IT-kurs
Warwickshire
Du har valgt: Warwick
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Warwick ) i IT-kurs
 

Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Relationship Management, Supplier Management, Service Level Management, Continual Improvement and Info... [+]
Understand the key concepts of Relationship Management, Supplier Management, Service Level Management, Continual Improvement, and Information Security Management, elucidating their significance in fostering collaboration, ensuring service quality, driving continual improvement, and maintaining information security. This eLearning is: Interactive Self-paced   Device-friendly   12 hours content   Mobile-optimised   Practical exercises   Exam: 60 questions Multiple choise 90 minutes Closed book Minimum required score to pass: 65% [-]
Les mer
1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Incident Management, Service Desk, Service Request Management, Monitoring and Event Management and Pro... [+]
Understand the purpose and key concepts of the Monitor, Support, and Fulfil practices, elucidating their importance in maintaining, supporting, and delivering IT services effectively.InteractiveOur eLearning:Self-pacedDevice-friendly12 hour contentMobile-optimised Exam:60 questionsMultiple Choice90 minutesClosed bookMinimum required score to pass: 65%  [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Fi... [+]
COURSE OVERVIEW The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment TARGET AUDIENCE This course is aimed at Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff. COURSE OBJECTIVES After you complete this course, you will be able to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports COURSE CONTENT 1 - Palo Alto Networks Portfolio and Architecture 2 - Configuring Initial Firewall Settings 3 - Managing Firewall Configurations 4 - Managing Firewall Administrator Accounts 5 - Connecting the Firewall to Production Networks with Security Zones 6 - Creating and Managing Security Policy Rules 7 - Creating and Managing NAT Policy Rules 8 - Controlling Application Usage with App-ID 9 - Blocking Known Threats Using Security Profiles 10 - Blocking Inappropriate Web Traffic with URL Filtering 11 - Blocking Unknown Threats with Wildfire 12 - Controlling Access to Network Resources with User-ID 13 - Using Decryption to Block Threats in Encrypted Traffic 14 - Locating Valuable Information Using Logs and Reports 15 - What's Next in Your Training and Certification Journey Supplemental Materials Securing Endpoints with GlobalProtect Providing Firewall Redundancy with High Availability Connecting Remotes Sites using VPNs Blocking Common Attacks Using Zone Protection   FURTHER INFORMATION Level: Introductory Duration: 5 days Format: Lecture and hands-on labs Platform support: Palo Alto Networks next-generation firewalls running PAN-OS® operating system version 11.0     [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Hva menes med sikkerhet, hensikt med sikkerhet, tiltak som kan iverksettes for å oppnå tilsiktet sikkerhet, identifisering av inntrengere, passordsikkerhet, autentisering... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Gode IKT-kunnskaper og god kjennskap til drift av Windows server og prosesser i Windows operativsystem. Innleveringer: For å kunne gå opp til eksamen må 8 øvingsoppgaver være godkjent. Nærmere opplysninger gis ved kursstart Personlig veileder: ja Vurderingsform: Netteksamen på egen PC - 5 timer. Hver student skal bruke virtuelle maskiner under eksamen. Ansvarlig: Stein Meisingseth Eksamensdato: 10.12.13 / 13.05.14         Læremål: KUNNSKAPER: Kandidaten:- har innsikt i hvordan et nettverk kan sikres og hvordan man kan unngå at lokale maskiner, servere eller større nettverk kan bli hacket- kjenner til løsninger for å sikre små og store nettverk FERDIGHETER:Kandidaten:- kan forstå hensikten med å legge stor vekt på sikkerhet- skal kunne oppdage og identifisere inntrengere- skal kunne forhindre eksterne angrep- skal kunne forstå faren med interne angrep- skal kunne lage rutiner for gode