IT-kurs
Kurs i programvare og applikasjoner
Hedmark
Du har valgt: Hamar
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Hamar ) i Kurs i programvare og applikasjoner
 

1 dag 9 500 kr
19 Sep
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Virtuelt klasserom 4 dager 30 000 kr
29 Sep
In this course, the student will learn about the data engineering patterns and practices as it pertains to working with batch and real-time analytical solutions using Azu... [+]
The students will learn how to interactively explore data stored in files in a data lake. They will learn the various ingestion techniques that can be used to load data using the Apache Spark capability found in Azure Synapse Analytics or Azure Databricks, or how to ingest using Azure Data Factory or Azure Synapse pipelines. The students will also learn the various ways they can transform the data using the same technologies that is used to ingest data. The student will spend time on the course learning how to monitor and analyze the performance of analytical system so that they can optimize the performance of data loads, or queries that are issued against the systems. They will understand the importance of implementing security to ensure that the data is protected at rest or in transit. The student will then show how the data in an analytical system can be used to create dashboards, or build predictive models in Azure Synapse Analytics. After completing this course, students will be able to: Explore compute and storage options for data engineering workloads in Azure Design and Implement the serving layer Understand data engineering considerations Run interactive queries using serverless SQL pools Explore, transform, and load data into the Data Warehouse using Apache Spark Perform data Exploration and Transformation in Azure Databricks Ingest and load Data into the Data Warehouse Transform Data with Azure Data Factory or Azure Synapse Pipelines Integrate Data from Notebooks with Azure Data Factory or Azure Synapse Pipelines Optimize Query Performance with Dedicated SQL Pools in Azure Synapse Analyze and Optimize Data Warehouse Storage Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link Perform end-to-end security with Azure Synapse Analytics Perform real-time Stream Processing with Stream Analytics Create a Stream Processing Solution with Event Hubs and Azure Databricks Build reports using Power BI integration with Azure Synpase Analytics Perform Integrated Machine Learning Processes in Azure Synapse Analytics Course prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions.Recommended prerequisites:M-DP900 - Microsoft Azure Data FundamentalsM-AZ900 - Microsoft Azure Fundamentals Agenda Module 1: Explore compute and storage options for data engineering workloads This module provides an overview of the Azure compute and storage technology options that are available to data engineers building analytical workloads. This module teaches ways to structure the data lake, and to optimize the files for exploration, streaming, and batch workloads. The student will learn how to organize the data lake into levels of data refinement as they transform files through batch and stream processing. Then they will learn how to create indexes on their datasets, such as CSV, JSON, and Parquet files, and use them for potential query and workload acceleration. Module 2: Design and implement the serving layer This module teaches how to design and implement data stores in a modern data warehouse to optimize analytical workloads. The student will learn how to design a multidimensional schema to store fact and dimension data. Then the student will learn how to populate slowly changing dimensions through incremental data loading from Azure Data Factory. Module 3: Data engineering considerations for source files This module explores data engineering considerations that are common when loading data into a modern data warehouse analytical from files stored in an Azure Data Lake, and understanding the security consideration associated with storing files stored in the data lake. Module 4: Run interactive queries using Azure Synapse Analytics serverless SQL pools In this module, students will learn how to work with files stored in the data lake and external file sources, through T-SQL statements executed by a serverless SQL pool in Azure Synapse Analytics. Students will query Parquet files stored in a data lake, as well as CSV files stored in an external data store. Next, they will create Azure Active Directory security groups and enforce access to files in the data lake through Role-Based Access Control (RBAC) and Access Control Lists (ACLs). Module 5: Explore, transform, and load data