IT-kurs
Du har valgt: Operativsystemer
Nullstill
Filter
Ferdig

-

Nettbasert kurs 10 timer 1 275 kr
Kurset gir deg en opplevelsesrik og praktisk opplæring i Windows 8.1. En kombinasjon av videoer, teori, oppskrifter, oppgaver og tester gjør det enkelt å lære seg de nye ... [+]
Jobb smart og effektivt! - Microsoft-kontoen synkroniserer innstillinger mellom enheter med Windows 8.1/Windows 8.1 RT. - Støtte for berøringsskjermer. - Raskere oppstart og avslutning. - Låseskjerm ved pålogging. - Kontopassord, bildepassord eller PIN-kode kan brukes ved pålogging. - Startskjermen inneholder all den informasjonen du trenger, samlet på ett sted. - En mengde forhåndsinstallerte apper finnes på startskjermen. - Forbedret søk etter apper, innstillinger og filer på datamaskinen, nettet og OneDrive. - De nye appene er berøringskompatible og utnytter hele skjermen til å presentere innholdet. - Opptil fire apper kan vises side ved side, avhengig av skjermoppløsningen. - Forbedret applikasjonsbutikk, Windows Store, hvor du kan prøve, kjøpe og laste ned apper. - Mange apper i Windows Store er gratis. - Ekstra lagringsplass på OneDrive for dokumenter, bilder eller andre filer. - Oppstart kan nå skje direkte til skrivebordet, slik at du slipper å gå via startskjermen. - Start-knappen er tilbake. - Filutforsker har nå båndbasert brukergrensesnitt. - De fleste innstillingene for datamaskinen finnes under PC-innstillinger. Innholdsfortegnelse: BLI KJENT MED WINDOWS 8.1 Windows 8.1 Microsoft-konto Berøringsskjerm Berøringstastatur Starte Windows 8.1 Startskjermen Fliser og grupper Perlene Tilpasse startskjermen Åpne og lukke apper Søk Bytte til en annen konto Avslutte Windows 8.1   ARBEIDE MED APPER Appkommandoer Skrive ut fra en app Bytte mellom apper Apper side ved side Dele filer og elementer Windows Store Internet Explorer OneDrive   SKRIVEBORDET Skrivebordet Starte opp direkte til skrivebordet Oppgavelinjen Arbeide med flere vinduer Filutforsker Filbehandling Kontrollpanel Personalisering   PC-INNSTILLINGER Innstillinger Låseskjerm Enheter Strøm og hvilemodus Diskplass Kontoen din Påloggingsalternativer Andre kontoer Synkroniseringsinnstillinger Windows Update Gjenoppretting Krav til forkunnskaper: Grunnleggende bruk av data.Sertifiserende tester:Etter endt kurs er det muligheter for å avlegge sertifiserende test on-line for Datakortet hos et sertifisert testsenter. Finansiering: LO organiserte kan søke stipend. Klikk: LOs Utdanningsfond, Fagforbundet, Handel og Kontor. Er du organisert i en annen fagforening eller har spørmål, kontakt oss for nærmere informasjon om dine muligheter for stipend. Ta kontakt med din fagforening for å få mer informasjon. Vi hjelper gjerne med søknaden. Vi fakturerer bedrifter og deltagere som ønsker å betale selv.  Bedrifter som ønsker å melde på et større antall deltagere kan ta kontakt for å avtale dette. [-]
Les mer
2 dager 1 350 EUR
This two day course teaches students advanced administration for SUSE Enterprise Storage. The course assumes that students have a basic understanding of Ceph storage, the... [+]
This two day course teaches students advanced administration for SUSE Enterprise Storage. The course assumes that students have a basic understanding of Ceph storage, the RADOS cluster and typical gateways. Key Objectives In this course, attendees will learn the following: Understand Salt and deploy a storage cluster using DeepSea Use the OpenATTIC web management tool to monitor and manage a storage cluster Understand how to use the CephFS filesystem, including both kernel and user space access Edit CRUSH maps to control the placement of data Manage multi-site synchronized deployments of RADOS-GW object gateways Configure Cache Tiering on a storage cluster Course Outline   Section 1: Salt and Deepsea Section 2: Monitor and Manage the cluster with OpenATTIC Section 3: The CephFS Cluster Filesystem Section 4: Understanding and Managing CRUSH maps Section 5: Multi-Site RADOS-GW Configuration Section 6: Configuring Cache Tiering [-]
Les mer
4 timer 700 EUR
The course SUSE Linux Enterprise Live Patching 12 Administration teaches system administrators how to use SUSE Linux Enterprise Live Patching 12 to do SUSE Linux kernel u... [+]
The goal of this course is to enable the SLES 12 administrator to Set up SUSE Linux Enterprise Live Patching 12 Perform live kernel patching Perform monitor the live kernel patching process Course Outline 1: SUSE Linux Enterprise Live Patching 12 Basics Understand what SUSE Linux Enterprise Live Patching 12 is Understand how SUSE Linux Enterprise Live Patching 12 works Install SUSE Linux Enterprise Live Patching 12 2: Set up and Use SUSE Linux Enterprise Live Patching 12 Activate kGraft Install kGraft Patches Remove kGraft Patches 3: SUSE Linux Enterprise Live Patching 12 Tools Use the kgr tool 4: SUSE Linux Enterprise Live Patching 12 Troubleshooting Interact with SUSE Support [-]