passordrutiner, autentiseringssystemer og viruskontroll- forstår hvordan sikkerhet fungerer i Windows 7 og Windows 2008 server- bruker Group Policy til å sette tilpasset sikkerhet- skal kunne bruke og å konfigurere de interne brannmurer i Windows GENERELL KOMPETANSE:Kandidaten har:- perspektiv og kompetanse i å velge riktige løsninger for å oppnå maksimal og tilpasset sikkerhet- kompetanse i generelt sikkerhetsarbeid Innhold:Hva menes med sikkerhet, hensikt med sikkerhet, tiltak som kan iverksettes for å oppnå tilsiktet sikkerhet, identifisering av inntrengere, passordsikkerhet, autentiseringssystemer, viruskontroll, sikkerhet i Windows og 2008 servere, bruk av brannmuren til Windows server 2008, sette sikkerhet i Group Policy, brannvegger generelt, forhindre virus og inntrenging, tiltak for å forhindre angrep utenfra, digitale signaturer.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Datasikkerhet 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Oslo 5 dager 27 500 kr
25 Aug
15 Sep
15 Sep
MD-102 : Microsoft 365 Endpoint Administrator [+]
MD-102 : Microsoft 365 Endpoint Administrator [-]
Les mer
Nettkurs 1 time 549 kr
Adobe Bridge er et program som gjør det enkelt å importere og organisere digitale bilder. Programmet er en del av Creative Cloud-pakken som du kan abonnere på, og verktøy... [+]
Utforsk Adobe Bridge til fulle med kurset "Bridge: Komplett" ledet av Espen Faugstad hos Utdannet.no. Adobe Bridge er et kraftig verktøy for å importere, organisere og vise digitale bilder, og er en viktig del av Creative Cloud-pakken. Dette kurset er designet for alle som ønsker å lære Adobe Bridge fra grunnen av, og ingen forkunnskaper er nødvendig. Du vil lære hvordan du effektivt importerer og organiserer bilder, rangerer og presenterer dem. Kurset vil gi deg en dyp forståelse av hvordan forskjellige paneler i Bridge, som Content-panelet, Filter-panelet, Collections-panelet, og Metadata-panelet, fungerer i praksis. Gjennom kurset vil du få praktisk erfaring med å bruke Bridge for å forbedre din arbeidsflyt og bildehåndtering. Ved slutten av kurset vil du ha oppnådd en omfattende forståelse av Adobe Bridge, noe som gjør deg i stand til å bruke programmet effektivt, enten du jobber alene eller sammen med andre Adobe-programmer som Photoshop.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Grunnleggende Kapittel 3: Viderekommen Kapittel 4: Avslutning   Varighet: 1 time   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Oslo 3 dager 25 900 kr
24 Sep
24 Sep
Secure coding in C and C++ [+]
Secure coding in C and C++ [-]
Les mer
Oslo 2 dager 11 900 kr
24 Sep
24 Sep
Pivottabeller og rapportering i Excel [+]
Pivottabeller og rapportering i Excel [-]
Les mer
Virtuelt klasserom 4 dager 28 000 kr
TOGAF® V9.2 is the foremost generic framework in the field of Enterprise Architecture (EA). [+]
COURSE OVERVIEW TOGAF® V9.2  is the foremost generic framework in the field of Enterprise Architecture (EA). This course provides guidance on what to do to establish an architecture practice and how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support and sustain the transformation. This course will benefit: Practicing architects from complex organizations looking for a set of defined processes to help in the organization, governance and management of architecture teams and multiple architecture projects. Experienced architects looking for details on the elements of sound architectural process and practice. Senior managers, such as Project Managers and Service Managers, who wish to gain a full appreciation of architecture practice. Aspiring architects commencing their career wishing to obtain recognized EA certification. This TOGAF® accredited course examines how practitioners can base their activities on a set of well-defined processes. It examines the framework as a whole, including the numerous techniques to assist in organizing, governing and now in this version, describing, architecture. It incorporates recommendations on how to adapt the framework to deal with issues such as Security and Service-oriented Architecture. The