into the Data Warehouse using Apache Spark This module teaches how to explore data stored in a data lake, transform the data, and load data into a relational data store. The student will explore Parquet and JSON files and use techniques to query and transform JSON files with hierarchical structures. Then the student will use Apache Spark to load data into the data warehouse and join Parquet data in the data lake with data in the dedicated SQL pool. Module 6: Data exploration and transformation in Azure Databricks This module teaches how to use various Apache Spark DataFrame methods to explore and transform data in Azure Databricks. The student will learn how to perform standard DataFrame methods to explore and transform data. They will also learn how to perform more advanced tasks, such as removing duplicate data, manipulate date/time values, rename columns, and aggregate data. Module 7: Ingest and load data into the data warehouse This module teaches students how to ingest data into the data warehouse through T-SQL scripts and Synapse Analytics integration pipelines. The student will learn how to load data into Synapse dedicated SQL pools with PolyBase and COPY using T-SQL. The student will also learn how to use workload management along with a Copy activity in a Azure Synapse pipeline for petabyte-scale data ingestion. Module 8: Transform data with Azure Data Factory or Azure Synapse Pipelines This module teaches students how to build data integration pipelines to ingest from multiple data sources, transform data using mapping data flowss, and perform data movement into one or more data sinks. Module 9: Orchestrate data movement and transformation in Azure Synapse Pipelines In this module, you will learn how to create linked services, and orchestrate data movement and transformation using notebooks in Azure Synapse Pipelines. Module 10: Optimize query performance with dedicated SQL pools in Azure Synapse In this module, students will learn strategies to optimize data storage and processing when using dedicated SQL pools in Azure Synapse Analytics. The student will know how to use developer features, such as windowing and HyperLogLog functions, use data loading best practices, and optimize and improve query performance. Module 11: Analyze and Optimize Data Warehouse Storage In this module, students will learn how to analyze then optimize the data storage of the Azure Synapse dedicated SQL pools. The student will know techniques to understand table space usage and column store storage details. Next the student will know how to compare storage requirements between identical tables that use different data types. Finally, the student will observe the impact materialized views have when executed in place of complex queries and learn how to avoid extensive logging by optimizing delete operations. Module 12: Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link In this module, students will learn how Azure Synapse Link enables seamless connectivity of an Azure Cosmos DB account to a Synapse workspace. The student will understand how to enable and configure Synapse link, then how to query the Azure Cosmos DB analytical store using Apache Spark and SQL serverless. Module 13: End-to-end security with Azure Synapse Analytics In this module, students will learn how to secure a Synapse Analytics workspace and its supporting infrastructure. The student will observe the SQL Active Directory Admin, manage IP firewall rules, manage secrets with Azure Key Vault and access those secrets through a Key Vault linked service and pipeline activities. The student will understand how to implement column-level security, row-level security, and dynamic data masking when using dedicated SQL pools. Module 14: Real-time Stream Processing with Stream Analytics In this module, students will learn how to process streaming data with Azure Stream Analytics. The student will ingest vehicle telemetry data into Event Hubs, then process that data in real time, using various windowing functions in Azure Stream Analytics. They will output the data to Azure Synapse Analytics. Finally, the student will learn how to scale the Stream Analytics job to increase throughput. Module 15: Create a Stream Processing Solution with Event Hubs and Azure Databricks In this module, students will learn how to ingest and process streaming data at scale with Event Hubs and Spark Structured Streaming in Azure Databricks. The student will learn the key features and uses of Structured Streaming. The student will implement sliding windows to aggregate over chunks of data and apply watermarking to remove stale data. Finally, the student will connect to Event Hubs to read and write