Les mer
5 dager 2 190 EUR
The course SUSE Linux Enterprise Server 12 Advanced Administration builds upon the SUSE Linux Enterprise Server 12: Administration course and teaches advanced system admi... [+]
SLES 12 comes with several innovative technologies – such as systemd as a SystemV init replacement, GRUB2, UEFI, GPT support, and others. This course covers these innovations and also teaches a system administrator how to administer SLES 12 efficiently and effectively. After attending the course, the student should be capable to administer SLES 12, including systemd, to deal with specialized networking and storage setups, and should have a solid understanding of basic Bash scripts. Attending students should have a good working knowledge of general system configuration and command line work with Linux. In instructor-led classes, students may be offered to take the SUSE Certified Linux Professional Practicum exam in the last afternoon of the class.   Key ObjectivesThe goal of this course is to enable the SLES 12 administrator to Use the Shell efficiently and create Shell scripts Configure IPv6 and manage specialized network configuration setups Manage Storage Manage Processes, the boot process, and Systemd Configure common network services Establish server health and troubleshoot problems 1. Identity and Security Delegation of Privilege (sudo/polkit) ACLs AppArmor 2. Advanced Network Configuration Bonding VLAN IPv6 3. Manage Storage iSCSI MPIO 4. Monitoring and Troubleshooting Configure System Logging Backup/Recovery, Snapper Establish Server Health Troubleshooting 5. Advanced System Administration Configure systemd Understand AutoYaST 6. Network Services SSH xinetd NFSv4 Apache2 Samba 4 7. Shell Scripting Elements of Shell Scripts Control Structures Interactive Scripts [-]
Les mer
Oslo Stockholms län 4 dager 2 800 EUR
01 Oct
26 Nov
The RHCE® Certification lab (RH299) is designed for students seeking a hands-on, lab-based review prior to taking the Red Hat Certified Engineer (RHCE) exam. [+]
The RHCE® Certification lab (RH299) is designed for students seeking a hands-on, lab-based review prior to taking the Red Hat Certified Engineer (RHCE) exam. Students taking this course should have already completed their classroom training and simply be preparing to take or retake the exam. During the 4-day course, students will work at their own pace through the complete set of labs from both the RHCSA (Red Hat Certified System Administrator) Rapid Track course (RH199) and Red Hat System Administration III (RH254). The RHCE Certification Lab course includes a few instructor lectures designed to review key technologies such as systemd, firewalld, and IPv6. For the classroom and virtual classroom versions of this course, an instructor will be available throughout the week to assist students as they work through the labs.   Language: Spoken language in the training will be english unless all students are comfortable/familiar with norwegian. Training material is in english.   Course content summary Managing and troubleshooting systemd services during the boot process Network configuration and basic troubleshooting Managing local storage, creating and using file systems Firewall management with firewalld Automating installation of Red Hat Enterprise Linux® using kickstart Manage SELinux settings Using NFS and Samba shared filesystems iSCSI initiator and target configuration Domain Name System (DNS) troubleshooting and caching name server Providing Network File System (NFS) and Server Message Block (SMB) file servers Apache HTTPD web server management MariaDB SQL datbase configuration Postfix Simple Mail Transfer Protocol (SMTP) nullclient for servers Bash scripting for automation   Outline for this course Local and remote logins Review methods for accessing the system and engaging Red Hat Support.   File system navigation Copy, move, create, delete, link, and organize files while working from the Bash shell prompt.   Users and groups Manage Linux users and groups and administer local password policies.   File permissions Control access to files and directories using permissions and access control lists (ACLs).   SELinux permissions Manage the SELinux behavior of a system to keep it secure in case of a network service compromise.   Process management Evaluate and control processes running on a Red Hat Enterprise Linux system.   Updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories.   Creating and mounting file systems Create and manage disks, partitions, and filesystems from the command line.   Service management and boot troubleshooting Control and monitor system daemons and troubleshoot the Red Hat Enterprise Linux boot process.   Network configuration Configure basic IPv4 networking on Red Hat Enterprise Linux systems.   System logging and ntp Locate and accurately interpret relevant system log files for troubleshooting purposes.   