IT-kurs
Telemark
Du har valgt: Vrådal
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Vrådal ) i IT-kurs
 

Nettstudie 12 måneder 5 000 kr
Learn how to move new or changed hardware, software, documentation, processes, or any other component to live environments, and how to deploy components to other environm... [+]
Understand the purpose and key concepts of Deployment Management, highlighting its importance in managing the deployment of new or changed services into the live environment. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours of content   Mobile-optimised   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Relationship Management, Supplier Management, Service Level Management, Continual Improvement and Info... [+]
Understand the key concepts of Relationship Management, Supplier Management, Service Level Management, Continual Improvement, and Information Security Management, elucidating their significance in fostering collaboration, ensuring service quality, driving continual improvement, and maintaining information security. This eLearning is: Interactive Self-paced   Device-friendly   12 hours content   Mobile-optimised   Practical exercises   Exam: 60 questions Multiple choise 90 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to deliver an agreed quality of service by handling all predefined, user-initiated service requests in an effective and user-friendly manner. [+]
Understand the purpose and key concepts of the Continual Improvement Practice, elucidating its significance in fostering a culture of ongoing improvement and innovation within the organisation. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
The purpose of this module is to provide best practice guidance on how to set clear, business-based targets for service utility, warranty and experience. [+]
Understand the purpose and key concepts of the Service Level Management Practice, elucidating its significance in defining, negotiating, and managing service levels to meet customer expectations. This eLearning is: Interactive Self-paced   Device-friendly   2-3 hours content   Mobile-optimised   Practical exercises   Exam: 20 questions Multiple choise 30 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn how to improve user and customer experience, as well as the overall success of your service relationships. [+]
Understand the purpose and key concepts of the Service Desk practice, including how it serves as the central point of contact between the service provider and the users, facilitating effective communication. This eLearning is: Interactive Self-paced Device-friendly 2-3 hours content mobil-optimised practical exercises     Exam: 20 questions Multiple Choice 30 minutes Closed book Minimum required score to pass: (65%)   [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettstudie 12 måneder 5 000 kr
Learn to provide accurate and reliable information about the configuration of services and configuration support items when and where it is needed. [+]
Understand the purpose and key concepts of Service Configuration Management, including its role in maintaining accurate and reliable information about configuration items (CIs) within the IT infrastructure. This eLearning is: Interactive Self-paced Device-friendly 2-3 hours content Mobile-optimised Practical exercises   Exam: 20 questions Multiple Choice 30 Minutes Closed book Pass Mark: 65% [-]
Les mer
Nettkurs 12 måneder 11 500 kr
ITIL® er det mest utbredte og anerkjente rammeverket for IT Service Management (ITSM) i verden, og ITIL® 4 Foundation er et introduksjonskurs til rammeverket. [+]
ITIL® 4 Foundation-kurset er en introduksjon til ITIL® 4. Kurset lar kandidater se på IT-tjenestestyring gjennom en ende-til-ende driftsmodell, som inkluderer oppretting, levering og kontinuerlig forbedring av IT-relaterte produkter og tjenester. E-læringskurset inneholder 12 timer med undervisning, og er delt inn i 8 moduler. Les mer om ITIL® 4 på AXELOS sine websider. Inkluderer: Tilgang til ITIL® 4 Foundation e-læring (engelsk) i 12 måneder. ITIL® Foundation online voucher til sertifiseringstest + digital ITIL Foundation bok Du vil motta en e-post med tilgang til e-læringen, sertifiseringsvoucher og digital bok fra Peoplecert. Du avtaler tid for sertifiseringen som beskrevet i e-posten fra Peoplecert. Sertifiseringen består av: 40 spørsmål Multiple Choice 60 minutter + 15 minutter til rådighet dersom du ikke har engelsk som morsmål For å bestå må du ha minimum 26 riktige (65%) Ingen hjelpemidler tillatt ITIL®/PRINCE2®/MSP®/MoP® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
Oslo 1 dag 9 900 kr
08 Sep
08 Sep
08 Sep
ITIL® 4 Practitioner: Incident Management [+]
ITIL® 4 Practitioner: Incident Management [-]
Les mer
Nettkurs 2 timer 1 690 kr
Trenger du en rask innføring i hvordan å lage en fremdriftsplan i Project? Delta på vårt webinar å se hvordan du kommer i gang med og lage en enkel fremdriftsplan. [+]