streams. Module 16: Build reports using Power BI integration with Azure Synapase Analytics In this module, the student will learn how to integrate Power BI with their Synapse workspace to build reports in Power BI. The student will create a new data source and Power BI report in Synapse Studio. Then the student will learn how to improve query performance with materialized views and result-set caching. Finally, the student will explore the data lake with serverless SQL pools and create visualizations against that data in Power BI. Module 17: Perform Integrated Machine Learning Processes in Azure Synapse Analytics This module explores the integrated, end-to-end Azure Machine Learning and Azure Cognitive Services experience in Azure Synapse Analytics. You will learn how to connect an Azure Synapse Analytics workspace to an Azure Machine Learning workspace using a Linked Service and then trigger an Automated ML experiment that uses data from a Spark table. You will also learn how to use trained models from Azure Machine Learning or Azure Cognitive Services to enrich data in a SQL pool table and then serve prediction results using Power BI. [-]
Les mer
Virtuelt eller personlig 3 dager 12 480 kr
Kurset MagiCAD VVS for AutoCAD gir en gjennomgang av prosjektering av ventilasjon- og rørinstallasjoner i MagiCAD og AutoCAD. [+]
Fleksible kurs for fremtiden Ny kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   MagiCAD VVS for AutoCAD grunnkurs Her er et utvalg av temaene du vil lære på kurset: Etablering av prosjekt Prosjektering av ventilasjonsanlegg, varmeanlegg, og sanitæranlegg Sammenkobling av systemer gjennom flere tegninger Tekstefunksjoner, snitt, tegninger til utskrift Beregninger, utbalansering, lyd, mengdeberegning Bruk av leverandørspesifike produkter Kollisjonskontroll Automatisk generering av utsparinger Deltakerne skal lære å håndtere tegninger i et prosjekt; arkitekt, VVS-tegninger etc. De skal lære å berike en VVS-modell slik at mest mulig informasjon kan nyttes med hensyn til BIM, 2D-tegninger, strømningstekniske beregninger og lydberegninger. Tilpassete kurs for bedrifter Vi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
The Implementing and Operating Cisco Enterprise Network Core Technologies course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterpri... [+]
COURSE OVERVIEW  Learn how to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. The automation and programmability of Enterprise networks is also incorporated in this course. This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 CE credits toward recertification   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 3 days of self study. The self-study content will be provided as part of the digital courseware that you receive at the beginning of the course and should be part of your preparation for the exam. Additional lab access will be provided at the end of the class, this will be valid for 60 hours or 90 days whichever is the shorter. It will be possible to complete all but 7 of the labs after the class. TARGET AUDIENCE Network engineers involved in the installation, support and troubleshooting of enterprise networks. COURSE OBJECTIVES After completing this course you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using EtherChannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Centre™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Centre and vManage COURSE CONTENT Examining Cisco Enterprise Network Architecture Cisco Enterprise Architecture Model Campus LAN Design Fundamentals Traditional Multilayer Campus Layer Design Campus Distribution Layer Design   Understanding Cisco Switching Paths Layer 2 Switch Operation Control and Data Plane Cisco Switching Mechanisms Implementing Campus LAN Connectivity Revisiting VLANs Trunking with 802.1Q Inter-VLAN Routing Building Redundant Switched Topology Spanning-Tree Protocol Overview Spanning-Tree Protocol Operation Spanning-Tree Protocols Types and Features Multiple Spanning Tree Protocol PortFast and BPDU Implementing Layer 2 Port Aggregation (Self-Study) Need for EtherChannel EtherChannel Mode Interactions Layer 2 EtherChannel Configuration Guidelines EtherChannel Load-Balancing Options Troubleshoot EtherChannel Issues Understanding EIGRP EIGRP Features EIGRP Reliable Transport Establishing EIGRP Neighbour Adjacency EIGRP Metrics EIGRP Path Selection Explore EIGRP Path Selection Explore EIGRP Load Balancing and Sharing EIGRP for IPv6 Compare EIGRP and OSPF Routing Protocols Implementing OSPF Describe OSPF The OSPF Process OSPF Neighbour Adjacencies Building a Link-State Database OSPF LSA Types Compare Single-Area and Multi-Area OSPF OSPF Area Structure OSPF Network Types Optimizing