Logical volume management Create and manage logical volumes from the command line.   Scheduled processes Schedule tasks to automatically execute in the future.   Mounting network file systems Use autofs and the command line to mount and unmount network storage with NFS and SMB.   Firewall configuration Configure a basic firewall.   Virtualization and kickstart Automate the installation of Red Hat Enterprise Linux on virtual machines with kernel-based virtual machine (KVM) and libvirt.   Managing IPv6 networking Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems.   Configuring link aggregation and bridging Configure and troubleshoot advanced network interface functionality including bonding, teaming, and local software bridges.   Controlling network port security Permit and reject access to network services using advanced SELinux and firewalld filtering techniques.   Managing DNS for Servers Set and verify correct DNS records for systems and configure secure-caching DNS.   Configuring E-mail Delivery Relay all e-mail sent by the system to a SMTP gateway for central delivery.   Providing block-based storage Provide and use networked iSCSI block devices as remote disks.   Providing file-based storage Provide NFS exports and SMB file shares to specific systems and users.   Configuring MariaDB databases Provide a MariaDB SQL database for use by programs and database administrators.   Providing Apache HTTPD Web Service Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts.   Writing Bash scripts Write simple shell scripts using Bash.   Bash conditionals and control structures Use Bash conditionals and other control structures to write more sophisticated shell commands and scripts.   Configuring the shell environment Customize Bash startup and use environment variables, Bash aliases, and Bash functions.   [-]
Les mer
Nettbasert kurs 2 timer 1 310 kr
01 Nov
04 Feb
03 Jun
Instruktørbasert opplæring: Skal du ta i bruk Windows 10? Delta på vårt webinar å få et overblikk over de viktigste funksjonene og arbeidsmetodene i Windows 10! [+]
Instruktørbasert opplæring: Opplev Windows 10 Nyheter i Windows 10 Startmeny Innstillinger, forbedret brukeropplevelser i Windows 10 Edge - Den nye nettleseren i Windows Oppgavevisning / Flere skrivebord Handlingssenter Touch Håndbevegelser Continuum - En enhet fra Laptop til mobiltelefon Kontoer i Windows 10 Lokal konto Windows Hello - Nye påloggingsmetoder MS konto Azure konto Domene konto   3 gode grunner til å delta 1. Lær hvordan du kommer i gang med Windows 10 2. Benytt mulighetene i Windows 10 3. Bli en effektiv Windows 10 bruker [-]
Les mer
4 timer 600 EUR
The Red Hat Certificate of Expertise in Server Hardening exam (EX413) tests candidates' knowledge, skills, and abilities to apply standards-based best practices. [+]
Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. [-]
Les mer
3 dager 12 500 kr
This course takes you through topics like common security issues, threats and attacks, cryptography, and multiple security mechanisms within Linux. [+]
Goals You will be left with a broader understanding of what computer security means and have an opinion on what can and should be done in your own network. You will master setup and configuration of intrusion detection (IDS) and firewall, and enable security mechanisms go safeguarding your own network. You will also get to know about encryption - how it works, and how to use it properly. [-]
Les mer
2 dager 1 350 EUR
This new 2 day course covers covers the System Security Service Daemon (SSSD) as deployed on the SLES 12 platform. [+]
This new 2 day course covers  covers the System Security Service Daemon (SSSD) as deployed on the SLES 12 platform. The SSSD, designed for and available for nearly all Linux distributions, is fast becoming the Linux server authentication framework of choice. Comprehensive documentation and technical instruction on the concepts, use cases and deployment techniques for system administrators is still difficult to obtain. This course attempts to do just that.     [-]
Les mer
Nettbasert kurs 10 timer 1 275 kr
På forespørsel
Kurset gir deg en opplevelsesrik og praktisk opplæring i Windows 7. En kombinasjon av videoer, teori, oppskrifter, oppgaver og tester gjør det enkelt å... [+]
