Oppland
Du har valgt: Sel
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Sel )
 

1 dag 9 500 kr
14 Nov
AZ-1008: Administer Active Directory Domain Services [+]
AZ-1008: Administer Active Directory Domain Services [-]
Les mer
Virtuelt klasserom 4 dager 24 000 kr
MS-500 MICROSOFT 365 SECURITY ADMINISTRATOR [+]
COURSE OVERVIEW This course is comprised of the following Microsoft Official Curriculum modules: MS-500T01 Managing Microsoft 365 Identity and Access, MS-500T02 Implementing Microsoft 365 Threat Protection, MS-500T03 Implementing Microsoft 365 Information Protection and MS-500T04 Administering Microsoft 365 Built-in Compliance.   MS-500T01 Managing Microsoft 365 Identity and Access Help protect against credential compromise with identity and access management. In this course you will learn how to secure user access to your organization’s resources. Specifically, this course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to configure Active Directory federation services, how to setup and use Azure AD Connect, and introduces you to Conditional Access. You will also learn about solutions for managing external access to your Microsoft 365 system.   MS500T02 Implementing Microsoft 365 Threat Protection Threat protection helps stop damaging attacks with integrated and automated security. In this course you will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions for them. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and how to use Microsoft 365 Threat Intelligence. It also discusses securing mobile devices and applications. The goal of this course is to help you configure your Microsoft 365 deployment to achieve your desired security posture.   MS500T03 Implementing Microsoft 365 Information Protection Information protection is the concept of locating and classifying data anywhere it lives. In this course you will learn about information protection technologies that help secure your Microsoft 365 environment. Specifically, this course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, the course explains the deployment of Microsoft Cloud App Security.   MS500T04 Administering Microsoft 365 Built-in Compliance Internal policies and external requirements for data retention and investigation may be necessary for your organization. In this course you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. Specifically, this course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations. The course also helps your organization prepare for Global Data Protection Regulation (GDPR).   Virtual Learning   This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins. TARGET AUDIENCE This course is for the Microsoft 365 security administrator role. This role collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization. COURSE CONTENT Module 1: User and Group Security This module explains how to manage user accounts and groups in Microsoft 365. It introduces you to Privileged Identity Management in Azure AD as well as Identity Protection. The module sets the foundation for the remainder of the course.   Module 2: Identity Synchronization This module explains concepts related to synchronizing identities. Specifically, it focuses on Azure AD Connect and managing directory synchronization to ensure the right people are connecting to your Microsoft 365 system.   Module 3: Federated Identities This module is all about Active Directory Federation Services (AD FS). Specifically, you will learn how to plan and manage AD FS to achieve the level of access you want to provide users from other directories.   Module 4: Access Management This module describes Conditional Access for Microsoft 365 and how it can be used to control access to resources in your organization. The module also explains Role Based Access Control (RBAC) and solutions for external access.   Module 5: Security in Microsoft 365 This module starts by explaining the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions to thwart those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture.   Module 6: Advanced Threat Protection This module explains the various threat protection technologies and services available in Microsoft 365. Specifically, the module covers message protection through Exchange Online Protection, Azure Advanced Threat Protection and Windows Defender Advanced Threat Protection.   Module 7: Threat Intelligence This module explains Microsoft Threat Intelligence which provides you with the tools to evaluate and address cyber threats. You will learn how to use the Security Dashboard in the Microsoft 365 Security and Compliance Center. It also explains and configures Microsoft Advanced Threat Analytics.   Module 8: Mobility This module is all about securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications.   Module 9: Information Protection This module explains information rights management in Exchange and SharePoint. It also describes encryption technologies used to secure messages. The module introduces how to implement Azure Information Protection and Windows Information Protection.   Module 10: Data Loss Prevention This module is all about data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications.   Module 11: Cloud Application Security This module is all about cloud app security for Microsoft 365. The module will explain cloud discovery, app connectors, policies, and alerts.     [-]