OSPF OSPF Cost OSPF Route Summarization Benefits OSPF Route Filtering Tools Compare OSPFv2 and OSPFv3 Exploring EBGP Interdomain Routing with BGP BGP Operations Types of BGP Neighbour Relationships BGP Path Selection BGP Path Attributes Implementing Network Redundancy Need for Default Gateway Redundancy Define FHRP HSRP Advanced Features Cisco Switch High Availability Features Implementing NAT Define Network Address Translation NAT Address Types Explore NAT Implementations NAT Virtual Interface Introducing Virtualisation Protocols and Techniques Server Virtualisation Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Introducing Virtualisation Protocols and Techniques Server Virualization Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Understanding Virtual Private Networks and Interfaces Site-to-Site VPN Technologies IPSec VPN Overview IPSec: IKE IPsec Modes IPsec VPN Types Cisco IOS VTI Understanding Wireless Principles Explain RF Principles Describe Watts and Decibels Describe Antenna Characteristics Describe IEEE Wireless Standards Identify Wireless Component Roles Examining Wireless Deployment Options Wireless Deployment Overview Describe Autonomous AP Deployment Describe Centralized Cisco WLC Deployment Describe FlexConnect Deployment Cloud Deployment and Its Effect on Enterprise Networks Describe the Cloud-Managed Meraki Solution Cisco Catalyst 9800 Series Controller Deployment Options Describe Cisco Mobility Express Understanding Wireless Roaming and Location Services Wireless Roaming Overview Mobility Groups and Domains Wireless Roaming Types Describe Location Services Examining Wireless AP Operation Universal AP Priming Explore the Controller Discovery Process Describe AP Failover Explain High Availability Explore AP Modes Understanding Wireless Client Authentication Authentication Methods Pre-Shared Key (PSK) Authentication 802.1X User Authentication Overview PKI and 802.1X Certificate Based Authentication Introduction to Extensible Authentication Protocol EAP-Transport Layer Security (EAP-TLS) Protected Extensible Authentication Protocol EAP-FAST Guest Access with Web Auth Troubleshooting Wireless Client Connectivity Wireless Troubleshooting Tools Overview Spectrum Analysis Wi-Fi Scanning Packet Analysis Cisco AireOS GUI and CLI Tools Cisco Wireless Config Analyzer Express Common Wireless Client Connectivity Issues Overview Client to AP Connectivity WLAN Configuration Infrastructure Configuration Introducing Multicast Protocols (Self-study) Multicast Overview Internet Group Management Protocol Multicast Distribution Trees IP Multicasting Routing Rendezvous Point Introducing QoS (Self-study) Understand the Impact of User Applications on the Network Need for Quality of Service (QoS) Describe QoS Mechanisms Define and Interpret a QoS Policy Implementing Network Services Understanding Network Time Protocol Logging Services Simple Network Management Protocol Introducing NetFlow Flexible NetFlow Understanding Cisco IOS Embedded Event Manager Using Network Analysis Tools Troubleshooting Concepts Network Troubleshooting Procedures: Overview Network Troubleshooting Procedures: Case Study Basic Hardware Diagnostics Filtered Show Commands Cisco IOS IP SLAs Switched Port Analyzer(SPAN) Overview Remote SPAN (RSPAN) Encapsulated Remote Switched Port Analyzer(ERSAPN) Cisco Packet Capture Tools Overview Implementing Infrastructure Security ACL Overview ACL Wildcard Masking Types of ACLs Configure Numbered Access Lists Use ACLs to Filter Network Traffic Apply ACLs to Interfaces Configured Named Access Lists Control Plane Overview Control Plane Policing Implementing Secure Access Control Securing Device Access AAA Framework Overview Benefits of AAA Usage Authentication Options RADIUS and TACACS+ Enabling AAA and Configuring a Local User for Fallback Configuring RADIUS for Console and VTY Access Configuring TACACS+ for Console and VTY Access Configure Authorization and Accounting Understanding Enterprise Network Security Architecture (Self-study) Explore Threatscape Cisco Intrusion Prevention Systems Virtual Private Networks Content Security Logging Endpoint Security Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Firewall Concepts TrustSec MACsec Identity Management 802.1X for Wired and Wireless Endpoint Authentication MAC Authentication Bypass Web Authentication Exploring Automation and Assurance Using Cisco DNA Centre (Self-study) Need for Digital Transformation Cisco Digital Network Architecture Cisco Intent-Based Networking Cisco DNA Centre Automation Overview Cisco DNA Centre Platform Overview Cisco DNA Centre Design Cisco DNA Centre Inventory Overview Cisco DNA Centre Configuration and Management Overview Onboarding