IT-kurs
Kurs i programvare og applikasjoner
Vestfold
Du har valgt: Tønsberg
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Tønsberg ) i Kurs i programvare og applikasjoner
 

Klasserom + nettkurs Sentrum 1 dag 4 490 kr
18 Jun
Om du ikke har jobbet med Outlook tidligere, men skal begynne å ta programet i bruk? Da er dette kurset perfekt for deg! [+]
Har du lite erfaring med Outlook og ønsker en innføring i programmet? På dette kurset lærer du hvordan du bruker Outlook med sending av e-post, oppretting av kontakter, samt bruk av kalender og oppgaver. Du jobber i ditt eget tempo via et e-læringsprogram, med instruktør tilstede i rommet som hjelper deg om du står fast.   Kursinnhold:   Bli kjent med Outlook Elektronisk post Trygghet og sikkerhet Oppstart Mottak av meldinger Lesing av meldinger E-postkontoer Nyhetsstrømmer (RSS) Hjelpesystemet   Sending av meldinger Sending av meldinger Innskriving og redigering Signatur Meldingsformater Stavekontroll Vedlegg Viktighet og følsomhet Oppfølgingsflagg Svar og videresending Leverings- og lesebekreftelse Angi mottakere av svar Tidsbegrensning Svarknapper   Adresseboka Adresseboka Distribusjonslister   Organisering av meldinger Sortering av meldinger Søk etter meldinger Søkemapper Organisering av meldinger Aktivering av meldinger Søppelpost Regelhåndtering Farger Kategorier Fraværsassistenten   Kalenderen Navigering i kalenderen Planlegging av aktiviteter Arbeidsområde Svar på møteinnkallelser Påminnelse Redigering av aktiviteter Dele kalenderen med andre Oppgaver i kalenderen Utskrift av kalenderen Lagring som webside   Kontakter Kontakter Sending av kontaktinformasjon   Oppgaver Oppgaver Oppgaveforespørsler Svar på oppgaveforespørsler Planer i dag   Notater og logg Notater Visning av notater Logg   [-]
Les mer
1 dag 8 000 kr
This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. [+]
COURSE OVERVIEW The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. The course is designed as a blended learning experience that combines instructor-led training with online materials on the Microsoft Learn platform (https://azure.com/learn). The hands-on exercises in the course are based on Learn modules, and students are encouraged to use the content on Learn as reference materials to reinforce what they learn in the class and to explore topics in more depth. TARGET AUDIENCE The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don’t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. COURSE OBJECTIVES  After completing this course, you will be able to: Describe Artificial Intelligence workloads and considerations Describe fundamental principles of machine learning on Azure Describe features of computer vision workloads on Azure Describe features of Natural Language Processing (NLP) workloads on Azure Describe features of conversational AI workloads on Azure   COURSE CONTENT Module 1: Introduction to AI In this module, you'll learn about common uses of artificial intelligence (AI), and the different types of workload associated with AI. You'll then explore considerations and principles for responsible AI development. Artificial Intelligence in Azure Responsible AI After completing this module you will be able to Describe Artificial Intelligence workloads and considerations Module 2: Machine Learning Machine learning is the foundation for modern AI solutions. In this module, you'll learn about some fundamental machine learning concepts, and how to use the Azure Machine Learning service to create and publish machine learning models. Introduction to Machine Learning Azure Machine Learning After completing this module you will be able to Describe fundamental principles of machine learning on Azure Module 3: Computer Vision Computer vision is a the area of AI that deals with understanding the world visually, through images, video files, and cameras. In this module you'll explore multiple computer vision techniques and services. Computer Vision Concepts Computer Vision in Azure After completing this module you will be able to Describe features of computer vision workloads on Azure Module 4: Natural Language Processing This module describes scenarios for AI solutions that can process written and spoken language. You'll learn about Azure services that can be used to build solutions that analyze text, recognize and synthesize speech, translate between languages, and interpret commands. After completing this module you will be able to Describe features of Natural Language Processing (NLP) workloads on Azure Module 5: Conversational AI Conversational AI enables users to engage in a dialog with an AI agent, or *bot*, through communication channels such as email, webchat interfaces, social media, and others. This module describes some basic principles for working with bots and gives you an opportunity to create a bot that can respond intelligently to user questions. Conversational AI Concepts Conversational AI in Azure After completing this module you will be able to Describe features of conversational AI workloads on Azure   TEST CERTIFICATION Recommended as preparation for the following exams: Exam AI-900: Microsoft Azure AI Fundamentals. HVORFOR VELGE SG PARTNER AS:  Flest kurs med Startgaranti Rimeligste kurs Beste service og personlig oppfølgning Tilgang til opptak etter endt kurs Partner med flere av verdens beste kursleverandører [-]