Les mer
5 dager 25 500 kr
MS-500: Microsoft 365 Security Administrator [+]
MS-500: Microsoft 365 Security Administrator [-]
Les mer
Oslo Trondheim Og 1 annet sted 5 dager 27 500 kr
20 Oct
27 Oct
27 Oct
AZ-104: Microsoft Azure Administrator [+]
AZ-104: Microsoft Azure Administrator [-]
Les mer
Virtuelt klasserom 5 dager 28 000 kr
The Implementing and Administering Cisco Solutions course provides a broad range of fundamental knowledge for all IT careers. [+]
COURSE OVERVIEW  Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network. The course covers configuring network components such as switches, routers, and Wireless LAN Controllers; managing network devices; and identifying basic security threats. Network programmability, automation, and software-defined networking are also covered at a foundational level.   This course helps you prepare to take the 200-301 Cisco Certified Network Associate (CCNA) exam.   Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you recieve at the beginning of the course and should be part of your preparation for the exam. Lab access is provided for both the class and the self- study sections, lab access is valid for 60 hours or 90 days whichever is the shorter, so please ensure you exit the lab exercises when not in use. TARGET AUDIENCE Anyone looking to start a career in networking or wishing to achieve the Cisco CCNA Certification. COURSE OBJECTIVES After completing this course you should be able to: Identify the components of a computer network and describe their basic characteristics Understand the model of host-to-host communication Describe the features and functions of the Cisco IOS Software Describe LANs and the role of switches within LANs Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches Install a switch and perform the initial configuration Describe the TCP/IP internet Layer, IPv4, its addressing scheme, and subnetting Describe the TCP/IP Transport layer and Application layer Explore functions of routing Implement basic configuration on a Cisco router Explain host-to-host communications across switches and routers Identify and resolve common switched network issues and common problems associated with IPv4 addressing Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity Describe the operation, benefits, and limitations of static routing Describe, implement and verify VLANs and trunks Describe the application and configuration of inter-VLAN routing Explain the basics of dynamic routing protocols and describe components and terms of OSPF Explain how STP and RSTP work Configure link aggregation using EtherChannel Describe the purpose of Layer 3 redundancy protocols Describe basic WAN and VPN concepts Describe the operation of ACLs and their applications in the network Configure internet access using DHCP clients and explain and configure NAT on Cisco routers Describe the basic QoS concepts Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC Describe network and device architectures and introduce virtualization Introduce the concept of network programmability and SDN and describe the smart network management solutions like Cisco DNA Center, SD-Access and SD-WAN Configure basic IOS system monitoring tools Describe the management of Cisco devices Describe the current security threat landscape Describe threat defense technologies Implement a basic security configuration of the device management plane Implement basic steps to harden network devices COURSE CONTENT Exploring the Functions of Networking Introducing the Host-To-Host Communications Model Operating Cisco IOS Software Introducing LANs Exploring the TCP/IP Link Layer Starting a Switch Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets Explaining the TCP/IP Transport Layer and Application Layer Exploring the Functions of Routing Configuring a Cisco Router Exploring the Packet Delivery Process Troubleshooting a Simple Network Introducing Basic IPv6 Configuring Static Routing Implementing VLANs and Trunks Routing Between VLANs Introducing OSPF Building Redundant Switched Topologies (Self-Study) Improving Redundant Switched Topologies with EtherChannel Exploring Layer 3 Redundancy (Self-Study) Introducing WAN Technologies (Self-Study) Explaining Basics of ACL Enabling Internet Connectivity Introducing QoS (Self-Study) Explaining Wireless Fundamentals (Self-Study) Introducing Architectures and Virtualization (Self-Study) Explaining the Evolution of Intelligent Networks Introducing System Monitoring Managing Cisco Devices Examining the Security Threat Landscape (Self-Study) Implementing Threat Defense Technologies (Self-Study) Securing Administrative Access Implementing Device Hardening Labs: Get Started with Cisco CLI Observe How a Switch Operates Perform Basic Switch Configuration Inspect TCP/IP Applications Configure an Interface on a Cisco Router Configure and Verify Layer 2 Discovery Protocols Configure Default Gateway Explore Packet Forwarding Troubleshoot Switch Media and Port Issues Troubleshoot Port Duplex Issues Configure Basic IPv6 Connectivity Configure and Verify IPv4 Static Routes Configure IPv6 Static Routes Configure VLAN and Trunk Configure a Router on a Stick Configure and Verify Single-Area OSPF Configure and Verify EtherChannel Configure and Verify IPv4 ACLs Configure a Provider-Assigned IPv4 Address Configure Static NAT Configure Dynamic NAT and PAT Log into the WLC Monitor the WLC Configure a Dynamic (VLAN) Interface Configure a DHCP Scope Configure a WLAN Define a RADIUS Server Explore Management Options Explore the Cisco DNA Center Configure and Verify NTP Create the Cisco IOS Image Backup Upgrade Cisco IOS Image Configure WLAN Using WPA2 PSK Using the GUI Secure Console and Remote Access Enable and Limit Remote Access Connectivity Secure Device Administrative Access Configure and Verify Port Security Implement Device Hardening TEST CERTIFICATION Recommended as preparation for the following exams:  200-301 -  Cisco Certified Network Associate Exam (CCNA) [-]
Les mer
Oslo 5 dager 32 500 kr
08 Dec
08 Dec
Oracle Database 23ai: Administration Workshop [+]
Oracle Database: Administration Workshop [-]
Les mer
1 dag 9 900 kr
Jira Project Administration (Cloud) [+]
Jira Project Administration (Cloud) [-]
Les mer
1 dag 9 500 kr
26 Sep
07 Nov
Develop dynamic reports with Microsoft Power BI [+]
Develop dynamic reports with Microsoft Power BI [-]
Les mer
4 dager 45 000 kr
01 Sep
29 Sep
20 Oct
DO180: Red Hat OpenShift Administration I: Operating a Production Cluster [+]
DO180: Red Hat OpenShift Administration I: Operating a Production Cluster [-]
Les mer
1 time 889 kr
01 Sep
08 Sep
15 Sep
At NLS Norwegian Language School, we offer personalized one-on-one English tutoring for children and teenagers at all levels. Each session is tailored to strengthen your ... [+]
One-on-One English Homework Help – Primary, Lower Secondary, and Upper Secondary School At NLS Norwegian Language School, we offer personalized one-on-one English tutoring for children and teens at all school levels. Each lesson is adapted to your child’s academic needs, learning pace, and goals – helping them develop strong skills and greater confidence in English. Where can your child learn? Your child can receive tutoring at home, in our classrooms in Oslo, or online – whichever is most convenient for your family. What can your child expect? They will receive lessons tailored to their current level and pace of learning. Sessions cover reading, writing, grammar, pronunciation, and speaking, with a strong focus on comprehension and communication. Regardless of the format, your child will benefit from individual attention and support throughout the course. Who is this service for? This tutoring is ideal for students who want to improve their grades, need help understanding the curriculum, or want to feel more confident using English in school. Get started today Contact us to arrange tutoring and help your child succeed in English. [-]
Les mer
Virtuelt klasserom 150 minutter 7 990 kr
06 Nov
Case: Denne kvelden skal vi planlegge, innkalle og gjennomføre en krevende generalforsamling i selskapet Extender AS. [+]
Case samling 2: «Konflikter og rolleutfordringer på generalforsamlingen»    Deltakelse på denne CASE-kvelden er inkludert i prisen for alle som er med i styrenettverksgrupper arrangert av Styreforeningen. For andre deltakere som er medlemmer av Styreforeningen koster seminaret kr. 4.990,-.For deltakere som ikke er med i styrenettverksgrupper og som ikke er medlemmer av Styreforeningen er prisen kr. 5.990,-   Overskriften for kvelden er: Konflikter og rolleutfordringer på generalforsamlingen Denne kvelden skal vi planlegge, innkalle og gjennomføre en krevende generalforsamling i selskapet Extender AS.   Selskapet har 122 aksjonærer og aksjer fordelt mellom 3 klasser. Det er opprør blant en gruppe av aksjonærene som mener at en av de større aksjonærene med 36% eierskap skaper urimelige fordeler for egne nærstående på de andre aksjonærers bekostning. Det er videre kommet inn ulike forslag til vedtektsendringer som styret må fremme til behandling, herunder utradisjonelle varianter som styret er i tvil om kan innføres i et selskapsvedtekter. Det er krasse fronter hva gjelder styresammensettingen i selskapet, og det har kommet forslag til ny styresammensetting fra valgkomiteen, samt fra hele 3 andre aksjonærgrupperinger. Det er også varslet at det kan komme benkeforslag på enkeltkandidater. En emisjon bør komme i orden og det bør fremlegges en instruks for valgkomiteen da denne føler det vanskelig å vite sitt mandat og sine mulige måter og rammer og arbeide på, eller innenfor. Bli med oss for å løse opp knuter og finne fornuftige løsninger for hvordan håndtere de ulike situasjonene og sakene.   [-]