of Network Devices Using Cisco DNA Centre Cisco DNA Centre Software Image Management Overview Cisco DNA Assurance Key Features and Use Cases Cisco DNA Centre Assurance Implementation Workflow Examining the Cisco SD-Access Solution (Self-study) Need for Cisco SD-Access Cisco SD Access Overview Cisco SD-Access Fabric Components Cisco SD-Access Fabric Control Plane Based on LISP Cisco SD-Access Fabric Control Plane Based on VXLAN Cisco SD-Access Fabric Control Plane Based on Cisco TrustSec Role of Cisco ISE and Cisco DNA Centre in SD-Access Cisco SD-Access Wireless Integration Traditional Campus Interoperating with Cisco SD-Access Understanding the Working Principles of the Cisco SD-WAN Solution (Self-study) Need for Software Defined Networking for WAN Cisco SD-WAN Components and Functions Cisco SD-WAN Orchestration Plane Cisco SD-WAN Management Plane- vManage Cisco SD-WAN Control Plane - vSmart Cisco SD-WAN Data Plane - WAN Edge Cisco SD-WAN Programmatic APIs Cisco SD-WAN Automation and Analytics Cisco SD-WAN Terminology Cisco IOS XE and IOS XE SD-WAN Software Flexible Controller Deployment Options Cisco SD-WAN Security Understanding the Basics of Python Programming Describe Python Concepts String Data Types Numbers Data Types Boolean Data Types Script Writing and Execution Analyse Code Introducing Network Programmability Protocols Configuration Management Evolution of Device Management and Programmability Data Encoding Formats Understanding JSON Model Driven Programmability Stack Introduction to YANG Types of YANG Models Understanding NETCONF Explain NETCONF and YANG REST Understanding RESTCONF Protocol Introducing APIs in Cisco DNA Centre and vManage (Self-study) Application Programming Interfaces REST API Response Codes and Results REST API Security Cisco DNA Centre APIs Cisco SD-WAN REST API Overview Labs Lab 1: Investigate the CAM Lab 2: Analyse Cisco Express Forwarding Lab 3: Troubleshoot VLAN and Trunk Issues Lab 4: Tuning STP and Configuring RSTP Lab 5: Configure Multiple Spanning Tree Protocol Lab 6: Troubleshoot EtherChannel Lab 7: Implementing Multiarea OSPF Lab 8: Implement OSPF Tuning Lab 9: Apply OSPF Optimization Lab 10: Implement OSPFv3 Lab 11: Configure and Verify Single-Homed EBGP Lab 12: Implementing HSRP Lab 13: Configure VRRP Lab 14: Implement NAT Lab 15: Configure and Verify VRF Lab 16: Configure and Verify a GRE Tunnel Lab 17: Configure Static VTI Point-to-Point Tunnels Lab 18: Configure Wireless Client Authentication in a Centralized Deployment (No Extended Access) Lab 19: Troubleshoot Wireless Client Connectivity Issues (No Extended Access) Lab 20: Configure Syslog Lab 21: Configure and Verify Flexible NetFlow Lab 22: Configuring Cisco IOS Embedded Event Manager (EEM) Lab 23: Troubleshoot Connectivity and Analyse Traffic with Ping, Traceroute and Debug Lab 24: Configure and Verify Cisco IP SLA's Lab 25: Configure Standard and Extended ACLs Lab 26: Configure Control Plane Policing Lab 27: Implement Local and Server-Based AAA (No Extended Access) Lab 28: Writing and Troubleshooting Python Scripts (No Extended Access) Lab 29: Explore JSON Objects and Scripts in Python (No Extended Access) Lab 30: Use NETCONF via SSH (No Extended Access) Lab 31: Use RESTCONF with Cisco IOS XE Software (No Extended Access) [-]
Les mer
Virtuelt klasserom 1 dag 4 200 kr
Kurset gir en innføring i hvordan man kan lage flotte presentasjoner som kommuniserer med mottakeren. Kurset legger vekt på målet med presentasjonen, utformingen og le... [+]
Kursinstruktør   Geir Johan Gylseth Geir Johan Gylseth er utdannet ved Universitetet i Oslo med hovedvekt på Informatikk og har over 30 års erfaring som instruktør. Geir sin styrke ligger innenfor MS Office. Han har lang erfaring med skreddersøm av kurs, kursmanualer og oppgaver. Geir er en entusiastisk og dyktig instruktør som får meget gode evalueringer. Kursinstruktør   Jonny Austad Jonny Austad er utdannet som Adjunkt og har jobbet som lærer og instruktør siden 1989. Han har dessuten jobbet mye med support og drifting av nettverk og vet som oftest hva som er vanlige problemer ute i bedriftene. Han var den første Datakort-læreren i landet (høsten 1997), og har Office-pakken med spesielt Excel som sitt hjertebarn. Jonny er en meget hyggelig og utadvendt person som elsker å undervise med smarte løsninger på problemer samt vise smarte tips og triks i de ulike programmene. Kursinnhold Bruker du mye tid i PowerPoint på å få gjort enkle arbeidsoppgaver? Er det vanskelig å velge riktige farger og bakgrunner? Ønsker du å få fremhevet budskapet ditt men vet ikke hvordan? Er det vanskelig å lage diagrammer og tabeller? Drukner budskapet ditt i animasjoner og overgangseffekter? Bekymrer du deg