IT-kurs
Du har valgt: Sikkerhetskurs for IT
Nullstill
Filter
Ferdig

-

34 treff i Sikkerhetskurs for IT
 

Nettstudie 2 semester 4 980 kr
På forespørsel
Generell nettverkssikkerhet. Hvordan planlegge, organisere og sette sikkerhet i små og store nettverk. Brannmurer, VPN, IDS/IPS. Sikkerhet rundt epost, trådløse nett og r... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Faget «Datakommunikasjon» eller tilsvarende grunnleggende fag. (TCP/IP forutsettes kjent). Faget «Nettverksteknologi» Innleveringer: Øvinger: 8 av 12 må være godkjent. Øvingene må dekke en bred del av pensum. Vurderingsform: Skriftlig, individuell, 3 timer, Ansvarlig: Helge Hafting Eksamensdato: 04.12.13 / 07.05.14         Læremål: KUNNSKAPER:Kandidaten:- kan forklare en del protokollbaserte farer/angrep i kablede og trådløse nett- kan gjøre rede for mottiltak mot angrepene over- kan gjøre rede for andre farer og mottiltak, som fysiske sikringstiltak og «social engineering»- kan gjøre rede for og planlegge bruk av vanlige sikringstiltak som IDS, IPS, VPN og proxyer FERDIGHETER:Kandidaten kan:- sette i drift et VPN- installere brannmur- Observere nettverkstrafikk med pakkesniffer GENERELL KOMPETANSE:Kandidaten:- kan granske sikkerheten i et nettverk, og velge passende tiltak.Innhold:Generell nettverkssikkerhet. Hvordan planlegge, organisere og sette sikkerhet i små og store nettverk. Brannmurer, VPN, IDS/IPS. Sikkerhet rundt epost, trådløse nett og rutere. En del vanlige angrep, og mottiltak.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Nettverkssikkerhet 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Klasserom + nettkurs 4 dager 21 000 kr
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. COURSE OBJECTIVES After you complete this course you will be able to: Use administrative techniques and tools in Windows Server. Identify tools used to implement hybrid solutions, including Windows Admin Center and PowerShell. Implement identity services in Windows Server. Implement identity in hybrid scenarios, including Azure AD DS on Azure IaaS and managed AD DS. Integrate Azure AD DS with Azure AD. Manage network infrastructure services. Deploy Azure VMs running Windows Server, and configure networking and storage. Administer and manage Windows Server IaaS Virtual Machine remotely. Manage and maintain Azure VMs running Windows Server. Configure file servers and storage. Implement File Services in hybrid scenarios, using Azure Files and Azure File Sync. COURSE CONTENT Module 1: Identity services in Windows Server This module introduces identity services and describes Active Directory Domain Services (AD DS) in a Windows Server environment. The module describes how to deploy domain controllers in AD DS, as well as Azure Active Directory (AD) and the benefits of integrating Azure AD with AD DS. The module also covers Group Policy basics and how to configure group policy objects (GPOs) in a domain environment. Lessons for module 1 Introduction to AD DS Manage AD DS domain controllers and FSMO roles Implement Group Policy Objects Manage advanced features of AD DS Lab : Implementing identity services and Group Policy Deploying a new domain controller on Server Core Configuring Group Policy After completing module 1, students will be able to: Describe AD DS in a Windows Server environment. Deploy domain controllers in AD DS. Describe Azure AD and benefits of integrating Azure AD with AD DS. Explain Group Policy basics and configure GPOs in a domain environment. Module 2: Implementing identity in hybrid scenarios This module discusses how to configure an Azure environment so that Windows IaaS workloads requiring Active Directory are supported. The module also covers integration of on-premises Active Directory Domain Services (AD DS) environment into Azure. Finally, the module explains how to extend an existing Active Directory environment into Azure by placing IaaS VMs configured as domain controllers onto a specially configured Azure virtual network (VNet) subnet. Lessons for module 2 Implement hybrid identity with Windows Server Deploy and manage Azure IaaS Active Directory domain controllers in Azure