Les mer
Nettstudie 12 måneder 12 000 kr
A combined module that covers the key concepts of 5 ITIL Practices: Incident Management, Service Desk, Service Request Management, Monitoring and Event Management and Pro... [+]
Understand the purpose and key concepts of the Monitor, Support, and Fulfil practices, elucidating their importance in maintaining, supporting, and delivering IT services effectively.InteractiveOur eLearning:Self-pacedDevice-friendly12 hour contentMobile-optimised Exam:60 questionsMultiple Choice90 minutesClosed bookMinimum required score to pass: 65%  [-]
Les mer
Virtuelt klasserom 150 minutter 7 990 kr
27 Nov
Bli med oss for å løse opp knuter og finne veien videre i casen konflikter og rolleutfordringer i styrereommet! [+]
Case kveld Del 1: Geronimo Management AS   Deltakelse på denne CASE-kvelden er inkludert i prisen for alle som er med i styrenettverksgrupper arrangert av Styreforeningen. For andre deltakere som er medlemmer av Styreforeningen koster seminaret kr. 4.990,-.For deltakere som ikke er med i styrenettverksgrupper og som ikke er medlemmer av Styreforeningen er prisen kr. 5.990,-   Overskriften for kvelden er: Konflikter og rolleutfordringer i styrerommet   Denne kvelden beveger vi oss inn i kulissene for selskapet: Gerinomo Management AS som er et SMB selskap, opprinnelig grundet og eiet av 2 tidligere kamerater: Halvor og Jonas. De to har hatt 30 års fartstid sammen i og med oppbyggingen av selskapet. I løpet av kort tid oppstår to situasjoner: Halvor får akutt hjerteproblemer på vei hjem fra arbeid og dør kort tid etter. Det kommer videre frem at Jonas sin tilstand de siste månedene har vært holdt skjult, men det blir nå klart at han har hurtig eskalerende demens og ikke er istand til å ta vare på seg selv eller selskapet. Vedtektene og aksjonæravtalen har noen bestemmelser om situasjoner som her oppstår, men er ikke dekkende nå som begge eiere er «ute av bildet». Neste generasjon på begge sider ønsker å «rykke inn» for å overta den veldrevne virksomheten. Et styre må på plass og håndtere både utfordringer og muligheter som står foran selskapet. Her må vi inn å analysere: hva som skjer, hva som burde gjøres, hvordan vi kan gå frem for å håndtere ulike situasjoner etc?   Bli med oss for å løse opp knuter og finne veien videre!   [-]
Les mer
Virtuelt klasserom 4 dager 22 000 kr
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solut... [+]
. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.   TARGET AUDIENCE This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. COURSE OBJECTIVES Implement an identity management solution Implement an authentication and access management solutions Implement access management for apps Plan and implement an identity governancy strategy COURSE CONTENT Module 1: Implement an identity management solution Learn to create and manage your initial Azure Active Directory (Azure AD) implementation and configure the users, groups, and external identities you will use to run your solution. Lessons M1 Implement Initial configuration of Azure AD Create, configure, and manage identities Implement and manage external identities Implement and manage hybrid identity Lab 1a: Manage user roles Lab 1b: Setting tenant-wide properties Lab 1c: Assign licenses to users Lab 1d: Restore or remove deleted users Lab 1e: Add groups in Azure AD Lab 1f: Change group license assignments Lab 1g: Change user license assignments Lab 1h: Configure external collaboration Lab 1i: Add guest users to the directory Lab 1j: Explore dynamic groups After completing module 1, students will be able to: Deploy an initail Azure AD with custom settings Manage both internal and external identities Implement a hybrid identity solution Module 2: Implement an authentication and access management solution Implement and administer your access management using Azure AD. Use MFA, conditional access, and identity protection to manager your identity solution. Lessons M2 Secure Azure AD user with MFA Manage user authentication Plan, implement, and administer conditional access Manage Azure AD identity protection Lab 2a: Enable Azure AD MFA Lab 2b: Configure and deploy self-service password reset (SSPR) Lab 2c: Work with security defaults Lab 2d: Implement conditional access policies, roles, and assignments Lab 2e: Configure authentication session controls Lab 2f: Manage Azure AD smart lockout values Lab 2g: Enable sign-in risk policy Lab 2h: Configure Azure AD MFA authentication registration policy After completing module 2, students will be able to: Configure and manage user authentication including MFA Control access to resources using conditional access Use Azure AD Identity Protection to protect your organization Module 3: Implement access management for