for det tekniske når du skal holde en presentasjon? Dette er vanlige problemstillinger mange sliter med og som blir borte etter endt kurs! Kurset passer for deg med liten erfaring og som ønsker å lære PowerPoint fra grunnen av. Kurset passer også for deg som er selvlært og som ønsker å jobbe mer effektivt. På kun 1 dag vil du mestre de vanligste arbeidsoppgavene i PowerPoint. Du lærer gode rutinerog hurtigtastene du trenger for å kunne arbeide raskt og effektivt. Du vil kunne lage alt fra enkle til mer avansertepresentasjoner og vil føle deg trygg på at det er du som kontrollerer PowerPoint og ikke omvendt! Du lærer også hvordan du skal bruke PowerPoint når du skal holde en presentasjon. I tillegg får du en rekke tips og triks du kan bruke i din arbeidsdag.  Alt du lærer får du repetert gjennom aktiv oppgaveløsning slik at du husker det du har lært når du kommer tilbake på jobb. Kursdokumentasjon, lunsj og pausemat er selvsagt inkludert! Kursholderne har mer enn 20 års PowerPoint erfaring som de gjerne deler med deg! Meld deg på PowerPoint-kurs allerede i dag og sikre deg plass! Bli kjent med PowerPoint: Oppstart Åpning Visninger Navigering Lagring og lukking Utforming:Utformingsprosessen Nye presentasjoner Nye lysbilder TemaTekst: Bruk av tekst i presentasjoner Innskriving og redigering Maler Punktlister og nummererte lister Angremuligheter Topptekst og bunntekst Bilder og objekter: Bruk av bilder Utklipp Bilder fra fil Import av objekter Tegning: Koblingslinjer Formatering av objekter WordArt SmartArt Diagram: Utforming av diagram Diagramtyper Organisasjonskart: Utforming av organisasjonskart Formatering av organisasjonskart Tabeller:Utforming av tabeller Merking Innsetting og sletting Rad/høyde og kolonnebredde Formatering av tabeller Utskrift: Utskriftsformat Forhåndsvisning og utskrift Eksport av lysbilder til Word Lysbildeframvisning: Animasjoner Lysbildesortering Overgangseffekter Lysbildeframvisning Framvisning uavhengig av PowerPoint     [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
The Implementing Cisco Enterprise Wireless Networks course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any relate... [+]
COURSE OVERVIEW You’ll learn how to implement and secure a wireless network infrastructure and use Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.   The course provides hands-on labs to reinforce concepts including deploying Cisco Prime Infrastructure Release 3.5, Cisco Catalyst 9800 Wireless Controller Release IOS XE Gibraltar 16.10, Cisco Digital Network Architecture (DNA) Center Release 1.2.8, Cisco CMX Release 10.5, Cisco MSE Release 8.0 features and Cisco Identity Services Engine (ISE) Release 2.4.   This course also helps you prepare to take the Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) exam, which is part of the new CCNP Enterprise certification. Passing the exam will also provide you with the Cisco Certified Specialist - Enterprise Wireless Implementation certification.   TARGET AUDIENCE Individuals needing to understand how to implement, secure and troubleshoot a Cisco Enterprise Wireless Network.   COURSE OBJECTIVES After completing this course you should be able to: Implement network settings to provide a secure wireless network infrastructure Troubleshoot security issues as it relates to the wireless network infrastructure Implement a secure wireless client and troubleshoot wireless client connectivity issues Implement and troubleshoot QoS in wireless networks Implement and troubleshoot advanced capabilities in wireless network services   COURSE CONTENT Securing and Troubleshooting the Wireless Network Infrastructure Implement Secure Access to the WLCs and Access Points Configure the Network for Access Point 802.1X Authentication Use Cisco DNA Center for Controller and AP Auto Install Implement Cisco Prime Infrastructure Define Network Troubleshooting Techniques Troubleshoot Access Point Join Issues Monitor the Wireless Network Implementing and Troubleshooting Secure Client Connectivity Configure the Cisco WLC for Wireless Client 802.1x Authentication Configure the Wireless Client for 802.1X Authentication Configure a Wireless LAN for FlexConnect Implement Guest Services in the Wireless Network Configure the Cisco WLC for Centralized Web Authentication Configure Central Web Authentication on Cisco ISE Implement BYOD Implement Location-Aware Guest Services Troubleshoot Client Connectivity Describe Issues that Affect Client Performance Monitor Wireless Clients Implementing and Troubleshooting QoS in Wireless Networks Implement QoS in the Wireless Network Configure the Cisco WLC to Support Voice Traffic Optimize Wireless Utilization on the Cisco WLC Implement Cisco AVC in