Lab : Implementing integration between AD DS and Azure AD Preparing Azure AD for AD DS integration Preparing on-premises AD DS for Azure AD integration Downloading, installing, and configuring Azure AD Connect Verifying integration between AD DS and Azure AD Implementing Azure AD integration features in AD DS After completing module 2, students will be able to: Integrate on-premises Active Directory Domain Services (AD DS) environment into Azure. Install and configure directory synchronization using Azure AD Connect. Implement and configure Azure AD DS. Implement Seamless Single Sign-on (SSO). Implement and configure Azure AD DS. Install a new AD DS forest on an Azure VNet. Module 3: Windows Server administration This module describes how to implement the principle of least privilege through Privileged Access Workstation (PAW) and Just Enough Administration (JEA). The module also highlights several common Windows Server administration tools, such as Windows Admin Center, Server Manager, and PowerShell. This module also describes the post-installation confguration process and tools available to use for this process, such as sconfig and Desired State Configuration (DSC). Lessons for module 3 Perform Windows Server secure administration Describe Windows Server administration tools Perform post-installation configuration of Windows Server Just Enough Administration in Windows Server Lab : Managing Windows Server Implementing and using remote server administration After completing module 3, students will be able to: Explain least privilege administrative models. Decide when to use privileged access workstations. Select the most appropriate Windows Server administration tool for a given situation. Apply different methods to perform post-installation configuration of Windows Server. Constrain privileged administrative operations by using Just Enough Administration (JEA). Module 4: Facilitating hybrid management This module covers tools that facilitate managing Windows IaaS VMs remotely. The module also covers how to use Azure Arc with on-premises server instances, how to deploy Azure policies with Azure Arc, and how to use role-based access control (RBAC) to restrict access to Log Analytics data. Lessons for module 4 Administer and manage Windows Server IaaS virtual machines remotely Manage hybrid workloads with Azure Arc Lab : Using Windows Admin Center in hybrid scenarios Provisioning Azure VMs running Windows Server Implementing hybrid connectivity by using the Azure Network Adapter Deploying Windows Admin Center gateway in Azure Verifying functionality of the Windows Admin Center gateway in Azure After completing module 4, students will be able to: Select appropriate tools and techniques to manage Windows IaaS VMs remotely. Explain how to onboard on-premises Windows Server instances in Azure Arc. Connect hybrid machines to Azure from the Azure portal. Use Azure Arc to manage devices. Restrict access using RBAC. Module 5: Hyper-V virtualization in Windows Server This modules describes how to implement and configure Hyper-V VMs and containers. The module covers key features of Hyper-V in Windows Server, describes VM settings, and how to configure VMs in Hyper-V. The module also covers security technologies used with virtualization, such as shielded VMs, Host Guardian Service, admin-trusted and TPM-trusted attestation, and Key Protection Service (KPS). Finally, this module covers how to run containers and container workloads, and how to orchestrate container workloads on Windows Server using Kubernetes. Lessons for module 5 Configure and manage Hyper-V Configure and manage Hyper-V virtual machines Secure Hyper-V workloads Run containers on Windows Server Orchestrate containers on Windows Server using Kubernetes Lab : Implementing and configuring virtualization in Windows Server Creating and configuring VMs Installing and configuring containers After completing module 5, students will be able to: Install and configure Hyper-V on Windows Server. Configure and manage Hyper-V virtual machines. Use Host Guardian Service to protect virtual machines. Create and deploy shielded virtual