Trenger du en rask innføring i hvordan å lage en fremdriftsplan i Project? Delta på vårt webinar å se hvordan du kommer i gang med og lage en enkel fremdriftsplan. Webinaret varer i 2 timer og består av to økter à 45 min. Etter hver økt er det 10 min spørsmålsrunde. Mellom øktene er det 10 min pause. Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.   Kursinnhold:   Opprette prosjektkalender Se på unntak Se på tidsplan   Generelle innstillinger i Project   Opprette aktiviteter Enkel redigering av aktivitetslisten Disponere   Kobling av aktiviteter Tidsforskyvning Betingelsestyper   3 gode grunner til å delta 1. Få kontroll på prosjektkalenderen 2. Lær hvordan sette opp avhengighetsforhold mellom aktiviteter. 3. Hvorfor trenger vi en opprinnelig plan og hvordan opprette denne   [-]
Les mer
Virtuelt klasserom 4 dager 24 000 kr
This course provides students with the skills and knowledge required to successfully create and maintain the cloud and edge portions of an Azure IoT solution. The course ... [+]
  An Azure IoT Developer is responsible for implementing and then maintaining the cloud and edge portions of an Azure IoT solution. In addition to configuring and maintaining devices by using Azure IoT services and other Microsoft tools, the IoT Developer also sets up the physical devices and is responsible for maintaining the devices throughout the life cycle. The IoT Developer implements designs for IoT solutions, including device topology, connectivity, debugging and security. For Edge device scenarios, the IoT Developer also deploys compute/containers and configures device networking, which could include various edge gateway implementations. The IoT Developer implements designs for solutions to manage data pipelines, including monitoring and data transformation as it relates to IoT. The IoT Developer works with data engineers and other stakeholders to ensure successful business integration. IoT Developers should have a good understanding of Azure services, including data storage options, data analysis, data processing, and the Azure IoT PaaS versus SaaS options. After completing this course, students will be able to: Create, configure, and manage an Azure IoT hub. Provision devices by using IoT Hub and DPS, including provisioning at scale. Establish secure 2-way communication between devices and IoT Hub. Implement message processing by using IoT Hub routing and Azure Stream Analytics. Configure the connection to Time Series Insights and support business integration requirements. Implement IoT Edge scenarios using marketplace modules and various edge gateway patterns. Implement IoT Edge scenarios that require developing and deploying custom modules and containers. Implement device management using device twins and direct methods. Implement solution monitoring, logging, and diagnostics testing. Recognize and address security concerns and implement Azure Security Center for IoT. Build an IoT Solution by using Azure IoT Central and recongize SaaS opportunities for IoT. Course prerequisites IoT Developers should have basic programming skills in at least one Azure-supported language, including C#, Node.js, C, Python, or Java. Software development experience is a prerequisite for this course, but no specific software language is required, and the experience does not need to be at a professional level. Data Processing Experience: General understanding of data storage and data processing is a recommended but not required.  Cloud Solution Awareness: Students should have a basic understanding of PaaS, SaaS, and IaaS implementations. Microsoft Azure Fundamentals (M-AZ-900T00/M-AZ900), or equivalent skills, is recommended.  This course helps to prepare for exam AZ-220.   Agenda Module 1: Introduction to IoT and Azure IoT Services -Business Opportunities for IoT-Introduction to IoT Solution Architecture-IoT Hardware and Cloud Services Module 2: Devices and Device Communication -IoT Hub and Devices-IoT Developer Tools-Device Configuration and Communication Module 3: Device Provisioning at Scale -Device Provisioning Service Terms and Concepts-Configure and Manage the Device Provisioning Service-Device Provisioning Tasks Module 4: Message Processing and Analytics -Messages and Message Processing-Data Storage Options-Azure Stream Analytics Module 5: Insights and Business Integration -Business Integration for IoT Solutions-Data Visualization with Time Series Insights-Data Visualization with Power BI Module 6: Azure IoT Edge Deployment Process -Introduction to Azure IoT Edge-Edge Deployment Process-Edge Gateway Devices Module 7: Azure IoT Edge Modules and Containers -Develop Custom Edge Modules-Offline and Local Storage Module 8: Device Management -Introduction to IoT Device Management-Manage IoT and IoT Edge Devices-Device Management at Scale Module 9: Solution Testing, Diagnostics, and Logging -Monitoring and Logging-Troubleshooting Module 10: Azure Security Center and IoT Security Considerations -Security Fundamentals for IoT Solutions-Introduction to Azure Security Center for IoT-Enhance Protection with Azure Security Center for IoT Agents Module 11: Build an IoT Solution with IoT Central -Introduction to IoT Central-Create and Manage Device Templates-Manage Devices in Azure IoT Central [-]
Les mer
Nettkurs 5 timer 549 kr
I dette kurset kommer seniorutvikler John Inge Muldal Erlandsen til å dekke Azures viktigste fundamentale konsepter og hjelpe deg på din vei mot skyen. Han kommer til å d... [+]