the Wireless Network Implement Multicast Services Implement mDNS Service Implement Cisco Media Stream Troubleshoot QoS Issues in the Wireless Network Troublehoot mDNS Issues Troubleshoot Media Stream Issues Implementing and Troubleshooting Advanced Wireless Network Services Implement Base Location Services on Cisco Prime Infrastructure Implement Hyperlocation in the Wireless Network Implement Detect and Locate Services on Cisco CMX Implement Analytics on Cisco CMX Implement Presence Services on Cisco CMX Monitor and Locate Rogue Devices with Cisco Prime Infrastructure and Cisco CMX Monitor and Detect Wireless Clients with Cisco CMX and Cisco DNA Center Run Analytics on Wireless Clients Troubleshoot Location Accuracy with Cisco Hyperlocation Monitor and Manage RF Interferers on the Cisco WLC Monitor and Manager RF Interferers on Cisco Prime Infrastructure and Cisco CMX Labs Lab Familiarization (Base Learning Lab) Configure Secure Management Access for WLCs and APs Add Network Devices and External Resources to Cisco Prime Infrastructure Capture a Successful AP Authentication Implement AAA Services for Central Mode WLANs Implement AAA Services for FlexConnect Mode WLANs Configure Guest Services in the Wireless Network Configure BYOD in the Wireless Network Capture a Successful Client Authentications Configure QoS in the Wireless Network for Voice and Video Services Configure Cisco AVC in the Wireless Network Capture Successful QoS Traffic Marking in the Wireless Network Configure Detect and Locate Services on the Cisco CMX Identify Wireless Clients and Security Threats [-]
Les mer
Nettkurs 2 timer 1 990 kr
Informasjon i SharePoint er lagret i lister. Bli kjent med SharePoint liste-apper og hvordan du tilpasser eller lager egne med krav til utfylling, oppslag i andre lister,... [+]
Informasjon i SharePoint er lagret i lister. Bli kjent med SharePoint liste-apper og hvordan du tilpasser eller lager egne med krav til utfylling, oppslag i andre lister, beregninger og validering av innfylte verdier. Webinaret varer i 2 timer og består av to økter à 45 min. Etter hver økt er det 10 min spørsmålsrunde. Mellom øktene er det 10 min pause. Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.   Kursinnhold:   Om Lister Bruk av listemalene i SharePoint Lag liste av Excel-bok Lag liste fra bunn av i SharePoint   Bruke lister Kolonnetyper og eksempler på bruk Opprette en liste og listeinnstillinger Krav om utfylling   Utvide lister Valider verdier bruker fyller inn Logg-kolonne Beregningskolonner og formler Presenter informasjon med visninger   Avanserte temaer Visnings-stiler Innføring i områdekolonner Veien videre til innholdstyper   3 gode grunner til å delta 1. Møt SharePoint sine liste-apper og lær å lage liste fra bunn eller fra eksisterende Excel-bok 2. Lær om kolonner som beregner eller sjekker inntastede verdier 3. Presenter informasjonen med visninger    [-]
Les mer
3 dager 24 500 kr
Check Point Certified Security Expert (CCSE) – R81.20 [+]
Check Point Certified Security Expert (CCSE) – R81.20 [-]
Les mer
Nettkurs 365 dager 2 995 kr
Excel for Økonomer - elæringskurs [+]
Excel for Økonomer - elæringskurs [-]
Les mer
Nettkurs 1 time
Få en gratis, effektiv og god innføring i Outlook! Lær hvordan du jobber med e-post, kalender, oppgaver og kontakter. [+]
Få en gratis, effektiv og god innføring i Outlook! Lær hvordan du jobber med e-post, kalender, oppgaver og kontakter. Webinaret varer i 1 time og består av 1 økt à 45 min, samt 15 min spørsmålsrunde.   Kursinnhold:   Generelt Gjennomgang av båndet og programvinduet   E-post Tilpasse visningen for innboks og andre mapper Sende, svare på, og videresende e-post Legge til en signatur   Kalender Legge inn en avtale Legge inn en heldagshendelse Åpne kalenderen til kollegaer   Oppgaver Opprette en oppgave Følge opp e-post   Kontakter Opprette nye kontakter Lage en kontaktgruppe   Veien videre Se på flere muligheter i Outlook   [-]
Les mer
Oslo 3 dager 27 900 kr
01 Oct
01 Oct
03 Dec
Advanced Architecting on AWS [+]
Advanced Architecting on AWS [-]
Les mer
Nettkurs 2 timer 3 120 kr
Bluebeam Revu er en komplett PDF-løsning, som lar deg opprette og redigere PDF-dokumenter og tegninger. Videre kan du markere opp og gjøre mengdeuttak fra tegningene, sam... [+]
Sammenligne tegninger, også i batch Hvordan standardisere designgjennomgangen? Opprette tilpassede markeringsverktøy i Tool Chest Bruk av Markeringslisten for sporing, kommentering og status på markeringer Samhandling i sanntid mellom forskjellige aktører under designgjennomgangen i Studio Sessions [-]
Les mer
Oslo Bergen 3 dager 27 900 kr
10 Sep
10 Sep
22 Oct
Developing on AWS [+]
Developing on AWS [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
