IT-kurs
Kurs i programvare og applikasjoner
Vestfold
Du har valgt: Tønsberg
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Tønsberg ) i Kurs i programvare og applikasjoner
 

Virtuelt eller personlig Bærum 3 dager 12 480 kr
Kurset som får deg godt i gang med Inventor [+]
Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon. Inventor grunnkurs Her er et utvalg av temaene du vil lære på kurset: Generelt Part-modellering (3D-komponenter) Samlinger Skjelettmodellering på basisnivå Tegninger i 2D Autodesk Inventor 3D CAD programvare brukes til produktdesign, rendering og simuleringer. Løsningen er viktig når smarte ideer skal bli til produksjonsklar design, og for å utvikle fremtidens produkter og tjenester. Inventor tilfører større kvalitet til utviklingsprosesser med smarte funksjoner som optimaliserer, gjør det enkelt å «se» modellen, og simulere hvordan konseptet/prototypen vil fungere i bruk.   Dette er et populært kurs, meld deg på nå!   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Nettkurs 2000 timer 2 750 kr
Med GeT Everything får du tilgang til alle kurs og innholdet fra Autodesk, Adobe, Primavera, Bluebeam, Bentlye, Microsoft, Trimble og McNeel. [+]
GeT Everything NTI tilbyr eLæringkurs av høyeste kvalitet. Uansett hvilket kurs du velger har du tilgang til dem 24/7 i 1 år (365 dager). Med elæringskurs velger du selv ditt tempo i læringen, og om du vil lære gjennom kombinasjon av å se, lese, lytte og teste selv – eller hvorfor ikke en kombinasjon av flere? Det du trenger er en PC, smarttelefon eller nettbrett som har internettilgang   Her er et utvalg av kursene du får tilgang på: Autodesk Adobe Primavera Bluebeam Bentlye Microsof Trimble McNeel NTI  leverer opplæring for å forenkle og effektivisere din arbeidshverdag Vi har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon. Global eTraining har over 25 års erfaring med opplæring, og har solgt millioner av elæringskurs i over 150 land.  PC, smarttelefon eller nettbrett som har internettilgang Pål har gjennomført e-læringskurs Pål hadde ikke anledning til å reise bort en uke for å delta på kurs, da var det forlokkende å gjennomføre kurset som e-læringskurs. Kurset var absolutt verdt pengene. Det var en viktig bekreftelse på at jeg har basiskunnskapene. Jeg lærte mange nye viktige kommandoer for å gjøre operasjoner mer effektivt, fikk også en pekepinn på hvor jeg kan bygge på med kunnskap.Les mer her [-]
Les mer
Klasserom + nettkurs 2 semester 45 000 kr
Mange arbeidsgivere etterspør kunnskap om digital markedsføring. Lær deg å lage godt, engasjerende digitalt innhold brukerne dine vil ha. [+]
Etter kurset Digital markedsføring, skal du ha grunnleggende kunnskaper innen dataanalyse og kjenne til digitale mediers rolle innen markedsføring. Du skal beherske digital markedsføring, strategi og planlegging, samt jus og etikk innenfor samme tema. Du skal bli i stand til å analysere effekten av strategi og kampanjer. Du skal vite hvordan nettsidene optimaliseres, samt hvordan man etablerer og drifter digitale annonser. Du skal kunne lede digitale kampanjer og ha kunnskap om hvilken betydning en god digital strategi har innen digital markedsføring. Studiet er både praktisk og teoretisk rettet – med hovedvekt på å løse praktiske obligatoriske oppgaveløsning basert på teoretisk kunnskap. Studentene vil gjennom studieåret gjennomføre en rekke individuelle og gruppebaserte praktiske og teoretiske oppgaver knyttet til de forskjellige undertema. [-]
Les mer
Virtuelt eller personlig 3 dager 11 200 kr
10 Jun
Kurset vil gi en grundig gjennomgang av hovedkommandoene i AutoCAD. Deltagerne vil også få nødvendig forståelse for prinsipper og arbeidsmetoder i programmet. [+]