Les mer
Nettkurs 4 timer 549 kr
WordPress er verdens desidert mest brukte publiseringssystem. Alt fra små firma til store konsern bruker WordPress til å drive sine nettsider. Faktisk driver WordPress 50... [+]
Bli en ekspert i å bruke WordPress, verdens mest populære publiseringssystem, med "WordPress: Komplett", et grundig kurs ledet av Espen Faugstad hos Utdannet.no. WordPress er en favoritt blant små og store bedrifter over hele verden og står bak en betydelig andel av nettsider på internett. Dette kurset er designet for å gi deg en omfattende forståelse av WordPress, fra grunnleggende installasjon til avansert tilpasning og administrasjon. Du vil starte med å lære hvordan du kjøper webhotell og domenenavn, og hvordan du laster opp og installerer WordPress ved hjelp av FTP-klienten FileZilla. Kurset dekker også tilpasning av utseendet på din WordPress-nettside, inkludert temaer og utvidelser, samt bruk av det innovative redigeringsverktøyet Gutenberg for å skape innhold. Du vil lære å opprette sider og blogginnlegg, administrere utvidelser og brukere, oversette temaer og utvidelser, og håndtere viktige innstillinger. Videre vil kurset guide deg gjennom hvordan du sikrer og oppdaterer din WordPress-nettside for å holde den trygg og funksjonell. Etter å ha fullført kurset, vil du ha ferdighetene og kunnskapen som trengs for å lage og vedlikeholde en profesjonell WordPress-nettside.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Installere WordPress Kapittel 3: Brukergrensesnitt Kapittel 4: Utseende Kapittel 5: Visuell redigering Kapittel 6: Sider Kapittel 7: Innlegg Kapittel 8: Utvidelser Kapittel 9: Brukere Kapittel 10: Oversette Kapittel 11: Innstillinger Kapittel 12: Sikkerhet Kapittel 13: Avslutning   Varighet: 3 timer og 46 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Virtuelt eller personlig Bærum 3 dager 12 480 kr
Kurset som får deg godt i gang med Inventor [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon. Inventor grunnkurs Her er et utvalg av temaene du vil lære på kurset: Generelt Part-modellering (3D-komponenter) Samlinger Skjelettmodellering på basisnivå Tegninger i 2D Autodesk Inventor 3D CAD programvare brukes til produktdesign, rendering og simuleringer. Løsningen er viktig når smarte ideer skal bli til produksjonsklar design, og for å utvikle fremtidens produkter og tjenester. Inventor tilfører større kvalitet til utviklingsprosesser med smarte funksjoner som optimaliserer, gjør det enkelt å «se» modellen, og simulere hvordan konseptet/prototypen vil fungere i bruk.   Dette er et populært kurs, meld deg på nå!   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Oslo Bergen Og 1 annet sted 2 dager 16 900 kr
23 Jun
23 Jun
22 Sep
Kubernetes [+]
Kubernetes [-]
Les mer
Klasserom + nettkurs Sentrum 1 dag 4 490 kr
18 Jun
Dette er kurset passer for deg som har grunnleggende Windowskunnskap og som skal begynne og ta i bruk PowerPoint. [+]
Har du lite erfaring med PowerPoint og ønsker en innføring i programmet? På dette kurset lærer du hvordan du lager presentasjoner med bruk av tekst, bilder og ulike oppsett i PowerPoint. Du jobber i ditt eget tempo via et e-læringsprogram, med instruktør tilstede i rommet som hjelper deg om du står fast.   Kursinnhold:   Bli kjent med PowerPoint Oppstart Åpning Visninger Navigering Lagring og lukking Alternativer Egenskaper Hjelpemuligheter   Utforming Utformingsprosessen Nye presentasjoner Nye lysbilder Tema   Tekst Bruk av tekst i presentasjoner Innskriving og redigering Maler Skriftformatering Justering Avstand mellom linjer og avsnitt Punktlister og nummererte lister Angremuligheter Topptekst og bunntekst Tabulatorer Søking og erstatting Stavekontroll Synonymordbok   Bilder og objekter Bruk av bilder Utklipp Bilder fra fil Fotoalbum Video og lyd fra fil Arbeid med objekter Formatering av bilder Import av objekter   Tegning Tegning Koblingslinjer Formatering av objekter WordArt SmartArt   Diagram Utforming av diagram Diagramtyper Diagramelementer Formatering av diagram   Organisasjonskart Utforming av organisasjonskart Formatering av organisasjonskart   Tabeller Utforming av tabeller Merking Innsetting og sletting Radhøyde og kolonnebredde Justering   Utskrift Utskriftsformat Forhåndsvisning og utskrift Eksport av lysbilder til Word   Lysbildeframvisning Animasjoner Egendefinerte animasjoner Lysbildesortering Overgangseffekter Lysbildeframvisning Tilpassede framvisninger Framvisning uavhengig av PowerPoint   Internett og distribusjon Websider Hyperkoblinger Handlingsknapper Elektronisk post PDF- og XPS-format Dokumentinspeksjon Endelig versjon   [-]