Kurset gir deg en opplevelsesrik og praktisk opplæring i Windows 7. En kombinasjon av videoer, teori, oppskrifter, oppgaver og tester gjør det enkelt å lære seg de nye "smarte" funksjonene. Kurset inneholder over 70 ulike opplæringsvideoer. Jobb smart og effektivt! Enklere, bedre og mer tilpasningsdyktig oppgavelinje. Hopplister med de ti sist brukte filene for hvert program på startmenyen og oppgavelinjen. Søk overalt, både i startmenyen og i Windows Utforsker. Biblioteker samler f. eks. dokumenter, bilder og musikk på ett sted. Miniprogrammer og klistrelapper direkte på skrivebordet. Forhåndsvisning av vinduer ved hjelp av miniatyrbilder. Enkel vindusbehandling med funksjonene Fest, Aero Shake og Aero-kikking. Tema med skrivebordsbakgrunn, vindusfarge, lyder og skjermbeskytter samlet i ett valg. Skrivebordsbakgrunner med lysbildeframvisning. Sikkerhets- og vedlikeholdsmeldinger samlet på ett sted i det forbedrede handlingssenteret. Innholdsfortegnelse: Bli kjent med Windows 7 Oppstart og pålogging Skrivebordet og oppgavelinjen Aero Programmer Avslutning Hjelpesystemet Skrivebordet Startmenyen Oppgavelinjen Miniprogrammer Klistrelapper Skrivebordsikoner Vinduer Vinduer Håndtering av vinduer Funksjonen Fest Funksjonen Aero Shake Funksjonen Aero-kikking Funksjonen Flip 3D Innstillinger Kontrollpanelet Informasjon om datamaskinen Dato og klokkeslett Volum Tema Skrivebordsbakgrunn Vindusfarge Lyder Skjermbeskytter Skjermoppløsning Skriftstørrelse på skjermen Mus Inndataspråk Installering Enheter og skrivere Programvare Windows-funksjoner Windows Live Essentials Windows Update Handlingssenter Systemgjenoppretting Oppgavebehandling Datavirus Windows Defender Filer, mapper og biblioteker Filer Mapper Biblioteker Snarveier Stasjoner Lagringsenheter Filbehandling Mappevinduet Visninger Flytting og kopiering Sletting og gjenoppretting Komprimering Vedlegg Tekstbehandling Programvinduet Innskriving Lagring Åpning Merking Sletting Flytting og kopiering Skjermdumper Utskriftsformat Forhåndsvisning Utskrift Utskriftskø Hurtigtaster Krav til forkunnskaper: Grunnleggende bruk av data.Sertifiserende tester: Etter endt kurs er det muligheter for å avlegge sertifiserende test on-line for Datakortet hos et sertifisert testsenter. Finansiering: LO organiserte kan søke stipend. Klikk: LOs Utdanningsfond, Fagforbundet, Handel og Kontor. Er du organisert i en annen fagforening eller har spørmål, kontakt oss for nærmere informasjon om dine muligheter for stipend. Ta kontakt med din fagforening for å få mer informasjon. Vi hjelper gjerne med søknaden. Vi fakturerer bedrifter og deltagere som ønsker å betale selv.  Bedrifter som ønsker å melde på et større antall deltagere kan ta kontakt for å avtale dette [-]
Les mer
4 dager 3 240 EUR
Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. [+]
Secure a Red Hat Enterprise Linux system to comply with security policy requirements Red Hat® Server Hardening (RH413) builds on a student's Red Hat Certified Engineer (RHCE®) certification or equivalent experience to provide an understanding of how to secure a Red Hat Enterprise Linux® system to comply with security policy requirements. Language: Spoken language in the training will be english unless all students are comfortable/familiar with norwegian. Training material is in english. Course overview Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. This course can also help you prepare for the Red Hat Certificate of Expertise in Server Hardening exam (EX413). Course content summary   Review errata and apply them to Red Hat Enterprise Linux Use special permissions and file system access control lists Manage users and password-aging policy requirements Install and configure Red Hat Identity Management tools Understand system auditing Outline for this course Track security updates Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available.   Manage software updates Develop a process for applying updates to systems including verifying properties of the update.   Create file systems Allocate an advanced file system layout and use file system encryption.   Manage file systems Adjust file system properties through security related options and file system attributes.   Manage special permissions Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled.   Manage additional file access controls Modify default permissions applied to files and directories; work with file access control lists.   Monitor for file system changes Configure software to monitor the files on your machine for changes.   Manage user accounts Set password-aging properties for users; audit user accounts.   Manage pluggable authentication modules (PAMs) Apply changes to PAMs to enforce different types of rules on users.   Secure console access Adjust properties for various console services to enable or disable settings based on security.   Install central authentication Install and configure a Red Hat Identity Management server and client.   Manage central authentication Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems.   Configure system logging Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.   Configure system auditing Enable and configure system auditing.   Control access to network services Manage firewall rules to limit connectivity to network services. [-]
Les mer
2 dager 1 300 EUR
iOS Deployment Essentials is a two-day course that provides students an opportunity to learn about the skills, tools, and knowledge needed to deploy iOS devices. Interact... [+]
