IT drifting tar stadig mer tid og ressurser både på arbeidsplassen og hjemme på datarommet. Her finner du kurs og opplæring i innen IT-sikkerhet inne områder som for eksempel nettverk og systemadministrasjon. Typiske temaer er; brannmur, antivirus, datagjennvinning, intranett, IT-strategi, TCP/IP osv. Ta gjerne kontakt med oss hvis du ønsker et skreddersydd tilbud for din bedrift.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent kurs tilknyttet EUs personvernforordning (GDPR). Lær deg systematisk ledelse og kontroll av personvern.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent innføringskurs i den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg systematisk ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent revisorkurs tilknyttet den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg hvordan systematisk revidere virksomhetens ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent implementeringskurs i den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg hvordan systematisere virksomhetens ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent kurs i den populære beste praksis standarden ISO/IEC 27005:2018. Lær deg informasjonssikkerhetsmessig risikostyring.
Vi tilbyr bachelor i data Science. Overalt rundt oss jobber forskere og vitenskapsfolk med spennende prosjekter hvor man samler inn enorme mengder rådata, noe som må bearbeides og analyseres for å kunne oppdage fenomener, se sammenhenger og komme frem til spennende konklusjoner.
Hvis du har lyst til å jobbe med nyskapende IT-løsninger og bygge bro mellom informasjonsteknologi og forretningsdrift, er dette mastergraden du har ventet på!
Dette er studiet som gjør deg til en brobygger mellom teknologi og organisasjoner. Informasjonssystemer er både en profesjon og en akademisk disiplin som har til hensikt å bygge bro mellom de tekniske mulighetene som IT gir og forretningsbehov.
Vi har master i Information Systems – Digital Marketing Denne mastergraden gir ettertraktet og spesialisert kunnskap innen datadrevet digital markedsføring.
Vi tilbyr Master i Information Systems – FinTech Business Innovation Denne mastergraden gir deg ettertraktet og spesialisert kunnskap innen Fintech, slik at du kan være med å drive frem nye og innovative tjenester innen finans.
Vi tilbyr Master - Information systems - management and Innovation. Utdanningen for deg som ønsker en karriere som forretningsanalytiker, som sikter mot en lederstilling, og som ikke bare vil forstå, men også utvikle morgendagens teknologi.
Vi tilbyr Master i Applied Computer Science - Software Integration. Få innsikt og kompetanse i hvordan du knytter teknologiske muligheter innen IT opp mot næringslivets behov. Dette er studiet for deg som brenner for IT og teknologi, og som ønsker å skape innovative brukeropplevelser og løsninger.
Vi holder ettermidags kurs i bærekraft: ESG - risiko og krav. Hovedformålet med kurset er å gi et overblikk over utviklingen på miljø- og klimaområdet i Norge som følge av særlig regelutviklingen i EU
I dette ettermiddagskurs fokuserer vi spesielt på bærekraft: klima- og miljørett samt rapportering. Hovedformålet med kurset er å gi et overblikk over utviklingen på miljø- og klimaområdet i Norge som følge av særlig regelutviklingen i EU
Vi holder kurs i bærekraft: utvikling og endringer i regelverk. Heldagskurs - med fokus på miljø og klima. Hovedformålet med kurset er å gi et overblikk over utviklingen på miljø- og klimaområdet i Norge som følge av særlig regelutviklingen i EU
Vi tilbyr kurs i cybersikkerhet - Fordypning i aktuelle temaer. Oppdaterte strategier for å håndtere cybersikkerhetstrusler i den digitale verden
Vi holder kurs i ESG - regulatorisk landskap for finansielle og ikke-finansielle aktører. ESG-sertifiseringen - modul 1. ESG-kursene gir en grundig innføring i ESG (Environmental, Social, and Governance) og dens betydning for virksomheter.
Vi holder kurs i ESG due diligence: Integrering av dobbel vesentlighet. ESG-sertifiseringen - modul 4. ESG-kursene gir en grundig innføring i ESG (Environmental, Social, and Governance) og dens betydning for virksomheter.
Vi holder kurs i ESG-rapportering i flere dimensjoner. ESG-sertifiseringen - modul 5. ESG-kursene gir en grundig innføring i ESG (Environmental, Social, and Governance) og dens betydning for virksomheter.
Vi holder kurs i Grønnvasking med ESG-perspektiv: Markedsføring og kommunikasjon. ESG-sertifiseringen - modul 3. ESG-kursene gir en grundig innføring i ESG (Environmental, Social, and Governance) og dens betydning for virksomheter.
Vi tilbyr heldagskurs i hvitvasking - lovgivning og rammene. Sertifisering for hvitvaskingsansvarlig - modul 1. Hvitvaskingsansvarlig er en viktig funksjon hos de rapporteringspliktige i dag.
Vi tilbyr heldagskurs i hvitvasking - rapportering til ØKOKRIM. Sertifisering for hvitvaskingsansvarlig - modul 4. Hvitvaskingsansvarlig er en viktig funksjon hos de rapporteringspliktige i dag.
Vi tilbyr heldagskurs i hvitvasking og terrorfinansiering. Det årlige oppdateringskurset. Kurset vil ta for seg sentrale deler innenfor hvitvaskingsregelverket, og på kurset vil du blant annet få kunnskap om regulatoriske endringer og utvikling.