Les mer
2 dager 11 900 kr
Excel for Controllere og Økonomisjefer [+]
Excel for Controllere og Økonomisjefer [-]
Les mer
Oslo Trondheim 3 dager 26 900 kr
25 Jun
25 Jun
17 Sep
Kubernetes for App Developers (LFD459) [+]
Kubernetes for App Developers (LFD459) [-]
Les mer
Virtuelt eller personlig 2 dager 9 250 kr
Lær å bruke egenutviklede scripts direkte i BIM-modellen både i forhold til arbeidet med geometri og BIM-data. [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Dynamo for Revit Her er et utvalg av temaene du vil lære på kurset: Intro til brukerflate og grunnleggende funksjoner Dynamo – Revit-interaksjon Parametrisk/Regelbasert Design Geometri i Dynamo Plassering av Revit-elementer Datauttrekk Opprettelse av Analytisk modell Skrive i Revit-parametre/nummerering Tilpasning av Revit-elementer Import og behandling av ekstern geometri Kjenner du til Grasshopper for Rhino og ønsker å komme videre med komplekse geometrier? I så fall er Dynamo en mulighet. Her kan regelbasert design settes opp med direkte integrasjon til Revit. Med Dynamo for Revit åpnes en verden med en hittil usett parametrisk tilgang til prosjektene. Med Dynamo som visuelt programmeringsverktøy kobles egne algoritmer sammen med Revits parametriske database, uansett om fokuset er formgivning, designoptimering, fabrikasjon eller automatisering. Dette, sammen med toveiskommunikasjonen mellom Dynamo og Revit, gjør kombinasjonen både sterk og unik.   Tilpassete kurs for bedrifter Vi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Virtuelt eller personlig 3 timer 12 480 kr
Vi tilbyr kurs i Revit Structure basis 1. Du vil få en en grunnleggende kjennskap til å arbeide med Revit Structure, og til prosessen i samarbeidet med en arkitekt basert... [+]
Agenda:• Introduksjon til BIM• Link av Revit-modeller• Koordinering av modeller• Utarbeidelse av generisk modell• Arbeide med eksisterende families• Håndtering av forandringer i grunnlaget• Snitt og detaljer• Skjemaer og uttrekk• Oppsetning til print [-]
Les mer
Virtuelt klasserom 4 dager 22 000 kr
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solut... [+]
. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.   TARGET AUDIENCE This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. COURSE OBJECTIVES Implement an identity management solution Implement an authentication and access management solutions Implement access management for apps Plan and implement an identity governancy strategy COURSE CONTENT Module 1: Implement an identity management solution Learn to create and manage your initial Azure Active Directory (Azure AD) implementation and configure the users, groups, and external identities you will use to run your solution. Lessons M1 Implement Initial configuration of Azure AD Create, configure, and manage identities Implement and manage external identities Implement and manage hybrid identity Lab 1a: Manage user roles Lab 1b: Setting tenant-wide properties Lab 1c: Assign licenses to users Lab 1d: Restore or remove deleted users Lab 1e: Add groups in Azure AD Lab 1f: Change group license assignments Lab 1g: Change user license assignments Lab 1h: Configure external collaboration Lab 1i: Add guest users to the directory Lab 1j: Explore dynamic groups After completing module 1, students will be able to: Deploy an initail Azure AD with custom settings Manage both internal and external identities Implement a hybrid identity solution Module 2: Implement an authentication and access management solution Implement and administer your access management using Azure AD. Use MFA, conditional access, and identity protection to manager your identity solution. Lessons M2 Secure Azure AD user with MFA Manage user authentication Plan, implement, and administer conditional access Manage Azure AD identity protection Lab 2a: Enable Azure AD MFA Lab 2b: Configure and deploy self-service password reset (SSPR) Lab 2c: Work with security defaults Lab 2d: Implement conditional access policies, roles, and assignments Lab 2e: Configure authentication session controls Lab 2f: Manage Azure AD smart lockout values Lab 2g: Enable sign-in risk policy Lab 2h: Configure Azure AD MFA authentication registration policy After completing module 2, students will be able to: Configure and manage user authentication including MFA Control access to resources using conditional access Use