in Azure Databricks This module teaches how to use various Apache Spark DataFrame methods to explore and transform data in Azure Databricks. The student will learn how to perform standard DataFrame methods to explore and transform data. They will also learn how to perform more advanced tasks, such as removing duplicate data, manipulate date/time values, rename columns, and aggregate data. Module 7: Ingest and load data into the data warehouse This module teaches students how to ingest data into the data warehouse through T-SQL scripts and Synapse Analytics integration pipelines. The student will learn how to load data into Synapse dedicated SQL pools with PolyBase and COPY using T-SQL. The student will also learn how to use workload management along with a Copy activity in a Azure Synapse pipeline for petabyte-scale data ingestion. Module 8: Transform data with Azure Data Factory or Azure Synapse Pipelines This module teaches students how to build data integration pipelines to ingest from multiple data sources, transform data using mapping data flowss, and perform data movement into one or more data sinks. Module 9: Orchestrate data movement and transformation in Azure Synapse Pipelines In this module, you will learn how to create linked services, and orchestrate data movement and transformation using notebooks in Azure Synapse Pipelines. Module 10: Optimize query performance with dedicated SQL pools in Azure Synapse In this module, students will learn strategies to optimize data storage and processing when using dedicated SQL pools in Azure Synapse Analytics. The student will know how to use developer features, such as windowing and HyperLogLog functions, use data loading best practices, and optimize and improve query performance. Module 11: Analyze and Optimize Data Warehouse Storage In this module, students will learn how to analyze then optimize the data storage of the Azure Synapse dedicated SQL pools. The student will know techniques to understand table space usage and column store storage details. Next the student will know how to compare storage requirements between identical tables that use different data types. Finally, the student will observe the impact materialized views have when executed in place of complex queries and learn how to avoid extensive logging by optimizing delete operations. Module 12: Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link In this module, students will learn how Azure Synapse Link enables seamless connectivity of an Azure Cosmos DB account to a Synapse workspace. The student will understand how to enable and configure Synapse link, then how to query the Azure Cosmos DB analytical store using Apache Spark and SQL serverless. Module 13: End-to-end security with Azure Synapse Analytics In this module, students will learn how to secure a Synapse Analytics workspace and its supporting infrastructure. The student will observe the SQL Active Directory Admin, manage IP firewall rules, manage secrets with Azure Key Vault and access those secrets through a Key Vault linked service and pipeline activities. The student will understand how to implement column-level security, row-level security, and dynamic data masking when using dedicated SQL pools. Module 14: Real-time Stream Processing with Stream Analytics In this module, students will learn how to process streaming data with Azure Stream Analytics. The student will ingest vehicle telemetry data into Event Hubs, then process that data in real time, using various windowing functions in Azure Stream Analytics. They will output the data to Azure Synapse Analytics. Finally, the student will learn how to scale the Stream Analytics job to increase throughput. Module 15: Create a Stream Processing Solution with Event Hubs and Azure Databricks In this module, students will learn how to ingest and process streaming data at scale with Event Hubs and Spark Structured Streaming in Azure Databricks. The student will learn the key features and uses of Structured Streaming. The student will implement sliding windows to aggregate over chunks of data and apply watermarking to remove stale data. Finally, the student will connect to Event Hubs to read and write streams. Module 16: Build reports using Power BI integration with Azure Synapase Analytics In this module, the student will learn how to integrate Power BI with their Synapse workspace to build reports in Power BI. The student will create a new data source and Power BI report in Synapse Studio. Then the student will learn how to improve query performance with materialized views and result-set caching. Finally, the student will explore the data lake with serverless SQL pools and create visualizations against that data in Power BI. Module 17: Perform Integrated Machine Learning Processes in Azure Synapse Analytics This module explores the integrated, end-to-end Azure Machine Learning and Azure Cognitive Services experience in Azure Synapse Analytics. You will learn how to connect an Azure Synapse Analytics workspace to an Azure Machine Learning workspace using a Linked Service and then trigger an Automated ML experiment that uses data from a Spark table. You will also learn how to use trained models from Azure Machine Learning or Azure Cognitive Services to enrich data in a SQL pool table and then serve prediction results using Power BI. [-]
Les mer
Virtuelt eller personlig 1 dag 5 950 kr
Mer enn 1,6 millioner fagfolk innenfor design og konstruksjon verden over, bruker Bluebeam Revu til å optimalisere samarbeidet og gjennomføre prosjekter mer effektivt. [+]
Brukergrensesnittet. Opprette profiler med tilpasset oppsett. Verktøy for digital dokumentbehandling, slik som å sette sammen PDF’er, opprette hyperkoblinger, påføre digitale signaturer og stempler. Redigere innhold i PDF-filer Automatisk sammenligning Markeringsverktøy for bruk under designgjennomgang, etc. Bruk av Tool Chest til å spare symboler og tilpassede verktøy for enkel gjenbruk Bruk av markeringslisten til å sette status, kommentere, filtrere og rapportere Kalibrering og måleverktøy. Intro til mengdeberegning Intro til skybasert samarbeid med Studio Projects og Sessions   På kurset lærer du alle de viktigste funksjonene i Revu, noe som gir deg et godt overblikk og utgangspunkt for å jobbe videre med programmet. Du blir i stand til å digitalisere og effektivisere en rekke manuelle arbeidsprosesser, med tidsbesparelse og bedre kvalitet som resultat.   [-]
Les mer
Nettkurs 2 timer 1 990 kr
Instruktørbasert opplæring: Det er utrolig hva du kan få til i Excel modeller ved å legge til enkel automatisering. Bli inspirert til å utforske de uendelige mulighe... [+]
Det er utrolig hva du kan få til i Excel modeller ved å legge til enkel automatisering med Excel macro. Bli inspirert til å utforske de uendelige mulighetene Excel makroer gir! Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.   Kursinnhold:   Generelt om bruk av makro i Excel Åpne arbeidsbok med makro Kategori Utvikler og makroinnstillinger Innspiling av makro Innsetting av knapp i regnearket Enkelt redigering av kode Bruk av navngiving Bruk av If setning Bruk av MsgBox Lagre arbeidsbok med makro [-]
Les mer
Oslo Bergen Og 1 annet sted 5 dager 27 500 kr
15 Sep
15 Sep
27 Oct
AZ-400: Designing and Implementing Microsoft DevOps solutions [+]
AZ-400: Designing and Implementing Microsoft DevOps solutions [-]
Les mer