Kurset vil gi deg en grunnleggende forståelse i bruk av tegne- og konstruksjonsprogrammet AutoCAD. AutoCAD 2D Grunnkurs:• Hovedprinsipper i AutoCAD's brukergrensesnitt• Oppretting og lagring av tegninger• Tegne- og editeringskommandoer• Hjelpefunksjoner for å tegne nøyaktig• Skjermstyring• Lagoppbygging og struktur• Målsetting, teksting og skravering• Symbol- og blokkhåndtering• Layout/plotting   Etter gjennomført kurs skal kursdeltagerne bl.a. kunne bruke AutoCAD til å: • Opprette tegninger• Utføre de vanligste tegne- og editeringsfunksjoner• Bruke og forstå lagoppbygging• Målsette og påføre tekst• Skrive ut tegning i målestokk  [-]
Les mer
2 dager 11 900 kr
Excel for Controllere og Økonomisjefer [+]
Excel for Controllere og Økonomisjefer [-]
Les mer
Virtuelt klasserom 3 dager 24 000 kr
The Veeam® Availability Suite™ v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to co... [+]
COURSE OVERVIEW . With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. TARGET AUDIENCE This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. COURSE OBJECTIVES After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization’s evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. COURSE CONTENT Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building Replication Capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary Backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced Repository Capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting Data in the Cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from Backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from Replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE™ Configuration Backup Locate, migrate or restore backup configuration   TEST CERTIFICATION Completion of this course satisfies the prerequisite for taking the Veeam Certified Engineer (VMCE) 2021 exam. [-]
Les mer
Virtuelt klasserom 5 timer 33 000 kr
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE BOOTCAMP [+]
COURSE OVERVIEW The Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency.   Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class.   TARGET AUDIENCE Individuals involved in the deployment and maintenance of the Cisco ISE platform. COURSE OBJECTIVES After completing this course you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party network access devices (NADs), Cisco TrustSec®, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authentication, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. COURSE CONTENT Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Fucntions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Services Configure Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning Working with Network Access Devices Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Labs Lab 1: Access the SISE Lab and Install ISE 2.4 Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage  Lab 3: Integrate Cisco ISE with Active Directory Lab 4: Configure Cisco ISE Policy Lab 5: Configure Access Policy for Easy Connect Lab 6: Configure Guest Access Lab 7: Configure Guest Access Operations Lab 8: Create Guest Reports Lab 9: Configure Profiling Lab 10: Customize the Cisco ISE Profiling Configuration Lab 11: Create Cisco ISE Profiling Reports Lab 12: Configure BYOD Lab 13: Blacklisting a Device Lab 14: Configure Cisco ISE Compliance Services Lab 15: Configure Client Provisioning Lab 16: Configure Posture Policies Lab 17: Test and Monitor Compliance Based Access Lab 18: Test Compliance Policy Lab 19: Configure Cisco ISE for Basic Device Administration Lab 20: Configure TACACS+ Command Authorization   [-]
Les mer
Nettkurs 4 timer 549 kr
WordPress er verdens desidert mest brukte publiseringssystem. Alt fra små firma til store konsern bruker WordPress til å drive sine nettsider. Faktisk driver WordPress 50... [+]