Azure AD Identity Protection to protect your organization Module 3: Implement access management for Apps Explore how applications can and should be added to your identity and access solution with application registration in Azure AD. Lessons M3 Plan and design the integration of enterprise for SSO Implement and monitor the integration of enterprise apps for SSO Implement app registration Lab 3a: Implement access management for apps Lab 3b: Create a custom role to management app registration Lab 3c: Register an application Lab 3d: Grant tenant-wide admin consent to an application Lab 3e: Add app roles to applications and recieve tokens After completing module 3, students will be able to: Register a new application to your Azure AD Plan and implement SSO for enterprise application Monitor and maintain enterprise applications Module 4: Plan and implement an identity governancy strategy Design and implement identity governance for your identity solution using entitlement, access reviews, privileged access, and monitoring your Azure Active Directory (Azure AD). Lessons M4 Plan and implement entitlement management Plan, implement, and manage access reviews Plan and implement privileged access Monitor and maintain Azure AD Lab 4a: Creat and manage a resource catalog with Azure AD entitlement Lab 4b: Add terms of use acceptance report Lab 4c: Manage the lifecycle of external users with Azure AD identity governance Lab 4d: Create access reviews for groups and apps Lab 4e: Configure PIM for Azure AD roles Lab 4f: Assign Azure AD role in PIM Lab 4g: Assign Azure resource roles in PIM Lab 4h: Connect data from Azure AD to Azure Sentinel After completing module 4, students will be able to: Mange and maintain Azure AD from creation to solution Use access reviews to maintain your Azure AD Grant access to users with entitlement management [-]
Les mer
Nettkurs 365 dager 2 995 kr
Excelfunksjoner - elæringskurs [+]
Excelfunksjoner - elæringskurs [-]
Les mer
1 dag 8 000 kr
This one-day course will provide foundational level knowledge on Azure concepts; core Azure services; core solutions and management tools; general security and network se... [+]
COURSE OVERVIEW This course does not provide an Azure pass or time in the classroom for students to do any hands-on activities. TARGET AUDIENCE  This course is suitable for program managers and technical sales, with a general IT background. These students want to learn about our offerings, see how components are implemented, and ask questions about products and features. COURSE OBJECTIVES   Discuss the basics of cloud computing and Azure, and how to get started with Azure's subscriptions and accounts. Describe the advantages of using cloud computing services, learning to differentiate between the categories and types of cloud computing, and how to examine the various concepts, resources, and terminology that are necessary to work with Azure architecture. Outline the core services available with Microsoft Azure. Discuss the core solutions that encompass a wide array of tools and services from Microsoft Azure. Describe the general security and network security features, and how you can use the various Azure services to help ensure that your cloud resources are safe, secure, and trusted. Discuss the identity, governance, privacy, and compliance features, and how Azure can help you secure access to cloud resources, what it means to build a cloud governance strategy, and how Azure adheres to common regulatory and compliance standards. Discuss the factors that influence cost, tools you can use to help estimate and manage your cloud spend, and how Azure's service-level agreements (SLAs) can impact your application design decisions. COURSE CONTENT Module 1: Cloud Concepts In this module, you'll take an entry level end-to-end look at Azure and its capabilities, which will provide you with a solid foundation for completing the available modules for Azure Fundamentals. Introduction to Azure fundamentals Fundamental Azure concepts After completing this module, students will be able to: Understand the benefits of cloud computing in Azure and how it can save you time and money. Explain concepts such as high availability, scalability, elasticity, agility, and disaster recovery. Module 2: Core Azure Services In this module, you learn about core Azure services like Azure database, Azure compute, Azure storage, and Azure Networking. Core Azure architectural components Core Azure workload products Azure networking services Azure storage services Azure database services After completing this module, students will be able to: Describe core Azure architecture components such as subscriptions, management groups, and resources. Summarize geographic distribution concepts such as Azure