course prepares participants to take the combined TOGAF® 9.2 Foundation and Certified exams (Level 1 & 2). During the course, delegates will be helped to prepare for this combined exam. This TOGAF® for Practitioners Level 1&2 course is being run by Global Knowledge and is accredited by The Open Group. For full details of the TOGAF® certification scheme, visit the following link: www.opengroup.org COURSE OBJECTIVES This workshop has been designed to enable participants to: Understand the basic concepts of enterprise architecture and TOGAF® Explain the features of TOGAF® and its methodology Implement TOGAF® in their work to maximum effect Develop an understanding of the necessary body of knowledge to achieve certification by examination for TOGAF® COURSE CONTENT Day 1 Introduction TOGAF® Basic / Core Concepts Introduction to the ADM Enterprise Continuum ADM Phases ADM Guidelines Architecture Governance Daily Wrap up / Q&A Day Two Architecture Views, Viewpoints, and Stakeholders Building Blocks ADM Deliverables TOGAF® Reference Models Preliminary Phase The Architecture Governance Framework Architecture Content Framework TOGAF® Content Metamodel Stakeholder Management Architecture Implementation Techniques Daily Wrap up / Q&A Day Three Phase A: Architecture Business Scenarios Technique Phase B: Business Architecture Phase C: Information Systems Architectures – Data Architecture Phase C: Information Systems Architectures – Application Architecture TOGAF®Foundation Architecture: Technical Reference Model Integrated Information Infrastructure Reference Model Phase D: Technology Architecture Daily Wrap up / Q&A Day Four Phase E: Opportunities and Solutions Migration Planning Techniques Phase F: Migration Planning Phase G: Implementation Governance Phase H: Architecture Change Management ADM Requirements Management Architecture Partitioning Guidelines for Adapting the ADM: Iteration and Levels Guidelines for Adapting the ADM: Security Guidelines for Adapting the ADM: SOA Architecture Maturity Models Architecture Skills Framework Daily Wrap up / Q&A TEST CERTIFICATION Once you have completed the course and are ready to book your exam at a Test Centre, please contact Global Knowledge and we will email your exam voucher code so that you can redeem it.  Exams can also be sat online https://www.opengroup.org/certifications/online-proctored-exams Achieving this level of Certification also qualifies delegates to take the BCS Practitioner Certificate in Enterprise and Solution Architecture without the need for the BCS Intermediate Certificate. [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microso... [+]
 In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. Global Knowledge will introduce you to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths. COURSE OBJECTIVES By actively participating in this course, you will learn about the following: Microsoft 365 Security Metrics Microsoft 365 Security Services Microsoft 365 Threat Intelligence Data Governance in Microsoft 365 Archiving and Retention in Office 365 Data Governance in Microsoft 365 Intelligence Search and Investigations Device Management Windows 10 Deployment Strategies Mobile Device Management COURSE CONTENT Module 1: Introduction to Microsoft 365 Security Metrics Threat Vectors and Data Breaches Security Solutions in Microsoft 365 Introduction to the Secure Score Introduction to Azure Active Directory Identity Protection Module 2: Managing Your Microsoft 365 Security Services Introduction to Exchange Online Protection Introduction to Advanced Threat Protection Managing Safe Attachments Managing Safe Links Monitoring and Reports Module 3: Lab 1 - Manage Microsoft 365 Security Services Exercise 1 - Set up a Microsoft 365 Trial Tenant Exercise 2 - Implement an ATP Safe Links policy and Safe Attachment policy Module 4: Microsoft 365 Threat Intelligence Overview of Microsoft 365 Threat Intelligence Using the Security Dashboard Configuring Advanced Threat Analytics Implementing Your Cloud Application Security Module 5: Lab 2 - Implement Alert