Bli en ekspert i å bruke WordPress, verdens mest populære publiseringssystem, med "WordPress: Komplett", et grundig kurs ledet av Espen Faugstad hos Utdannet.no. WordPress er en favoritt blant små og store bedrifter over hele verden og står bak en betydelig andel av nettsider på internett. Dette kurset er designet for å gi deg en omfattende forståelse av WordPress, fra grunnleggende installasjon til avansert tilpasning og administrasjon. Du vil starte med å lære hvordan du kjøper webhotell og domenenavn, og hvordan du laster opp og installerer WordPress ved hjelp av FTP-klienten FileZilla. Kurset dekker også tilpasning av utseendet på din WordPress-nettside, inkludert temaer og utvidelser, samt bruk av det innovative redigeringsverktøyet Gutenberg for å skape innhold. Du vil lære å opprette sider og blogginnlegg, administrere utvidelser og brukere, oversette temaer og utvidelser, og håndtere viktige innstillinger. Videre vil kurset guide deg gjennom hvordan du sikrer og oppdaterer din WordPress-nettside for å holde den trygg og funksjonell. Etter å ha fullført kurset, vil du ha ferdighetene og kunnskapen som trengs for å lage og vedlikeholde en profesjonell WordPress-nettside.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Installere WordPress Kapittel 3: Brukergrensesnitt Kapittel 4: Utseende Kapittel 5: Visuell redigering Kapittel 6: Sider Kapittel 7: Innlegg Kapittel 8: Utvidelser Kapittel 9: Brukere Kapittel 10: Oversette Kapittel 11: Innstillinger Kapittel 12: Sikkerhet Kapittel 13: Avslutning   Varighet: 3 timer og 46 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Nettkurs 2 timer 549 kr
Ta vårt videokurs i Excel fra din datamaskin. Lær så mye du vil, når du vil. Du får gratis hjelp. Du får kursbevis. Du får tilgang til alle kurs. Meld deg på her! [+]
Dette kurset er skreddersydd for deltakere som allerede har fullført vårt grunnleggende Excel-kurs og nå ønsker å ta sine ferdigheter til et avansert nivå. Kursinstruktør Espen Faugstad vil veilede deg gjennom en rekke avanserte emner, inkludert opprettelse av pivottabeller, bruk av funksjoner og formler, og mye mer. Kurset dekker grundig bruken av en rekke funksjoner og formler, inkludert SUMMER, MIN, MAKS, AVKORT, AVRUND, ANTALL, ANTALLA, KJEDE.SAMMEN, TRIMME, VENSTRE, HØYRE, DELTEKST, FINN.RAD, HVIS, SUMMERHVIS, ANTALL.HVIS og GJENNOMSNITTHVIS. I tillegg vil kurset veilede deg gjennom henting av ekstern data, sortering og filtrering, fjerning av duplikater, og gruppering av data.   Innhold: Kapittel 1: Pivottabeller Kapittel 2: Formler og Funksjoner Kapittel 3: Formelrevisjon Kapittel 4: Ekstern Data Kapittel 5: Sortering og Filtrering Kapittel 6: Dataverktøy Kapittel 7: Gruppering av Data Kapittel 8: Arkbeskyttelse Kapittel 9: Avslutning   Varighet: 2 timer og 17 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Vår tjeneste fungerer på samme måte som strømmetjenester for musikk eller TV-serier, der våre kunder betaler en fast månedspris for tilgang til alle kursene vi har tilgjengelig. Vi har opplevd betydelig vekst de siste årene, med over 30 000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling engasjerende, spennende og tilgjengelig for alle, og vi har støtte fra Innovasjon Norge og Forskningsrådet. [-]
Les mer
1 dag 9 900 kr
Confluence Essentials (server) [+]
Confluence Essentials (server) [-]
Les mer
Bedriftsintern 1 dag 11 000 kr
This course will teach you how to containerize workloads in Docker containers, deploy them to Kubernetes clusters provided by Google Kubernetes Engine, and scale those wo... [+]
Objectives Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Understand how pod networking works in Google Kubernetes Engine Create and manage Kubernetes Engine clusters using the Google Cloud Console and gcloud/kubectl commands   Course Outline Module 1: Introduction to Google Cloud -Use the Google Cloud Console-Use Cloud Shell-Define Cloud Computing-Identify Google Cloud compute services-Understand Regions and Zones-Understand the Cloud Resource Hierarchy-Administer your Google Cloud Resources Module 2: Containers and Kubernetes in Google Cloud -Create a Container Using Cloud Build-Store a Container in Container Registry-Understand the Relationship Between Kubernetes and Google Kubernetes Engine (GKE)-Understand how to Choose Among Google Cloud Compute Platforms Module 3: Kubernetes Architecture -Understand the Architecture of Kubernetes: Pods, Namespaces-Understand the Control-plane Components of Kubernetes-Create Container Images using Cloud Build-Store Container Images in Container Registry-Create a Kubernetes Engine Cluster Module 4: Introduction to Kubernetes Workloads -The kubectl Command-Introduction to Deployments-Pod Networking-Volumes Overview [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