iOS Deployment Essentials is a two-day course that provides students an opportunity to learn about the skills, tools, and knowledge needed to deploy iOS devices. Interactive discussions and hands-on exercises guide students through the configuration, management, and supervision of iOS devices. Students’ knowledge and skills are tested and reinforced by working through real-world scenarios. Objectives Define the role of MDM, VPP, and DEP in the successful deployment of iOS devices Identify and respond to challenges when deploying and managing devices without MDM Explain what an Apple ID is and identify when it’s needed Discuss how security is relevant in the context of a given deployment scenario Design and implement a deployment solution for a given scenario Configure DEP registered devices for Over-the-Air Enrollment Configure and manage settings, apps, and content on user-owned and company-owned devices Curriculum Manual configuration: This lesson explores the challenges and inconsistencies when manually configuring multiple devices. Configuration profiles: Students use Apple Configurator to view and edit a configuration profile. Students learn how profiles ensure consistency across multiple devices. Manage settings: This lesson introduces the iOS MDM protocol and explores how an MDM solution is used to configure and manage devices over-the-air with consistency and accountability. Apps and content: This lesson introduces and defines VPP. Students assign apps and content to their user and then configure and test managed 'open in' functionality. Company-owned (personalized): Students configure settings to enable Over-the-Air Enrollment and supervision and learn how users can personalize company-owned devices. Company owned (shared): Students configure and test shared device scenarios. Apps and content are distributed to the devices but users are not able to personalize their device. Scenario workshop: Students are given real-world deployment scenarios. Working in teams, they design a deployment that meets their scenario’s needs and then present their solution to the class. [-]
Les mer
Hvidovre Stockholms län Og 1 annet sted 4 dager 2 660 EUR
22 Oct
12 Nov
19 Nov
Focus is placed on enhancing the students automation skills to securely configure, deploy and manage network services including DNS, Apache, SMTP and network file sharing... [+]
Red Hat System Administration III (RH254) is designed for experienced Linux administrators who require networking and security administration skills. With a heavy emphasis on practical hands on labs, this course is tightly aligned with experienced Linux administrators´ job tasks and the skills required for advancement. Focus is placed on enhancing the students´ automation skills to securely configure, deploy and manage network services including DNS, Apache, SMTP and network file sharing. In addition, this course emphasizes security including monitoring, packet filtering, access controls and SELinux. At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This class does not include the exams, they can be booked separately.   Language: Spoken language in the training will be english unless all students are comfortable/familiar with norwegian. Training material is in english.   Follow up courses and exams: Red Hat Enterprise Linux Troubleshooting (RH142) Red Hat Enterprise Virtualization (RH318) Red Hat Enterprise Security: Network Services (RHS333) Red Hat Enterprise Deployment, Virtualization and Systems Management (RH401) Red Hat Enterprise Directory Services and Authentication (RH423) Red Hat Enterprise SE Linux Policy Administration (RHS429) Red Hat Enterprise Clustering and Storage Management (RH436) Red Hat Enterprise System Monitoring and Performance Tuning (RH442) Includes: 4 days intensive training on Red Hat Enterprise Linux Hands-on labs and exercises Catered lunch One workstation per student Student materials, pre-assessment questionnaire, study aids, handouts Red Hat promotional items All other expenses of travel and per diem are the student´s responsibility. Outline for this course Control services and daemons Review how to manage services and the boot-up process using systemctl Manage IPv6 networking Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems Configure link aggregation and bridging Configure and troubleshoot advanced network interface functionality including bonding, teaming, and local software bridges Control network port security Permit and reject access to network services using advanced SELinux and firewalld filtering techniques Manage DNS for servers Set and verify correct DNS records for systems and configure secure DNS caching Configure email delivery Relay all email sent by the system to an SMTP gateway for central delivery Provide block-based storage Provide and use networked iSCSI