Notifications Using the Security Dashboard Exercise 1 - Prepare for implementing Alert Policies Exercise 2 - Implement Security Alert Notifications Exercise 3 - Implement Group Alerts Exercise 4 - Implement eDiscovery Alerts Module 6: Introduction to Data Governance in Microsoft 365 Introduction to Archiving in Microsoft 365 Introduction to Retention in Microsoft 365 Introduction to Information Rights Management Introduction to Secure Multipurpose Internet Mail Extension Introduction to Office 365 Message Encryption Introduction to Data Loss Prevention Module 7: Archiving and Retention in Office 365 In-Place Records Management in SharePoint Archiving and Retention in Exchange Retention Policies in the SCC Module 8: Lab 3 - Implement Archiving and Retention Exercise 1 - Initialize Compliance in Your Organization Exercise 2 - Configure Retention Tags and Policies Exercise 3 - Implement Retention Policies Module 9: Implementing Data Governance in Microsoft 365 Intelligence Planning Your Security and Complaince Needs Building Ethical Walls in Exchange Online Creating a Simple DLP Policy from a Built-in Template Creating a Custom DLP Policy Creating a DLP Policy to Protect Documents Working with Policy Tips Module 10: Lab 4 - Implement DLP Policies Exercise 1 - Manage DLP Policies Exercise 2 - Test MRM and DLP Policies Module 11: Managing Data Governance in Microsoft 365 Managing Retention in Email Troubleshooting Data Governance Implementing Azure Information Protection Implementing Advanced Features of AIP Implementing Windows Information Protection Module 12: Lab 5 - Implement AIP and WIP Exercise 1 - Implement Azure Information Protection Exercise 2 - Implement Windows Information Protection Module 13: Managing Search and Investigations Searching for Content in the Security and Compliance Center Auditing Log Investigations Managing Advanced eDiscovery Module 14: Lab 6 - Manage Search and Investigations Exercise 1 - Investigate Your Microsoft 365 Data Exercise 2 - Configure and Deploy a Data Subject Request Module 15: Planning for Device Management Introduction to Co-management Preparing Your Windows 10 Devices for Co-management Transitioning from Configuration Manager to Intune Introduction to Microsoft Store for Business Planning for Mobile Application Management Module 16: Lab 7 - Implement the Microsoft Store for Business Exercise 1 - Configure the Microsoft Store for Business Exercise 2 - Manage the Microsoft Store for Business Module 17: Planning Your Windows 10 Deployment Strategy Windows 10 Deployment Scenarios Implementing Windows Autopilot Planning Your Windows 10 Subscription Activation Strategy Resolving Windows 10 Upgrade Errors Introduction to Windows Analytics Module 18: Implementing Mobile Device Management Planning Mobile Device Management Deploying Mobile Device Management Enrolling Devices to MDM Managing Device Compliance Module 19: Lab 8 - Manage Devices with Intune Exercise 1 - Enable Device Management Exercise 2 - Configure Azure AD for Intune Exercise 3 - Create Intune Policies Exercise 4 - Enroll a Windows 10 Device Exercise 5 - Manage and Monitor a Device in Intune TEST CERTIFICATION This course helps you to prepare for exam MS101. [-]
Les mer
Oslo 5 dager 27 900 kr
20 Oct
20 Oct
GDPR - Certified Data Protection Officer [+]
GDPR - Certified Data Protection Officer [-]
Les mer
Majorstuen 2 dager 10 900 kr
03 Nov
Med Microsoft Project 365 får du et godt verktøy for planlegging og oppfølging av prosjekter. Dette kurset lærer deg å håndtere ressurser, aktiviteter og budsjett. Du kan... [+]