Dette grunnleggende kurset om Microsoft Azure gir deg en solid forståelse av fundamentale konsepter i Azure-skymiljøet. Kursholderen, seniorutvikler John Inge Muldal Erlandsen, vil veilede deg gjennom nøkkelkomponentene og mulighetene som Azure tilbyr. Microsoft Azure er en ledende skyplattform og konkurrerer direkte med Amazon Web Services (AWS). Azure inneholder et bredt spekter av enheter, funksjoner og tjenester som du kan bruke for å oppfylle ulike behov innen skytjenester. Dette kurset er spesielt rettet mot forberedelse til AZ-900-eksamen, som fører til Microsoft-sertifiseringen "Microsoft Certified Fundamentals". Målet med kurset er å gi deg tilstrekkelig kunnskap og forberedelse til å bestå denne eksamenen med suksess. Kurset vil dekke følgende emner: Kapittel 1: Introduksjon Kapittel 2: Tjenester Kapittel 3: Verktøy Kapittel 4: Sikkerhet Kapittel 5: Styring Kapittel 6: Administrasjon Kapittel 7: Avslutning   Varighet: 4 timer og 32 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Vår tjeneste fungerer på samme måte som strømmetjenester for musikk eller TV-serier, der våre kunder betaler en fast månedspris for tilgang til alle kursene vi har tilgjengelig. Vi har opplevd betydelig vekst de siste årene, med over 30 000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling engasjerende, spennende og tilgjengelig for alle, og vi har støtte fra Innovasjon Norge og Forskningsrådet. [-]
Les mer
Majorstuen 2 dager 7 900 kr
21 Aug
17 Sep
29 Oct
På dette kurset får du en god oversikt over mulighetene i Excel. Du får nyttige tips som forenkler arbeidshverdagen din, og lærer de viktigste funksjonene for å komme i g... [+]
Bruker du mye tid i Excel på å få gjort enkle arbeidsoppgaver? Kommer det til stadighet prosent og dato i celler hvor du vil ha vanlige tall? Blir en formel ødelagt når du flytter den? Er det vanskelig å lage det diagrammet du ønsker? Blir ikke utskriftene dine slik du ønsker? Dette er vanlige problemstillinger mange sliter med og som blir borte etter endt kurs! På kun 2 dager vil du mestre de vanligste formler og funksjoner du trenger i din arbeidsdag. Du lærer gode rutiner og hurtigtastene du trenger for å kunne arbeide raskt og effektivt. Du vil kunne bygge alt fra enkle til mer avanserte modeller og vil føle deg trygg på at modellen din virker og gir rett resultat. Du vil også få en rekke tips og triks du kan bruke i din arbeidsdag.  Alt du lærer får du repetert gjennom aktiv oppgaveløsning slik at du husker det du har lært når du kommer tilbake på jobb. Kursdokumentasjon, lunsj og pausemat er selvsagt inkludert!   Kursholderne har mer enn 20 års Excel erfaring som de gjerne deler med deg!   Kurset passer for deg med liten erfaring og som ønsker å lære Excel fra grunnen av. Kurset passer også for deg som er selvlært og som ønsker å jobbe mer effektivt. Meld deg på Excel-kurs allerede i dag og sikre deg plass!   Krav til forkunnskaper Grunnleggende kunnskaper i Windows.   Kursinnhold Redigering Merking Sletting Angre muligheter Flytting og kopiering Innsetting og sletting Formler Bruk av formler Autofyll Cellereferanser Formatering Hva er formatering? Kolonnebredde og radhøyde Tallformatering Skriftformatering Justering av celleinnhold Kantlinjer og fyllfarger Betinget formatering Funksjoner Bruk av funksjoner Summering Minst, størst, antall og gjennomsnitt Hvis-funksjonen Betinget summering Diagram Utforming av diagram Diagramtyper Flere regneark Arbeid med regneark Innsetting og sletting av regneark Flytting og kopiering av regneark Referering til andre regneark Enkle formler på tvers av ark Vindus håndtering Lister og tabeller Sortering Tabeller Filtrering Deling og frysing av vindu   [-]
Les mer
Arne Rettedals Hus 1 dag 3 900 kr
22 Oct
Kurset er for deg som allerede kan bruke Microsoft Word, men som vil jobbe mer hensiktsmessig med tekstbehandling. [+]
Kurset er for deg som allerede kan bruke Microsoft Word, men som vil jobbe mer hensiktsmessig med tekstbehandling. På kurset vil vi vise deg hvordan du kan jobbe smart og effektivt når du lager dokumenter, slik at du sparer tid i din arbeidshverdag og samtidig ender opp med mer elegante og flotte dokumenter og rapporter. Mål for kursetEtter endt kurs skal du kunne bruke verktøyet på en smart og effektiv måte. ForkunnskaperNoe kjennskap til Word. MålgruppeDette kurset er for deg som vet litt om Word og som ønsker å lære effektiv bruk av verktøyet. UndervisningsformKlasseromsundervisning med maks 12 deltakere. Deltakere må ha med egen datamaskin med relevant programvare. Pris Klasseromsundervisning 6 timer: 3900 kroner inkludert lunsj.  Ansatte ved UiS har egne betalingsbetingelser.   Varighet1 dag fra 09:00 til 15:00 Emner Merketeknikker Navigering og snarveier Disposisjonsvisning Tekst eller tegnformatering Avsnittsformatering Side og inndelingsformatering Stiler – bruke, endre og definere Temaer Innholdsfortegnelse Kryssreferanser, noter Bilde SmartArt Forside Diagram – integrasjon med Excel Hurtigdeler Språkverktøy Topp og bunntekster i inndelinger Åpne et eldre dokument i Word Oppdatere/oppgradere et dokument Hva er .docx? Fletting i Word til word, epost, printer Sette utskriftsopsjoner Skrive ut utvalg og inndelinger [-]
Les mer