regions, region pairs, and availability zones. Understand the services available in Azure including compute, network, storage, and databases. Identify virtualization services such as Azure VMs, Azure Container Instances, and Azure Kubernetes. Compare Azure's database services such as Azure Cosmos DB, Azure SQL, and Azure Database for MySQL. Examine Azure networking resources such as Virtual Networks, VPN Gateways, and Azure ExpressRoute. Summarize Azure storage services such Azure Blob Storage, Azure Disk Storage, and Azure File Storage. Module 3: Core Solutions In this module, you'll learn about AI machine learning, Azure DevOps, monitoring fundamentals, management fundamentals, serverless computing fundamentals. and IoT fundamentals. Choose the best Azure IoT service Choose the best AI service Choose the best Azure serverless technology Choose the best tools with DevOps and GitHub Choose the best management tools Choose the best Azure monitoring service After completing this module, students will be able to: Choose the correct Azure AI service to address different kinds of business challenges. Choose the best software development process tools and services for a given business scenario. Choose the correct cloud monitoring service to address different kinds of business challenges. Choose the correct Azure management tool to address different kinds of technical needs. Choose the right serverless computing technology for your business scenario. Choose the best Azure IoT service for a given business scenario. Module 4: General security and networking features In this module, you will learn how to protect yourself against security threats, and secure your networks with Azure. Security Tools and Features Secure Network Connectivity After completing this module, students will be able to: Strengthen your security posture and protect against threats by using Microsoft Defender for Cloud. Collect and act on security data from many different sources by using Microsoft Sentinel. Manage dedicated physical servers to host your Azure VMs for Windows and Linux. Identify the layers that make up a defense in depth strategy. Explain how Azure Firewall enables you to control what traffic is allowed on the network. Configure network security groups to filter network traffic to and from Azure resources. Explain how Azure DDoS Protection helps protect your Azure resources from DDoS attacks. Module 5: Identity, Governance, Privacy, and Compliance In this module, you will learn about Azure identity services, how to build a cloud governance strategy, and privacy, compliance and data protection standards on Azure. Core Azure identity services Azure Governance Methodologies Privacy, Compliance, and Data Protection standards After completing this module, students will be able to: Explain the difference between authentication and authorization. Describe how Azure Active Directory provides identity and access management. Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play. Make organizational decisions about your cloud environment by using the CAF for Azure. Define who can access cloud resources by using Azure role-based access control. Apply a resource lock to prevent accidental deletion of your Azure resources. Apply tags to your Azure resources to help describe their purpose. Control and audit how your resources are created by using Azure Policy. Enable governance at scale across multiple Azure subscriptions by using Azure Blueprints. Explain the types of compliance offerings that are available on Azure. Gain insight into regulatory standards and compliance on Azure. Explain Azure capabilities that are specific to government agencies. Module 6: Azure Pricing and Lifecycle In this module, you will learn how to plan and manage Azure costs, and how to choose the right Azure services though SLAs and service lifecycle. Planning and Cost Management Azure Service Level Agreements (SLAs) and Lifecycle After completing this module, students will be able to: Use the Total Cost of Ownership Calculator. Describe the different ways you can purchase Azure products and services. Use the Pricing calculator to estimate the monthly cost of running your cloud workloads. Define the major factors that affect total cost and apply recommended practices to minimize cost. Describe what a service-level agreement (SLA) is and why SLAs are important. Identify factors, such as the service tier you choose, that can affect an SLA. Combine SLAs to compute a composite SLA. Describe the service lifecycle in Azure. TEST CERTIFICATION This course helps to prepare for exam AZ-900. FOLLOW ON COURSES M-AZ104, Microsoft Azure Administrator M-AZ204, Developing Solutions for Microsoft Azure M-AZ303, Microsoft Azure Architect Technologies M-DP200, Implementing an Azure Data Solution (DP-200) [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for se... [+]