machines. Configure and manage container workloads. Orchestrate container workloads using a Kubernetes cluster. Module 6: Deploying and configuring Azure VMs This module describes Azure compute and storage in relation to Azure VMs, and how to deploy Azure VMs by using the Azure portal, Azure CLI, or templates. The module also explains how to create new VMs from generalized images and use Azure Image Builder templates to create and manage images in Azure. Finally, this module describes how to deploy Desired State Configuration (DSC) extensions, implement those extensions to remediate noncompliant servers, and use custom script extensions. Lessons for module 6 Plan and deploy Windows Server IaaS virtual machines Customize Windows Server IaaS virtual machine images Automate the configuration of Windows Server IaaS virtual machines Lab : Deploying and configuring Windows Server on Azure VMs Authoring Azure Resource Manager (ARM) templates for Azure VM deployment Modifying ARM templates to include VM extension-based configuration Deploying Azure VMs running Windows Server by using ARM templates Configuring administrative access to Azure VMs running Windows Server Configuring Windows Server security in Azure VMs After completing module 6, students will be able to: Create a VM from the Azure portal and from Azure Cloud Shell. Deploy Azure VMs by using templates. Automate the configuration of Windows Server IaaS VMs. Detect and remediate noncompliant servers. Create new VMs from generalized images. Use Azure Image Builder templates to create and manage images in Azure. Module 7: Network infrastructure services in Windows Server This module describes how to implement core network infrastructure services in Windows Server, such as DHCP and DNS. This module also covers how to implement IP address managment and how to use Remote Access Services. Lessons for module 7 Deploy and manage DHCP Implement Windows Server DNS Implement IP address management Implement remote access Lab : Implementing and configuring network infrastructure services in Windows Server Deploying and configuring DHCP Deploying and configuring DNS After completing module 7, students will be able to: Implement automatic IP configuration with DHCP in Windows Server. Deploy and configure name resolution with Windows Server DNS. Implement IPAM to manage an organization’s DHCP and DNS servers, and IP address space. Select, use, and manage remote access components. Implement Web Application Proxy (WAP) as a reverse proxy for internal web applications. Module 8: Implementing hybrid networking infrastructure This module describes how to connect an on-premises environment to Azure and how to configure DNS for Windows Server IaaS virtual machines. The module covers how to choose the appropriate DNS solution for your organization’s needs, and run a DNS server in a Windows Server Azure IaaS VM. Finally, this module covers how to manage manage Microsoft Azure virtual networks (VNets) and IP address configuration for Windows Server infrastructure as a service (IaaS) virtual machines. Lessons for module 8 Implement hybrid network infrastructure Implement DNS for Windows Server IaaS VMs Implement Windows Server IaaS VM IP addressing and routing Lab : Implementing Windows Server IaaS VM networking Implementing virtual network routing in Azure Implementing DNS name resolution in Azure After completing module 8, students will be able to: Implement an Azure virtual private network (VPN). Configure DNS for Windows Server IaaS VMs. Run a DNS server in a Windows Server Azure IaaS VM. Create a route-based VPN gateway using the Azure portal. Implement Azure ExpressRoute. Implement an Azure wide area network (WAN). Manage Microsoft Azure virtual networks (VNets). Manage IP address configuration for Windows Server IaaS virtual machines (VMs). Module 9: File servers and storage management in Windows Server This module covers the core functionality and use cases of file server and storage management technologies in Windows Server. The module discusses how to configure and manage the Windows File Server role, and how to use Storage Spaces and