The Implementing and Operating Cisco Enterprise Network Core Technologies course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterpri... [+]
COURSE OVERVIEW  Learn how to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. The automation and programmability of Enterprise networks is also incorporated in this course. This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 CE credits toward recertification   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 3 days of self study. The self-study content will be provided as part of the digital courseware that you receive at the beginning of the course and should be part of your preparation for the exam. Additional lab access will be provided at the end of the class, this will be valid for 60 hours or 90 days whichever is the shorter. It will be possible to complete all but 7 of the labs after the class. TARGET AUDIENCE Network engineers involved in the installation, support and troubleshooting of enterprise networks. COURSE OBJECTIVES After completing this course you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using EtherChannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Centre™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Centre and vManage COURSE CONTENT Examining Cisco Enterprise Network Architecture Cisco Enterprise Architecture Model Campus LAN Design Fundamentals Traditional Multilayer Campus Layer Design Campus Distribution Layer Design   Understanding Cisco Switching Paths Layer 2 Switch Operation Control and Data Plane Cisco Switching Mechanisms Implementing Campus LAN Connectivity Revisiting VLANs Trunking with 802.1Q Inter-VLAN Routing Building Redundant Switched Topology Spanning-Tree Protocol Overview Spanning-Tree Protocol Operation Spanning-Tree Protocols Types and Features Multiple Spanning Tree Protocol PortFast and BPDU Implementing Layer 2 Port Aggregation (Self-Study) Need for EtherChannel EtherChannel Mode Interactions Layer 2 EtherChannel Configuration Guidelines EtherChannel Load-Balancing Options Troubleshoot EtherChannel Issues Understanding EIGRP EIGRP Features EIGRP Reliable Transport Establishing EIGRP Neighbour Adjacency EIGRP Metrics EIGRP Path Selection Explore EIGRP Path Selection Explore EIGRP Load Balancing and Sharing EIGRP for IPv6 Compare EIGRP and OSPF Routing Protocols Implementing OSPF Describe OSPF The OSPF Process OSPF Neighbour Adjacencies Building a Link-State Database OSPF LSA Types Compare Single-Area and Multi-Area OSPF OSPF Area Structure OSPF Network Types Optimizing OSPF OSPF Cost OSPF Route Summarization Benefits OSPF Route Filtering Tools Compare OSPFv2 and OSPFv3 Exploring EBGP Interdomain Routing with BGP BGP Operations Types of BGP Neighbour Relationships BGP Path Selection BGP Path Attributes Implementing Network Redundancy Need for Default Gateway Redundancy Define FHRP HSRP Advanced Features Cisco Switch High Availability Features Implementing NAT Define Network Address Translation NAT Address Types Explore NAT Implementations NAT Virtual Interface Introducing Virtualisation Protocols and Techniques Server Virtualisation Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Introducing Virtualisation Protocols and Techniques Server Virualization Need for Network Virtualisation Path Isolation Overview Introducing VRF Introducing Generic Routing Encapsulation Understanding Virtual Private Networks and Interfaces Site-to-Site VPN Technologies IPSec VPN Overview IPSec: IKE IPsec Modes IPsec VPN Types Cisco IOS VTI Understanding Wireless Principles Explain RF Principles Describe Watts and Decibels Describe Antenna Characteristics Describe IEEE