The Implementing Cisco Application Centric Infrastructure course show you how to deploy and manage the Cisco® Nexus® 9000 Series Switches in Cisco Application Centric Inf... [+]
COURSE OVERVIEW ou will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and fundamentals of Virtual Machine Manager (VMM) integration. You will gain hands-on practice implementing key capabilities such as fabric discovery, policies, connectivity, VMM integration, and more. This course is based on ACI Software v5.2 release.   This course helps you prepare to take the exam, Implementing Cisco Application Centric Infrastructure(300-620 DCACI), which leads to CCNP® Data Center and Cisco Certified Specialist – Data Center ACI Implementation certifications. TARGET AUDIENCE Individuals who need to understand how to configure and manage a data center network environment with the Cisco Nexus 9000 Switch operating in ACI Mode.   COURSE OBJECTIVES After completing this course, you should be able to: Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts Describe Cisco ACI policy model logical constructs Describe Cisco ACI basic packet forwarding Describe external network connectivity Describe VMM Integration Describe Layer 4 to Layer 7 integrations Explain Cisco ACI management features COURSE CONTENT Introducing Cisco ACI Fabric Infrastructure and Basic Concepts What Is Cisco ACI? Cisco ACI Topology and Hardware Cisco ACI Object Model Faults, Event Record, and Audit Log Cisco ACI Fabric Discovery Cisco ACI Access Policies Describing Cisco ACI Policy Model Logical Constructs Cisco ACI Logical Constructs Tenant Virtual Routing and Forwarding Bridge Domain Endpoint Group Application Profile Tenant Components Review Adding Bare-Metal Servers to Endpoint Groups Contracts Describing Cisco ACI Basic Packet Forwarding Endpoint Learning Basic Bridge Domain Configuration **** Introducing External Network Connectivity Cisco ACI External Connectivity Options External Layer 2 Network Connectivity External Layer 3 Network Connectivity Introducing VMM Integration VMware vCenter VDS Integration Resolution Immediacy in VMM Alternative VMM Integrations Describing Layer 4 to Layer 7 Integrations Service Appliance Insertion Without ACI L4-L7 Service Graph Service Appliance Insertion via ACI L4-L7 Service Graph Service Graph Configuration Workflow Service Graph PBR Introduction Explaining Cisco ACI Management Out-of-Band Management In-Band Management Syslog Simple Network Management Protocol Configuration Backup Authentication, Authorization, and Accounting Role-Based Access Control Cisco ACI Upgrade Collect Tech Support Labs Validate Fabric Discovery Configure Network Time Protocol (NTP) Create Access Policies and Virtual Port Channel (vPC) Enable Layer 2 Connectivity in the Same Endpoint Group (EPG) Enable Inter-EPG Layer 2 Connectivity Enable Inter-EPG Layer 3 Connectivity Compare Traffic Forwarding Methods in a Bridge Domain Configure External Layer 2 (L2Out) Connection Configure External Layer 3 (L3Out) Connection Integrate Application Policy Infrastructure Controller (APIC) With VMware vCenter Using VMware Distributed Virtual Switch (DVS) TEST CERTIFICATION Recommended as preparation for the following exams: 300-620 DCACI - Implementing Cisco Application Centric Infrastructure [-]
Les mer
Bedriftsintern 1 dag 11 000 kr
This course will teach you how to containerize workloads in Docker containers, deploy them to Kubernetes clusters provided by Google Kubernetes Engine, and scale those wo... [+]
Objectives Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Understand how pod networking works in Google Kubernetes Engine Create and manage Kubernetes Engine clusters using the Google Cloud Console and gcloud/kubectl commands   Course Outline Module 1: Introduction to Google Cloud -Use the Google Cloud Console-Use Cloud Shell-Define Cloud Computing-Identify Google Cloud compute services-Understand Regions and Zones-Understand the Cloud Resource Hierarchy-Administer your Google Cloud Resources Module 2: Containers and Kubernetes in Google Cloud -Create a Container Using Cloud Build-Store a Container in Container Registry-Understand the Relationship Between Kubernetes and Google Kubernetes Engine (GKE)-Understand how to Choose Among Google Cloud Compute Platforms Module 3: Kubernetes Architecture -Understand the Architecture of Kubernetes: Pods, Namespaces-Understand the Control-plane Components of Kubernetes-Create Container Images using Cloud Build-Store Container Images in Container Registry-Create a Kubernetes Engine Cluster Module 4: Introduction to Kubernetes Workloads -The kubectl Command-Introduction to Deployments-Pod Networking-Volumes Overview [-]
Les mer