Storage Spaces Direct. This module also covers replication of volumes between servers or clusters using Storage Replica. Lessons for module 9 Manage Windows Server file servers Implement Storage Spaces and Storage Spaces Direct Implement Windows Server Data Deduplication Implement Windows Server iSCSI Implement Windows Server Storage Replica Lab : Implementing storage solutions in Windows Server Implementing Data Deduplication Configuring iSCSI storage Configuring redundant Storage Spaces Implementing Storage Spaces Direct After completing module 9, students will be able to: Configure and manage the Windows Server File Server role. Protect data from drive failures using Storage Spaces. Increase scalability and performance of storage management using Storage Spaces Direct. Optimize disk utilization using Data DeDuplication. Configure high availability for iSCSI. Enable replication of volumes between clusters using Storage Replica. Use Storage Replica to provide resiliency for data hosted on Windows Servers volumes. Module 10: Implementing a hybrid file server infrastructure This module introduces Azure file services and how to configure connectivity to Azure Files. The module also covers how to deploy and implement Azure File Sync to cache Azure file shares on an on-premises Windows Server file server. This module also describes how to manage cloud tiering and how to migrate from DFSR to Azure File Sync. Lessons for module 10 Overview of Azure file services Implementing Azure File Sync Lab : Implementing Azure File Sync Implementing DFS Replication in your on-premises environment Creating and configuring a sync group Replacing DFS Replication with File Sync–based replication Verifying replication and enabling cloud tiering Troubleshooting replication issues After completing module 10, students will be able to: Configure Azure file services. Configure connectivity to Azure file services. Implement Azure File Sync. Deploy Azure File Sync Manage cloud tiering. Migrate from DFSR to Azure File Sync.   [-]
Les mer
Virtuelt klasserom 5 dager 38 000 kr
(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the re... [+]
COURSE OVERVIEW A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration. This professional competence is measured against a globally recognized body of knowledge. The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)²’s Certified Information Systems Security Professional (CISSP) and CSA’s Certificate of Cloud Security Knowledge (CCSK). As an (ISC)2 Official Training Provider, we use courseware developed by (ISC)² –creator of the CCSP CBK –to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CCSP and have completed intensive training to teach (ISC)² content. Please Note: An exam voucher is included with this course   TARGET AUDIENCE Experienced cybersecurity and IT/ICT professionals who are involved in transitioning to and maintaining cloud-basedsolutions and services. Roles include:• Cloud Architect• Chief Information Security Officer (CISO)• Chief Information Officer (CIO)• Chief Technology Officer (CTO)• Engineer/Developer/Manager• DevOps• Enterprise Architect• IT Contract Negotiator• IT Risk and Compliance Manager• Security Administrator• Security Analyst• Security Architect• Security Consultant• Security Engineer• Security Manager• Systems Architect• Systems Engineer• SecOps   COURSE OBJECTIVES After completing this course you should be able to:   Describe the physical and virtual components of and identify the principle technologies of cloud based systems Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations Contrast between forensic analysis in corporate data center and cloud computing environments Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing Identify and explain the six phases of the data lifecycle Explain strategies for protecting data at rest and data in motion Describe the role of encryption in protecting data and specific strategies for key management Compare a variety of cloud-based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements Contrast security aspects of Software Development Lifecycle (SDLC) in standard data center and cloud computing environments Describe how federated identity and access management solutions mitigate risks in cloud computing systems Conduct gap analysis between baseline and industry-standard best practices Develop Service Level Agreements (SLAs) for cloud computing environments Conduct risk assessments of existing and proposed cloud-based environments State the professional and ethical standards of (ISC)² and the Certified Cloud Security Professional COURSE CONTENT   Domain 1. Cloud Concepts, Architecture and Design Domain 2. Cloud Data Security Domain 3. Cloud Platform & Infrastructure Security Domain 4. Cloud Application Security Domain 5. Cloud Security Operations Domain 6. Legal, Risk and Compliance TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)² - Certified Cloud Security Professional  Gaining this accreditation is not just about passing the exam, there are a number of other criterias that need to be met including 5  years of cumulative, paid work experience in  information technology, of which 3 years must be in information security and 1 year in 1 or more of the 6 domains of the CCSP CBK. Earning CSA’s CCSK certificate can be substituted for 1 year of experience in 1 or more of the 6 domains of the CCSP CBK. Earning (ISC)²’s CISSP credential can be substituted for the entire CCSP experience requirement. Full details can be found at https://www.isc2.org/Certifications/CCSP Those without the required experience can take the exam to become an Associate of (ISC)²  . The Associate of (ISC)² will then have 6 years to earn the 5 years required experience.   [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Hva menes med sikkerhet, hensikt med sikkerhet, tiltak som kan iverksettes for å oppnå tilsiktet sikkerhet, identifisering av inntrengere, passordsikkerhet, autentisering... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Gode IKT-kunnskaper og god kjennskap til drift av Windows server og prosesser i Windows operativsystem. Innleveringer: For å kunne gå opp til eksamen må 8 øvingsoppgaver være godkjent. Nærmere opplysninger gis ved kursstart Personlig veileder: ja Vurderingsform: Netteksamen på egen PC - 5 timer. Hver student skal bruke virtuelle maskiner under eksamen. Ansvarlig: Stein Meisingseth Eksamensdato: 10.12.13 / 13.05.14         Læremål: KUNNSKAPER: Kandidaten:- har innsikt i hvordan et nettverk kan sikres og hvordan man kan unngå at lokale maskiner, servere eller større nettverk kan bli hacket- kjenner til løsninger for å sikre små og store nettverk FERDIGHETER:Kandidaten:- kan forstå hensikten med å legge stor vekt på sikkerhet- skal kunne oppdage og identifisere inntrengere- skal kunne forhindre eksterne angrep- skal kunne forstå faren med interne angrep- skal kunne lage rutiner for gode passordrutiner, autentiseringssystemer og viruskontroll- forstår hvordan sikkerhet fungerer i Windows 7 og Windows 2008 server- bruker Group Policy til å sette tilpasset sikkerhet- skal kunne bruke og å konfigurere de interne brannmurer i Windows GENERELL KOMPETANSE:Kandidaten har:- perspektiv og kompetanse i å velge riktige løsninger for å oppnå maksimal og tilpasset sikkerhet- kompetanse i generelt sikkerhetsarbeid Innhold:Hva menes med sikkerhet, hensikt med sikkerhet, tiltak som kan iverksettes for å oppnå tilsiktet sikkerhet, identifisering av inntrengere, passordsikkerhet, autentiseringssystemer, viruskontroll, sikkerhet i Windows og 2008 servere, bruk av brannmuren til Windows server 2008, sette sikkerhet i Group Policy, brannvegger generelt, forhindre virus og inntrenging, tiltak for å forhindre angrep utenfra, digitale signaturer.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Datasikkerhet 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Skadelig programvare: sikkerhetshull, informasjonskapsler, virus og antivirus Nettverk: Virtuelle private nett (VPN), brannmur, demilitarisert sone (DMZ), tjenestenektang... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Ingen. Innleveringer: For å kunne gå opp til eksamen må 8 av 12 øvinger være godkjent. Personlig veileder: ja Vurderingsform: Skriftlig, individuell, 3 timer,  Ansvarlig: Olav Skundberg Eksamensdato: 16.12.13 / 26.05.14         Læremål: KUNNSKAPER:Kandidaten kan:- forklare hvordan en datamaskin utsettes for angrep gjennom skadelig programvare og hvordan man kan beskytte seg mot dette- beskrive ulike typer nettbaserte angrep og hvordan man kan beskytte seg mot dette- beskrive ulike krypteringsmekanismer og forklare hvordan digitale sertifikat brukes for å oppnå sikre tjenester.- referere til aktuelle lover og retningslinjer innen sikkerhet- gjøre greie for en organisasjonsmessig informasjonssikkerhetssikkerhetspolicy FERDIGHETER:Kandidaten kan:- kontrollere egen PC for skadelig programvare- kontrollere at installert programvare er oppdatert- utføre pakkefangst med Wireshark og tolke resultatet GENERELL KOMPETANSE:Kandidaten:- er bevisst på å holde programvare oppdatert og å bruke nettvett Innhold:Skadelig programvare: sikkerhetshull, informasjonskapsler, virus og antivirus Nettverk: Virtuelle private nett (VPN), brannmur, demilitarisert sone (DMZ), tjenestenektangrep Sikre tjenester: Krypteringsmetoder og sjekksum. Digitale sertifikater og Public Key Infrastructure (PKI) Samfunn og virksomhet: ekom-loven og personvernloven. Sikkerhetshåndbok og ISO27001Les mer om faget herDemo: Her er en introduksjonsvideo for faget Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Internett og sikkerhet 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.  [-]
Les mer
Nettstudie 1 dag 4 900 kr
Hvordan fylle rollen som personvernombud, og hva må du kunne. Ett kurs for deg som DPO og vil bli bedriftens kompetanse person på GDPR [+]
Personvernforordningen / General Data Protection Regulation (GDPR) Vi går gjennom de deler du må ha kompetanse om, og du får fyldig kursmateriale med deg hjem, slik at du enklere kan mester fagområdet etter kurset. Men på ettdagskurs er det ikke dybdegejnnomgang av områder som DPIA, teknologi og prosess rundt GAP planer. Du får alikevel med deg materiale så du kan lese etterpå. Hva er formålet med forordninga og hvordan forordningen er strukturert. Vi går gjennom  tilsynsmyndighet og hvilke innvirkninger den loven har på Norge, EU og andre land.  Du får kompetanse om hovedpunkter i forordningen med de viktige nøkkelkonsepter, kategorier for personlig informasjon og prinsipper for databeskyttelse. Den registrertes rettigheter og hvordan analyser utfordringer og problemer En viktig kompetanse som mange ikke kjenner godt nok er hvilke roller, forpliktelser og behandlingsaktiviteter som må mestres, så vi ser på personvernombudets betegnelser  Konsekvensanalyse av databeskyttelse og personvernombudet Behandlingsaktiviteter og personvernombudet  Kontrollers ansvar Personvernombudet sitt ansvarRegistrering av behandlingsaktiviteterSamarbeid med tilsynsmyndighetHvordan starte program for å etterleve personvernforordningenHvem må forholde seg til personvernforordningenMetoder og tilnærmingForbered program for personvernforordningenHvordan avdekke mangler  og i dentifiser strategiske målLedelsens ansvar og godkjenning [-]
Les mer
1 dag 3 500 kr
Her fokuserer vi på det en leder bør kunne om Cybersikkerhet, og hvordan bli en bedre kravstiller. [+]
I en digital tidsalder hvor samhandling er essensielt for bedrifters suksess, er det kritisk for ledere å oppdatere sin kompetanse. Dette eendagskurset tilbyr praktisk trening og materiale for videre selvstudium, slik at ledere kan møte dagens databehov effektivt. Kurset fokuserer på tre hovedområder for å styrke deltakernes lederkompetanse innen datahåndtering. Det kombinerer teori og praksis for å maksimere læringen. Kurset avholdes på en enkelt arbeidsdag, med en strukturert agenda som dekker følgende temaer: Strategiske IT/IS-planer, inkludert organisatoriske strukturer, lederansvar, kompetansekartlegging, IT/IS-policyer, og en gjennomgang av IS-domener. Dette inkluderer også sikkerhetsaspekter som aktiva, nettverk, identitets- og tilgangsstyring, risikostyring, sikkerhetsvurdering og -testing, sikkerhetsoperasjoner, og sikkerhet i utviklingsfasen. Intern gapanalyse, oppbygging av en effektiv Enterprise Information Security Architecture (EISA), definering av opplæringskrav, tilpassede SETA-programmer, trusselvurdering, håndtering av sårbarheter, og en praktisk tilnærming til leverandørrisiko og sikkerhetsvurdering av digitale nettverk. Utvikling av KPI-dashboard, trusselvurdering, kommunikasjonsstrategier, introduksjon til økonomiske nøkkeltall innen informasjonssikkerhet, samt planlegging for forretningskontinuitet og katastrofegjenoppretting. Målsetningen er at hver deltaker etter kurset skal kunne sette SMART-mål for hvert punkt, hvor SMART representerer Spesifikke, Målbare, Oppnåelige, Relevante og Tidsbestemte mål. Kurset gir deltakerne verktøyene de trenger for å forbedre deres lederskap i en digitalisert verden.     Kursholder har jobbet med informasjonssikkerhet for de ledende teknologi selskaper de siste 25 år, og hjulpet ledere finne farbare veier når det er krevende situasjoner. Er sertifisert kvalitetsrevisor ISO19011 og laget sikkerhets styrings rutiner for selskaper som følger enkle og svært strenge lovkrav. Er Ph.D cand i Cybersecurity Leadership. Har MBA innen Finans, Digital transformasjon, Forretningsstrategi, Kommunikasjon og markedsføring. Sertifisert Advanced Computer Security fra Stanford University og Cyber Forensics and Counterterrorism fra Harvard University. CISSP fra ISC2 og Certified Data Privacy Solution Engineer fra ISACA og, CCSK /Certificate of Cloud Security Knowledge fra CSA og NHH sitt styreprogram, som den mest relevante bakgrunn for dette kurset. Til daglig jobber han som CISO for et selskap med lokasjoner på 24 steder over hele verden, i et selskap som både skal ha en trygg drift men som også lager programvare og tjenester som må være i drift 24/7. [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microso... [+]
 In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. Global Knowledge will introduce you to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths. COURSE OBJECTIVES By actively participating in this course, you will learn about the following: Microsoft 365 Security Metrics Microsoft 365 Security Services Microsoft 365 Threat Intelligence Data Governance in Microsoft 365 Archiving and Retention in Office 365 Data Governance in Microsoft 365 Intelligence Search and Investigations Device Management Windows 10 Deployment Strategies Mobile Device Management COURSE CONTENT Module 1: Introduction to Microsoft 365 Security Metrics Threat Vectors and Data Breaches Security Solutions in Microsoft 365 Introduction to the Secure Score Introduction to Azure Active Directory Identity Protection Module 2: Managing Your Microsoft 365 Security Services Introduction to Exchange Online Protection Introduction to Advanced Threat Protection Managing Safe Attachments Managing Safe Links Monitoring and Reports Module 3: Lab 1 - Manage Microsoft 365 Security Services Exercise 1 - Set up a Microsoft 365 Trial Tenant Exercise 2 - Implement an ATP Safe Links policy and Safe Attachment policy Module 4: Microsoft 365 Threat Intelligence Overview of Microsoft 365 Threat Intelligence Using the Security Dashboard Configuring Advanced Threat Analytics Implementing Your Cloud Application Security Module 5: Lab 2 - Implement Alert Notifications Using the Security Dashboard Exercise 1 - Prepare for implementing Alert Policies Exercise 2 - Implement Security Alert Notifications Exercise 3 - Implement Group Alerts Exercise 4 - Implement eDiscovery Alerts Module 6: Introduction to Data Governance in Microsoft 365 Introduction to Archiving in Microsoft 365 Introduction to Retention in Microsoft 365 Introduction to Information Rights Management Introduction to Secure Multipurpose Internet Mail Extension Introduction to Office 365 Message Encryption Introduction to Data Loss Prevention Module 7: Archiving and Retention in Office 365 In-Place Records Management in SharePoint Archiving and Retention in Exchange Retention Policies in the SCC Module 8: Lab 3 - Implement Archiving and Retention Exercise 1 - Initialize Compliance in Your Organization Exercise 2 - Configure Retention Tags and Policies Exercise 3 - Implement Retention Policies Module 9: Implementing Data Governance in Microsoft 365 Intelligence Planning Your Security and Complaince Needs Building Ethical Walls in Exchange Online Creating a Simple DLP Policy from a Built-in Template Creating a Custom DLP Policy Creating a DLP Policy to Protect Documents Working with Policy Tips Module 10: Lab 4 - Implement DLP Policies Exercise 1 - Manage DLP Policies Exercise 2 - Test MRM and DLP Policies Module 11: Managing Data Governance in Microsoft 365 Managing Retention in Email Troubleshooting Data Governance Implementing Azure Information Protection Implementing Advanced Features of AIP Implementing Windows Information Protection Module 12: Lab 5 - Implement AIP and WIP Exercise 1 - Implement Azure Information Protection Exercise 2 - Implement Windows Information Protection Module 13: Managing Search and Investigations Searching for Content in the Security and Compliance Center Auditing Log Investigations Managing Advanced eDiscovery Module 14: Lab 6 - Manage Search and Investigations Exercise 1 - Investigate Your Microsoft 365 Data Exercise 2 - Configure and Deploy a Data Subject Request Module 15: Planning for Device Management Introduction to Co-management Preparing Your Windows 10 Devices for Co-management Transitioning from Configuration Manager to Intune Introduction to Microsoft Store for Business Planning for Mobile Application Management Module 16: Lab 7 - Implement the Microsoft Store for Business Exercise 1 - Configure the Microsoft Store for Business Exercise 2 - Manage the Microsoft Store for Business Module 17: Planning Your Windows 10 Deployment Strategy Windows 10 Deployment Scenarios Implementing Windows Autopilot Planning Your Windows 10 Subscription Activation Strategy Resolving Windows 10 Upgrade Errors Introduction to Windows Analytics Module 18: Implementing Mobile Device Management Planning Mobile Device Management Deploying Mobile Device Management Enrolling Devices to MDM Managing Device Compliance Module 19: Lab 8 - Manage Devices with Intune Exercise 1 - Enable Device Management Exercise 2 - Configure Azure AD for Intune Exercise 3 - Create Intune Policies Exercise 4 - Enroll a Windows 10 Device Exercise 5 - Manage and Monitor a Device in Intune TEST CERTIFICATION This course helps you to prepare for exam MS101. [-]
Les mer
5 dager 27 900 kr
ISO/IEC 27005 Lead Risk Manager [+]
ISO/IEC 27005 Lead Risk Manager [-]
Les mer
Nettkurs 5 dager 16 500 kr
ISO/IEC 27001 Lead Implementer [+]
ISO/IEC 27001 Lead Implementer [-]
Les mer
Oslo 5 dager 39 500 kr
23 Sep
23 Sep
18 Nov
CCSP: Certified Cloud Security Professional [+]
CCSP: Certified Cloud Security Professional [-]
Les mer
Trondheim 5 dager 30 000 kr
23 Sep
MasterClass: Hacking and Securing Windows Infrastructure with Paula Januszkiewicz [+]
MasterClass: Hacking and Securing Windows Infrastructure with Paula Januszkiewicz [-]
Les mer
Virtuelt klasserom 3 dager 9 760 kr
Certificate of Cloud Security Knowledge (CCSK) [+]
  Certificate of Cloud Security Knowledge (CCSK)    CCSK er et bevis på at innehaveren forstår hovedkonseptene i de tre dokumentene CSA bruker som kunnskapsbase for CCSK: CSAs eget rammeverk for beste praksis innen skysikkerhet, «Security Guidance for Critical Areas of Focus in Cloud Computing, v4.0” ENISAs – det europeiske byrået for nettverks- og informasjonssikkerhet – white paper «Cloud Computing: Benefits, Risks and Recommendations for Information Security.» ENISA er EUs ekspertisesenter for internettsikkerhet i Europa. CSA har i en årrekke hatt et tett samarbeid med ENISA. «CSA Cloud Controls Matrix» er et verktøy for å evaluere skytjenester opp mot en lang rekke standarder og rammeverk, for enklere å forstå hvor godt den enkelte skytjeneste er egnet til å understøtte deg og din bedrift i deres forpliktelser. I tillegg til det offisielle materialet, får kursdeltakere fra kraftbransjen tilgang til Berigos egenutviklede materiale som utvider Cloud Controls Matrix til også å omfatte kraftberedskapsforskriften.   [-]
Les mer
Oslo Bergen 2 dager 16 900 kr
05 Sep
07 Nov
07 Nov
htWeb Security for Developers [+]
httpWeb Security for Developers [-]
Les mer
5 dager 25 500 kr
MS-500: Microsoft 365 Security Administrator [+]
MS-500: Microsoft 365 Security Administrator [-]
Les mer