Wireless Standards Identify Wireless Component Roles Examining Wireless Deployment Options Wireless Deployment Overview Describe Autonomous AP Deployment Describe Centralized Cisco WLC Deployment Describe FlexConnect Deployment Cloud Deployment and Its Effect on Enterprise Networks Describe the Cloud-Managed Meraki Solution Cisco Catalyst 9800 Series Controller Deployment Options Describe Cisco Mobility Express Understanding Wireless Roaming and Location Services Wireless Roaming Overview Mobility Groups and Domains Wireless Roaming Types Describe Location Services Examining Wireless AP Operation Universal AP Priming Explore the Controller Discovery Process Describe AP Failover Explain High Availability Explore AP Modes Understanding Wireless Client Authentication Authentication Methods Pre-Shared Key (PSK) Authentication 802.1X User Authentication Overview PKI and 802.1X Certificate Based Authentication Introduction to Extensible Authentication Protocol EAP-Transport Layer Security (EAP-TLS) Protected Extensible Authentication Protocol EAP-FAST Guest Access with Web Auth Troubleshooting Wireless Client Connectivity Wireless Troubleshooting Tools Overview Spectrum Analysis Wi-Fi Scanning Packet Analysis Cisco AireOS GUI and CLI Tools Cisco Wireless Config Analyzer Express Common Wireless Client Connectivity Issues Overview Client to AP Connectivity WLAN Configuration Infrastructure Configuration Introducing Multicast Protocols (Self-study) Multicast Overview Internet Group Management Protocol Multicast Distribution Trees IP Multicasting Routing Rendezvous Point Introducing QoS (Self-study) Understand the Impact of User Applications on the Network Need for Quality of Service (QoS) Describe QoS Mechanisms Define and Interpret a QoS Policy Implementing Network Services Understanding Network Time Protocol Logging Services Simple Network Management Protocol Introducing NetFlow Flexible NetFlow Understanding Cisco IOS Embedded Event Manager Using Network Analysis Tools Troubleshooting Concepts Network Troubleshooting Procedures: Overview Network Troubleshooting Procedures: Case Study Basic Hardware Diagnostics Filtered Show Commands Cisco IOS IP SLAs Switched Port Analyzer(SPAN) Overview Remote SPAN (RSPAN) Encapsulated Remote Switched Port Analyzer(ERSAPN) Cisco Packet Capture Tools Overview Implementing Infrastructure Security ACL Overview ACL Wildcard Masking Types of ACLs Configure Numbered Access Lists Use ACLs to Filter Network Traffic Apply ACLs to Interfaces Configured Named Access Lists Control Plane Overview Control Plane Policing Implementing Secure Access Control Securing Device Access AAA Framework Overview Benefits of AAA Usage Authentication Options RADIUS and TACACS+ Enabling AAA and Configuring a Local User for Fallback Configuring RADIUS for Console and VTY Access Configuring TACACS+ for Console and VTY Access Configure Authorization and Accounting Understanding Enterprise Network Security Architecture (Self-study) Explore Threatscape Cisco Intrusion Prevention Systems Virtual Private Networks Content Security Logging Endpoint Security Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Firewall Concepts TrustSec MACsec Identity Management 802.1X for Wired and Wireless Endpoint Authentication MAC Authentication Bypass Web Authentication Exploring Automation and Assurance Using Cisco DNA Centre (Self-study) Need for Digital Transformation Cisco Digital Network Architecture Cisco Intent-Based Networking Cisco DNA Centre Automation Overview Cisco DNA Centre Platform Overview Cisco DNA Centre Design Cisco DNA Centre Inventory Overview Cisco DNA Centre Configuration and Management Overview Onboarding of Network Devices Using Cisco DNA Centre Cisco DNA Centre Software Image Management Overview Cisco DNA Assurance Key Features and Use Cases Cisco DNA Centre Assurance Implementation Workflow Examining the Cisco SD-Access Solution (Self-study) Need for Cisco SD-Access Cisco SD Access Overview Cisco SD-Access Fabric Components Cisco SD-Access Fabric Control Plane Based on LISP Cisco SD-Access Fabric Control Plane Based on VXLAN Cisco SD-Access Fabric Control Plane Based on Cisco TrustSec Role of Cisco ISE and Cisco DNA Centre in SD-Access Cisco SD-Access Wireless Integration Traditional Campus Interoperating with Cisco SD-Access Understanding the Working Principles of the Cisco SD-WAN Solution (Self-study) Need for Software Defined Networking for WAN Cisco SD-WAN Components and Functions Cisco SD-WAN Orchestration Plane Cisco SD-WAN Management Plane- vManage Cisco SD-WAN Control Plane - vSmart Cisco SD-WAN Data Plane - WAN Edge Cisco SD-WAN Programmatic APIs Cisco SD-WAN Automation and Analytics Cisco SD-WAN Terminology Cisco IOS XE and IOS XE SD-WAN Software Flexible Controller Deployment Options Cisco SD-WAN Security Understanding the Basics of Python Programming Describe Python Concepts String Data Types Numbers Data Types Boolean Data Types Script Writing and Execution Analyse Code Introducing Network Programmability Protocols Configuration Management Evolution of Device Management and Programmability Data Encoding Formats Understanding JSON Model Driven Programmability Stack Introduction to YANG Types of YANG Models Understanding NETCONF Explain NETCONF and YANG REST Understanding RESTCONF Protocol Introducing APIs in Cisco DNA Centre and vManage (Self-study) Application Programming Interfaces REST API Response Codes and Results REST API Security Cisco DNA Centre APIs Cisco SD-WAN REST API Overview Labs Lab 1: Investigate the CAM Lab 2: Analyse Cisco Express Forwarding Lab 3: Troubleshoot VLAN and Trunk Issues Lab 4: Tuning STP and Configuring RSTP Lab 5: Configure Multiple Spanning Tree Protocol Lab 6: Troubleshoot EtherChannel Lab 7: Implementing Multiarea OSPF Lab 8: Implement OSPF Tuning Lab 9: Apply OSPF Optimization Lab 10: Implement OSPFv3 Lab 11: Configure and Verify Single-Homed EBGP Lab 12: Implementing HSRP Lab 13: Configure VRRP Lab 14: Implement NAT Lab 15: Configure and Verify VRF Lab 16: Configure and Verify a GRE Tunnel Lab 17: Configure Static VTI Point-to-Point Tunnels Lab 18: Configure Wireless Client Authentication in a Centralized Deployment (No Extended Access) Lab 19: Troubleshoot Wireless Client Connectivity Issues (No Extended Access) Lab 20: Configure Syslog Lab 21: Configure and Verify Flexible NetFlow Lab 22: Configuring Cisco IOS Embedded Event Manager (EEM) Lab 23: Troubleshoot Connectivity and Analyse Traffic with Ping, Traceroute and Debug Lab 24: Configure and Verify Cisco IP SLA's Lab 25: Configure Standard and Extended ACLs Lab 26: Configure Control Plane Policing Lab 27: Implement Local and Server-Based AAA (No Extended Access) Lab 28: Writing and Troubleshooting Python Scripts (No Extended Access) Lab 29: Explore JSON Objects and Scripts in Python (No Extended Access) Lab 30: Use NETCONF via SSH (No Extended Access) Lab 31: Use RESTCONF with Cisco IOS XE Software (No Extended Access) [-]
Les mer
Virtuelt eller personlig 4 dager 12 100 kr
17 Jun
Kurset vil gi en grundig gjennomgang av hovedkommandoene i Inventor. Deltagerne vil også få nødvendig forståelse for prinsipper og arbeidsmetoder i programmet. [+]
Etter gjennomført kurs skal kursdeltagerne bla. kunne bruke Inventor til å:• Lage modeller• Generere tegninger ut i fra modell• Lage sammenstillinger• Utføre de vanligste tegne- og editeringsfunksjoner• Målsette og påføre tekstKursinnhold:• Grunnleggende begrep og arbeidsmetoder • Parametrisk part-modellering• Arbeide med skisser• Features• Arbeide med sammenstillinger• 2D-layout - oppsett og innstillinger• Generere 2D-tegninger fra modell• Målsetting og innsetting av stykklister [-]
Les mer
Oslo Bergen 4 dager 28 900 kr
10 Jun
10 Jun
26 Aug
Kubernetes Administration (LFS458) [+]
Kubernetes Administration (LFS458) [-]
Les mer
Oslo Bergen 2 dager 12 900 kr
26 May
26 May
03 Sep
Automatisering i Microsoft 365 med Power Automate [+]
Automatisering i Microsoft 365 med Power Automate [-]
Les mer