Kursinstruktør Geir Johan Gylseth Geir Johan Gylseth er utdannet ved Universitetet i Oslo med hovedvekt på Informatikk og har over 30 års erfaring som instruktør. Geir sin styrke ligger innenfor MS Office. Han har lang erfaring med skreddersøm av kurs, kursmanualer og oppgaver. Geir er en entusiastisk og dyktig instruktør som får meget gode evalueringer. Kursinnhold Med Microsoft Project 365 får du et godt verktøy for planlegging og oppfølging av prosjekter. Dette kurset lærer deg å håndtere ressurser, aktiviteter og budsjett. Du kan opprette, oppdatere og gjøre enkel oppfølging i et prosjekt. Vi går igjennom hvordan du, både grafisk og i tekst, ser effekten av forandringer i prosjekt og hvordan du kan skrive ut dine prosjektplaner. Målet med kurset er å gi deg en prossessorientert tilnærming i Microsoft Project 365 slik at du er i stand til å arbeide målrettet og effektivt med programvaren etter kurset.   Sett opp Project for bruk i din bedrift – tips og triks. Lag egne kalendere for enkeltpersoner og/eller grupper. Hold oversikt over tids- og ressursbruk. Vit hvem som jobber hvor – på tvers av prosjekter. Kontroller kostnadene i prosjektet. Ta hensyn til lønnsøkninger og variable kostnader. Vis og kontroller hvordan prosjektet går i forhold til opprinnelig plan (Baseline). Presenter fremdrift på papir og på nett. Utnytt de nye rapportmulighetene. Ta hensyn til at arbeid noen ganger foregår på kvelden og i helger. Se hvordan du kan få vakre utskrifter med egendefinerte komponenter ved hjelp av Project sine rapportegenskaper. Lag dine egne tabeller og visninger, skreddersydd til ditt bruk. Gjør rapportering og oppfølging enkel slik at du kan konsentrere deg om å lede prosjektet. Bruk tidslinje for enkelkommunikasjon av fremdrift. Kommunikasjon med andre programmer.   I tillegg får du en rekke tips og triks du kan bruke i din arbeidsdag.  Alt du lærer får du repetert gjennom aktivoppgaveløsning slik at du husker det du har lært når du kommer tilbake på jobb. Kursdokumentasjon, lunsj og pausemat er selvsagt inkludert! NB: Ta med egen PC     Av innhold kan vi nevne: - Innstilling av programvaren – en reprise fra grunnkurset - Hva vil jeg ha ut av mine planer og hvordan får jeg det - Effektiv og målrettet planlegging - Bruk av ressurspool – Ressursstyring på tvers av prosjekter - Integrasjon og kobling mot Excel i rapportering og kostnadsoppfølging - En grundig gjennomgang av mulighetene i Project - Bygg dine egne rapporter og visninger - Bruk av flere kalendere - Detaljert budsjettering og kostnadsoppfølging - Få hjelp og råd med dine konkrete utfordringer i Project    Meld deg på Project-kurs allerede i dag og sikre deg plass!   "Kurset var svært konkret, nyttig med tanke på mine daglige oppgaver."Henning Colbjørnsen- Rælingen kommune   [-]
Les mer
Virtuelt eller personlig Bergen 3 uker 28 000 kr
28 Oct
3-ukers AutoCAD kurs inneholder 2D Grunnkurs, 2D Videregående kurs og 3D Introduksjonskurs. I tillegg gjennomføres oppgaver og prosjektarbeid på egen kurs-PC. [+]
Kurset består av tre AutoCAD kursmoduler - 2D Grunnkurs og 2D Videregående, samt introduksjon til 3D modellering. Kurset gir deltakeren meget god kunnskap om AutoCAD, samt erfaring med utarbeidelse og oppbygging av tegninger. Mange av våre deltakerere har gjennomført kurset for å benytte dette på en CV ved søknad på ny jobb.   Følgende kursmoduler gjennomføres i dette kurset:  AutoCAD 2D Grunnkurs Hovedprinsipper i AutoCAD's brukergrensesnitt Oppretting og lagring av tegninger Tegne- og editeringskommandoer Hjelpefunksjoner for å tegne nøyaktig Skjermstyring Lagoppbygging og struktur Målsetting, teksting og skravering Symbol- og blokkhåndtering Layout/plotting AutoCAD 2D Videregående kurs Tilpasse AutoCAD til eget brukermiljø Blokker med attributter og uttrekk til tabell/Excel Tabeller og Fields XREF - eksterne referanser Import og håndtering av PDF filer Innsetting av andre filformater som eks. DWF, raster filer og DGN Definering og bruk av annotative objekter ved målsetting og teksting. Avansert plotting Funksjoner i Express Tools AutoCAD 3D introduksjonskurs Koordinatsystemer Angivelse av punkter i rommet Solid modellering Surface modellering Mesh modellering Sette opp Layout i paperspace, projeksjoner og snitt Lagstruktur og lagdefinisjon, farger, linjetyper, målsetting Lyssetting, naturlig sollys og lokale lyskilder Knytte materialer til objekt eller til lag Renderfunksjoner Animasjon   Oppgaver Oppgaver knyttet til kurset, samt tilleggsoppgaver ift. fag.   Prosjektoppgaver Prosjektoppgaver knyttet til 2D tegning og 3D modellering.     [-]
Les mer