block devices as remote disks Provide file-based storage Provide NFS exports and SMB file shares to specific systems and users Configure MariaDB databases Provide a MariaDB SQL database for use by programs and database administrators Provide Apache HTTPD web service Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts Write Bash scripts Write simple shell scripts using Bash Bash conditionals and control structures Use Bash conditionals and other control structures to write more sophisticated shell commands and scripts Configure the shell environment Customize Bash startup and use environment variables, Bash aliases, and Bash functions Linux containers preview Preview the capabilities of Linux containers, Docker, and other related technologies in Red Hat Enterprise Linux 7 Comprehensive review Practice and demonstrate knowledge and skills learned in Red Hat System Administration III [-]
Les mer
3 dager 1 750 EUR
macOS Server Essentials is a three-day course designed to give technical coordinators and entry-level system administrators the skills, tools, and knowledge to implement ... [+]
macOS Server Essentials is a three-day course designed to give technical coordinators and entry-level system administrators the skills, tools, and knowledge to implement and maintain a network that uses macOS Server. Students learn how to install and configure macOS Server to provide network-based services, such as file sharing, authentication, and printing. Tools for efficiently managing and deploying macOS and software updates are also covered. The course is a combination of lectures and hands-on case study exercises that provide practical real-world experience.   Objectives Upon completion of the macOS Server Essentials 10.12 (Sierra 201) course, students will be able to: Utilize the features of Server 5 for macOS Configure essential services on Server for macOS Use Server for macOS tools to monitor and troubleshoot services Use of Server for macOS to manage a small network of Macintosh computers and users Manage access to files and services Topics Part 1: Configuring and Monitoring macOS Server Installing macOS Server Providing DNS Records Exploring the Server App Configuring SSL Certificates Using Status and Notifications Backing Up macOS Server Part 2: Configuring Accounts Managing Local Users Configuring Open Directory Services Managing Local Network Accounts Part 3: Managing Devices with Configuration Profiles Configuring macOS Server to Provide Device Management Managing with Profile Manager Part 4: Sharing Files Configuring the File Sharing Service Defining File Access Part 5: Implementing Deployment Solutions Leveraging NetInstall Caching Content from Apple Implementing the Software Update Service Part 6: Providing Network Services Offering Time Machine Network Backup Providing Security via the VPN Service Providing DHCP Hosting Websites Part 7: Using Collaborative Services  Providing Mail Service Configuring the Wiki Service Implementing the Calendar Service Managing the Contacts Service Providing the Messages Service [-]
Les mer
Oslo 5 dager 24 000 kr
08 Oct
03 Dec
This 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise enviro... [+]
This 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students learn how to plan and implement Windows 10 deployments in large organizations. Students also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access using technologies related to Group Policy, Remote Access, and Device Registration. To support a variety of device and data management solutions, Microsoft Azure Active Directory, Microsoft Intune, and Microsoft Azure Rights Management are introduced. These services are part of the Enterprise Mobility Suite which provide identity and access management, cloud-based device, application, and update management, and secure data access to information stored both in the cloud and on any location within your corporate network.    After completing this course, students will be able to: Describe the challenges and solutions for desktop and device management in an enterprise environment. Deploy Windows 10 Enterprise desktops. Manage user profiles and user state virtualization. Manage Windows 10 sign-in and identity. Manage desktop and application settings by using Group Policy. Manage data access for Windows-based devices. Manage remote access solutions. Configure and manage client Hyper-V. Manage Windows 10 devices by using enterprise mobility solutions. Manage desktop and mobile clients by using Microsoft Intune. Manage updates and endpoint protection by using Microsoft Intune. Manage application and resource access by using Microsoft Intune Innhold: Module 1: Managing Desktops and Devices in an Enterprise Environment This module explains the most current trends and information related to desktop and device management in the enterprise. It also provides an