COURSE OVERVIEW In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more.  You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam. TARGET AUDIENCE Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. COURSE OBJECTIVES After completing this course you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment   COURSE CONTENT Describing Information Security Concepts (Self-Study) Information Security Overview Managing Risk Vulnerability Assessment Understanding CVSS Describing Common TCP/IP Attacks (Self-Study) Legacy TCP/IP Vulnerabilities IP Vulnerabilities ICMP Vulnerabilities TCP Vulnerabilities UDP Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-In-The-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks DHCP Attacks Describing Common Network Application Attacks (Self-Study) Password Attacks DNS-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks (Self-Study) Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview IPS Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface ACLs Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW NAT Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview SMTP Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco WSA Overview Deployment Options Network Users Authentication HTTPS Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella (Self-Study) Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point Cisco IOS VTIs Static VTI Point-to-Point IPsec IKEv2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies SSL Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and EAP EAP Methods Role of RADIUS in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst Switch 802.1X Configuration Cisco WLC 802.1X Configuration Cisco ISE 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies (Self-Study) Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco AMP for Endpoints (Self-study) Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection (Self-Study) Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls (Self-Study) Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls (Self-Study) Overview of Layer 2 Data Plane Security Controls VLAN-Based Attacks Mitigation STP Attacks Mitigation Port Security Private VLANs DHCP Snooping ARP Inspection Storm Control MACsec Encryption Deploying Layer 3 Data Plane Security Controls (Self-Study) Infrastructure Antispoofing ACLs Unicast Reverse Path Forwarding IP Source Guard Labs Configure Network Settings And NAT On Cisco ASA Configure Cisco ASA Access Control Policies Configure Cisco Firepower NGFW NAT Configure Cisco Firepower NGFW Access Control Policy Configure Cisco Firepower NGFW Discovery and IPS Policy Configure Cisco NGFW Malware and File Policy Configure Listener, HAT, and RAT on Cisco ESA Configure Mail Policies Configure Proxy Services, Authentication, and HTTPS Decryption Enforce Acceptable Use Control and Malware Protection Examine the Umbrella Dashboard Examine Cisco Umbrella Investigate Explore DNS Ransomware Protection by Cisco Umbrella Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW Configure Remote Access VPN on the Cisco Firepower NGFW Explore Cisco AMP for Endpoints Perform Endpoint Analysis Using AMP for Endpoints Console Explore File Ransomware Protection by Cisco AMP for Endpoints Console Explore Cisco Stealthwatch Enterprise v6.9.3 Explore CTA in Stealthwatch Enterprise v7.0 Explore the Cisco Cloudlock Dashboard and User Security Explore Cisco Cloudlock Application and Data Security Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors TEST CERTIFICATION Recommended as preparation for the following exams: 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)   This is the core exam for the Cisco CCNP Security certification, in order to gain the CCNP Security certification you will also need to pass one of the concentration exams. [-]
Les mer
Virtuelt eller personlig Hele landet 1 dag 5 950 kr
02 Jun
Gir alle deltakere i et prosjekt innsyn til å oppdatere data uansett programvare, tid og sted. [+]
  Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Navisworks grunnkurs   Her er et utvalg av temaene du vil lære på kurset: forstå hvordan tverrfaglige modeller settes sammen analysere modellen gjennom visualisering og navigering håndtering av objekter sette inn målsetting legg inn snitt finne informasjon på objektene Navisworks håndterer et stort antall filformater og det er viktig å forstå hvordan tverrfaglige modeller settes sammen slik at dette muligjør analyse av modellen gjennom visualisering, navigering, håndtering av objekter, sette inn målsetting, legge inn snitt og finne informasjon på objektene.   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer