This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
Vi tilbyr kurs om grunnkurs videoovervåkning. Få en grunnleggende innføring i videoovervåkning. Dette kurset gir en grunnleggende innføring i videoovervåkning og du vil sitte igjen med en forståelse for valg og bruk av utsyr til et basis videoovervåkningsanlegg
Vi tilbyr nettkurs om hvordan unngå økonomisk kriminalitet. I dette kurset gir vi praktiske råd og tips om hvordan du ved hjelp av enkle tiltak kan forebygge og forhindre å bli rammet av økonomisk kriminalitet.
IPv6 Networking (NLT-IPV6-Datasenter) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og enterprise-kunder. Deltagerne bør ha grunnleggende IPv6-kjennskap, tilsvarende NLT-IPv6-Intro. IPv6 datasenterkurs kan kombineres med andre IPv6 kurs.
Dette kurset (NLT-IPV6-Nettverk) dekker design og implementasjon av IPv6 i et bedriftsnettverk. Vi går gjennom nettverksdesign og tjenester som autokonfigurasjon av IPv6 (SLAAC og DHCP). Videre ser vi på VPN-løsninger og brannmurer. I tillegg går vi gjennom metoder for feilsøking og problemløsning.
«IPv6 The good, the bad and the ugly» (NLT-IPV6-Sikkerhet) er et kurs for deg som vil ha en større forståelse av hvilke sikkerhetsutfordringer IPv6 er ment å løse, men også hvilke nye problemstillinger som dukker opp ved overgang til IPv6.
Junos grunnkurs gir en innføring i bruk av Junos, Junipers operativsystem for rutere, switcher og brannmurer. Kurset gir grunnleggende kunnskap for å ta i bruk Junipers utstyr på en effektiv måte.
Vi tar med oss våre teknologipartnere og inviterer til tech updates og workshops, for faglig påfyll og lærerike diskusjoner.
Telecom World arrangeres i Tromsø 25. – 26. april 2024. Rundt 300 deltakere fra ledersjiktet i hele verdikjeden i den norske bredbåndsbransjen er forventet å delta i Tromsø.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives.
EC-Council Certified Cloud Security Engineer (CCSE) + Exam voucher (ECCCSE)
This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK®).
Certified CMMC Professional training course enables participants to acquire a comprehensive understanding of the Cybersecurity Maturity Model Certification (CMMC) model and its requirements.
The goal of this CWNA course is to add Wi-Fi expertise to a networking professional´s skillset, while covering all CWNA exam topics. The course begins with discussion topics and hands-on lab exercises covering the basic operation of 802.11 Wi-Fi technology.
The CISM (Certified Information Security Manager) course is a globally recognized certification program designed for professionals in the field of information security management.
Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course.
Citrix Web App Firewall protects web apps and sites from known and unknown attacks. This threeday course will teach you how to address application services security requirements with Web App Firewall.
Learn how to configure your Citrix networking environment to address application services security requirements with Citrix Web App Firewall: automate and manage network services for scale-out of application architectures with Citrix Application Delivery Management
In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site.
Designed to learn how to set up scalability, redundancy and security configurations.
This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will learn how to assess existing environments, explore different scenarios and make design decisions based on business requirements.
If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team.
This accelerated 5-day course is designed for experienced IT professionals to build the foundational administration aspects of installing, configuring and managing a Citrix Virtual Apps and Desktops 7 environment.
This Citrix Virtual Apps and Desktop course, designed for experienced IT professionals builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment´s app and desktop workloads.
The PECB CMMC Foundations training course enables participants to understand the fundamental concepts and principles of the CMMC model.
Learn the skills required to implement Citrix ADC Essential components including secure Load Balancing, High Availability, and Citrix ADC Management.
In this course, you will learn how Citrix SD-WAN can simplify branch networking for your organization. You´ll walk away understanding how to configure and manage SD-WAN, including the SD-WAN architecture, deployment options, provisioning, and how to use Citrix SD-WAN Orchestrator in your environment
The CompTIA Security+ course is designed to help you prepare for the SY0-701 exam.
Learn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft´s public cloud and get hands-on practice deploying those machines using Machine Creation Services.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials– platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB)
The Designing and Implementing Cloud Connectivity training helps you develop the skills required to design and implement enterprise cloud connectivity solutions. Learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers
This 3-day EC-Council training is a course that will prepare you for the EC-Council´s Certified DevSecOps Engineer (E|CDE) certification.
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process.
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. The program is designed for IT professionals involved with information system security, computer forensics, and incident response.
This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge.
Comptia advanced security practitioner (CASP+). You have experience in the increasingly crucial field of information security, and now you´re ready to take that experience to the next level.
Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002.
With the ever-increasing numbers of security breaches, both human and machine-based, significantly more understanding is required from testers to ensure that the proper quality assurance measures are in place for assuring the security of IT systems.
The ISTQB Advanced Technical Test Analyst course extends the broad understanding of testing acquired at Foundation Level to enable the role of Technical Test Analyst to be performed.
The ISTQB Advanced Test Automation Engineer Certificate Course is a three-day course explaining the tasks of a test automation engineer (TAE) in designing, developing, and maintaining test automation solutions.
The ISTQB Advanced Test Manager course extends the broad understanding of testing acquired at Foundation Level to enable the role of Test Manager to be performed.
Established the International Software Testing Qualification Board (ISTQB) with, among other things, the goal of further internationalization and harmonization of test certification programs.
The ISTQB Foundation Level Model Based Tester Extension course extends the broad understanding of testing acquired at Foundation Level to enable the role of Model Based Test Analyst to be performed.
The certification for the ISTQB Mobile Application Testing Foundation Level is intended for professionals who are working with mobile technology. The certification provides an insight into methods, techniques and tools a professional may use to test mobile applications.
This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals. It is a must–go for enterprise administrators, security officers and architects.
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies.
This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics.
The Cortex™ XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training
We offer course about Palo Alto Networks: Firewall 10.2 Essentials: Configuration and Management (EDU-210).
This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server´s role in managing and securing the overall network.
Prisma Cloud is the industry´s most complete Cloud Native Application Protection Platform (CNAPP), with the industry´s broadest security and compliance coverage—for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle
The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.
We offer course in Palo Alto Networks: Firewall 10.2: Troubleshooting (EDU-330).
This is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indicators of the attack, incident handling also daily servicing on SIEM platform.
The Veeam® Backup & Replication™ v12: Configure, Manage and Recover training course is a three-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v12 solution.
The two-day, Veeam® Backup & Replication™ v11: Architecture and Design training course, is focused on teaching IT professionals how to effectively architect a Veeam solution through attaining technical excellence following the Veeam Architecture Methodology used by Veeam´s own Solution Architects.
Vi tilbyr kurs i cybersikkerhet. Cybertrusselen mot norske bedrifter er stor og økende. Slik går du frem for å styrke dine ansattes kompetanse
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
Security Engineering on AWS - Virtual. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud.
Vi tilbyr kurs i Microsoft 365 Dokumentbehandling. Hvor bør vi lagre dokumentene våre ? Microsoft 365 består av en rekke tjenester som er beregnet på fil og dokumentlagring, men hvor bør vi legge våre dokumenter, og hvorfor det.
Vi tilbyr kurs i Personlig effektivitet. På dette kurset lærer du å ta kontroll på digital hverdag og få ting gjort effektivt. Få kontroll på innboks og organiser epost og gjøremål slik at du få en effektiv og stressfri hverdag. Spar 30 min. hver dag. Praktisk kurs – Nyttige tips – Konkrete verktøy