overview on how to extend device management to the cloud. Lessons Managing Windows 10 in the Enterprise Managing a Mobile Workforce Supporting Devices in the Enterprise Extending IT Management and Services to the Cloud Module 2: Deploying Windows 10 Enterprise Desktops This module explains the various deployment scenarios of Windows 10 and the considerations to keep in mind while performing these deployments. This module also explains how to deploy Windows 10 by using the Windows Assessment and Deployment Kit (WADK) and the Microsoft Deployment Toolkit (MDT). This module also explains how to maintain Windows 10 by using DISM and Windows Imaging and Configuration Designer (ICD). Lessons Overview of Windows 10 Enterprise Deployment Customizing Enterprise Desktop Deployments Deploying Windows 10 by Using the Microsoft Deployment Toolkit Maintaining a Windows 10 Installation Managing Volume License Activation for Windows 10 Module 3: Managing User Profiles and User State Virtualization This module explains user states and user state virtualization and explains how to deploy and maintain user experience virtualization (UE-V). This module also explains how to use tools such as ScanState and LoadState to migrate user states. Lessons Managing User Profile and User State Implementing User State Virtualization by Using Group Policy Configuring User Experience Virtualization Managing User State Migration Module 4: Managing Windows 10 Sign-In and Identity This module explains the concept of identity and the methods to enhance identity security. This module also explains cloud identities and the use of Azure Active Directory Premium in enterprise organizations. Lessons Overview of Enterprise Identity Planning for Cloud Identity Integration Module 5: Managing Desktop and Application Settings by Using Group Policy This module explains how to manage Group Policy inheritance, administrative templates, and common enterprise desktop settings. This module also explains how to apply policies using targeting and filtering. Lessons Managing Group Policy Objects Configuring Enterprise Desktops Using Group Policy Overview of Group Policy Preferences Module 6: Managing Data Access for Windows-based Devices This module explains how to implement Device Registrations and Work Folders. This module also explains how to configure and share data stored in Microsoft OneDrive. Lessons Overview of Data Access Solutions Implementing Device Registration Implementing Work Folders Managing Online Data Using Cloud-Based Storage Solutions Module 7: Managing Remote Access Solutions This module explains how to configure a virtual private network (VPN) and DirectAccess in Windows 10. This module also explains how to publish applications in Microsoft Azure RemoteApp. Lessons Overview of Remote Access Solutions Configuring VPN Access to Remote Networks Using DirectAccess with Windows 10 Supporting RemoteApp Module 8: Configuring and Managing Client Hyper-V This module explains how to create virtual switches, virtual hard disks, and virtual machines. Lessons Installing and Configuring Client Hyper-V Configuring Virtual Switches Creating and Managing Virtual Hard Disks Creating and Managing Virtual Machines Module 9: Managing Windows 10 Devices Using Enterprise Mobility Solutions This module explains the use of the Enterprise Mobility Suite and its components, Azure Active Directory Premium, Azure Rights Management, and Microsoft Intune. Lessons Overview of the Enterprise Mobility Suite Overview of Azure Active Directory Premium Overview of Azure Rights Management Overview of Microsoft Intune Module 10: Managing Desktop and Mobile Clients Using Microsoft Intune This module explains how to configure and assign configuration policies. This module also explains how to create Mobile Device Management (MDM) policies and enroll mobile devices to Intune. Lessons Deploying the Intune Client Software Overview of Microsoft Intune Policies Mobile Device Management Using Intune Module 11: Managing Updates and Endpoint Protection Using Microsoft Intune This module explains how to configure updates and Endpoint Protection settings and reports. Lessons Managing Updates Using Microsoft Intune Managing Endpoint Protection Module 12: Application and Resource Access Using Microsoft Intune This module explains how to use the Microsoft Intune Software Publisher and deploy applications to managed clients. This module also explains the use of certificate profiles, Wi-Fi profiles, and VPN profiles to control access to company resources. Lessons Overview of Application Management Using Intune The Application Deployment Process Controlling Access to Company Resources   [-]
Les mer

Lukk Denne siden benytter seg av informasjonskapsler (cookies).
Du kan fortsette å bruke siden som vanlig hvis du godtar dette. Les mer om bruk av informasjonskapsler i vår personvernerklæring.