Apps Explore how applications can and should be added to your identity and access solution with application registration in Azure AD. Lessons M3 Plan and design the integration of enterprise for SSO Implement and monitor the integration of enterprise apps for SSO Implement app registration Lab 3a: Implement access management for apps Lab 3b: Create a custom role to management app registration Lab 3c: Register an application Lab 3d: Grant tenant-wide admin consent to an application Lab 3e: Add app roles to applications and recieve tokens After completing module 3, students will be able to: Register a new application to your Azure AD Plan and implement SSO for enterprise application Monitor and maintain enterprise applications Module 4: Plan and implement an identity governancy strategy Design and implement identity governance for your identity solution using entitlement, access reviews, privileged access, and monitoring your Azure Active Directory (Azure AD). Lessons M4 Plan and implement entitlement management Plan, implement, and manage access reviews Plan and implement privileged access Monitor and maintain Azure AD Lab 4a: Creat and manage a resource catalog with Azure AD entitlement Lab 4b: Add terms of use acceptance report Lab 4c: Manage the lifecycle of external users with Azure AD identity governance Lab 4d: Create access reviews for groups and apps Lab 4e: Configure PIM for Azure AD roles Lab 4f: Assign Azure AD role in PIM Lab 4g: Assign Azure resource roles in PIM Lab 4h: Connect data from Azure AD to Azure Sentinel After completing module 4, students will be able to: Mange and maintain Azure AD from creation to solution Use access reviews to maintain your Azure AD Grant access to users with entitlement management [-]
Les mer
Bedriftsintern
Vårt kursprogram for åpne lean kurs og bedriftsinterne kurs består av: Lean Gult, Grønt og sort Belte, Lean Construction og Lean Prosjektering. Vi skreddersyr vi interne... [+]
Vi gir DEG kompetanse slik at DU SELV skaper resultater i egen virksomhet!! Kompetansen gir vi deg gjennom rådgiving, åpne kurs og interne kurs.Våre Lean kompetansesertifikater bygger på internasjonalt anerkjente standarder for Lean kompetanse. Vi setter dine mål for lean! VI LEVER LEAN i kurset. Slik sikres at du når dine mål og overstiger dine forventninger til kurset! Du vil oppleve at Lean kan brukes av alle, hver dag, overalt! Vi viser deg hvordan du kommer fra Ord til Handling , og setter deg i stand til å handle. Ved bruk av praktiske øvelser og spill, simulering og rollespill, refleksjoner og diskusjoner blir du engasjert og sterkt deltagende i kurset. Er solid bygget på Lean teori og presentert på en spennende og engasjerende måte. Vi byr på gode eksempler fra hverdagen og egen erfaring.   Lean Gult belte sertifisering er første steg i vårt sertifiseringsprogram, og du kan bygge videre til grønt og sort belte. Sertifikatene er anerkjente kompetansebevis innen lean. Kurset går over to dager og vil gi deg kunnskap og verktøy til å bidra direkte på din arbeidsplass.   Lean Grønt belte sertifisering er den nest høyeste i vårt sertifiseringsprogram. Sertifikatene er anerkjente kompetansebevis innen lean. På Lean Grønt Belte kurs vil du få en dypere innføring i Lean og kjerneelementer for å starte og gjennomføre Lean i din virksomhet. Du vil få verdifull kunnskap om hvordan du kan designe og lede et lean prosjekt. Rollespill i ledelse og endringsledelse og endringsmotstand.    Sort belte sertifisering er den høyeste nivå i vårt sertifiseringsprogram. Du vil få en bredere og dypere forståelse for mangfoldet i Lean. Du får inspirasjon og vil bli i stand til å gjøre trygge Lean valg som gjør din virksomhet til «en bedre versjon av seg selv». Kunnskapen du får vil gi deg faglig tryggheten til å designe og lede Lean–prosesser på en effektiv måte i egen virksomhet. Du vil av arbeidsgiver bli vurdert som en naturlig sentral ressurs i strategiske forbedringsprosjekter.   Lean Construction kurs gir deg du en grunnleggende innføring i Lean og bruk av Lean i prosjekter. Utstrakt bruk av praktiske øvelser,  spennende teori og simulatorspillet "Husbyggeren" er en vekker for de fleste. Du får innsikt og verktøy til å bidra direkte på din arbeidsplass og i / på prosjektet.   Lean Posjektering (VDC) kurs. Få økt lønnsomhet i prosjektene ved å se hele prosjektet. Bruk av Lean metodikk i prosjektering og gjennomføring sikrer raskere prosjektering med betydelig høyere kvalitet. Grensesnitt mellom fag fanges opp på en helt annen måte enn tradisjonelt, ved å gå fra sekvensiell til samtidig prosjektering. Kurset gir deg innsikt og verktøy til å bidra direkte i prosjekter og fagmiljøer.   Gjennomføring Ved påmelding mottar du en link til din kursportal. I portalen kan du: Laste ned kompendier og materiell. Ta eksamen. Laste ned kursbevis ved bestått eksamen Gå til Virtuelt klasserom - når kurset et digitalt. Ved fysisk kurs er lunsj og enkel bevertning underveis inkludert. [-]
Les mer