Vi tilbyr kurs i håndtering av risiko for hvitvasking og terrorfinansiering. Sertifisering for hvitvaskingsansvarlig - modul 3. Hvitvaskingsansvarlig er en viktig funksjon hos de rapporteringspliktige i dag.
Vi tilbyr kurs i IP-Strategi. Hvordan skape verdier med immaterielle eiendeler? Som deltaker på kurset vil du øke din bevissthet på å identifisere slike verdier i selskapet og du vil få verktøy og gode tipps for å implementere nødvendige tiltak i din bedrift.
Vi tilbyr kurs i juristens rolle i IT-prosjekter Bli en ettertraktet sparringspartner i digitaliseringsprosjekter
Vi holder heldagskurs i Kartlegging for Bærekraftstrategi. Innføring i interessentanalyse. Bærekraft og sosialt, miljømessig og styringsmessig ansvar blir stadig viktigere for virksomheter.
Vi tilbyr kurs i Legal Tech - Praktisk bruk av digitale verktøy for advokater. Formålet med kurset er å gi deg en oversikt over ulike digital verktøy som kan brukes i typiske arbeidsprosesser for advokater og jurister.
Vi tilbyr kurs i rollen som hvitvaskingsansvarlig. Sertifisering for hvitvaskingsansvarlig - modul 2. Rollen ble ytterligere fremhevet og tydeliggjort ved endring av hvitvaskingsloven i 2018, og tydeliggjøringen ble fulgt opp i Finanstilsynets rundskriv (nr. 4/2022, tidl. nr. 8/2019).
Vi holder kurs i slagkraftig ESG-strategi: Fra planlegging til gjennomføring. ESG-sertifiseringen - modul 2. ESG-kursene gir en grundig innføring i ESG (Environmental, Social, and Governance) og dens betydning for virksomheter
Vi tilbyr kurs i teknisk tilstandsrapportering av næringseiendom. Kunnskap om grensesnittet mellom juridiske og byggetekniske forhold gir store synergier, som vil kunne ha avgjørende betydning i rådgivningen ved kjøp/salg og utleie av næringseiendom.
Vi tilbyr kurs i CCSP - Certified Cloud Security Professional. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs. Experis Ciber AS hjelper deg hele veien frem til fullført sertifisering som CCSP.
Vi tilbyr kurs i CISSP - Certified Information System Security Professionals. CISSP kurset representerer starten på Experis Cibers kursvirksomhet. Kurset har oppstartsgaranti. Dette betyr at når du har meldt deg på, så går kurset. Oppstartsgaranti er noe Experis Ciber vil tilby på alle sine kurs.
Vi tilbyr kurs i CSSLP - Certified Secure Software Lifecycle Professional. CSSLP fokuserer på at utviklere, arkitekter og prosjektledere skal ha den nødvendige ekspertisen til å utvikle sikker software.
Vi tilbyr kurs i Experis Ciber Security Foundation - Cybersikkerhet grunnleggende. Etter gjennomført ECSF har man et godt grunnlag for å gå videre på SSCP, CISSP eller CCSP kursene. Man har en grunnleggende forståelse av nøkkelteknologier innen sikkerhet.
Vi tilbyr kurs i Experis Ciber Security Introduction - Cybersikkerhet introduksjon. Kurset tar for seg grunnleggende risikostyring, virkemidler og fremgangsmåter for innføring av sikkerhet i en organisasjon basert på ivaretakelse av konfidensialitet, integritet og tilgjengelighet.
Vi tilbyr kurs i ISO/IEC 27001 Foundation (PECB). Kurset er en 1-dags innføring i ISO/IEC 27001 for ledere som trenger å vite hva standarden innebærer, hvordan den kan nyttiggjøres og hva som skal til for å implementere den.
Vi tilbyr kurs i ISO/IEC 27001 Introduction (PECB). Kurset er en 1-dags innføring i ISO/IEC 27001 for ledere som trenger å vite hva standarden innebærer, hvordan den kan nyttiggjøres og hva som skal til for å iverksette den.
Vi tilbyr kurs i ISO/IEC 27001 Lead Auditor (PECB). Lead Auditor-kurset gir en meget grundig innføring i det mest omfattende rammeverket for å bygge effektiv og risikobasert sikkerhetsstyring i en virksomhet. ISO/IEC 27001 dekker også områder utenfor cybersikkerhet.
Vi tilbyr kurs i ISO/IEC 27001 Lead Implementer (PECB). Kurset gir en meget grundig innføring i det mest omfattende rammeverket for å bygge effektiv og risikobasert sikkerhetsstyring i en virksomhet. ISO/IEC 27001 dekker også områder utenfor cyber sikkerhet.
Vi tilbyr kurs i SSCP - System Security Certified Practitioner. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs. Experis Ciber AS hjelper deg hele veien frem til fullført sertifisering som SSCP.
The Advanced Developing on AWS course uses the real-world scenario of taking a legacy, on-premises monolithic application and refactoring it into a serverless microservices architecture.
What is Domain Driven Design (DDD) really about? How might Command Query Responsibility Segregation (CQRS) help us to build better software? Far from being esoteric concepts, they can be harnessed by everyday developers to create long-lasting, flexible solutions.
This course covers the fundamentals of building IT infrastructure on the AWS platform. Students learn how to optimize the AWS Cloud by understanding how AWS services fit into cloud-based solutions.
Designed for testers with experience with functional testing this course highlights the issues and best approaches for testing mobile applications. Attendees will learn how to approach mobile testing projects, which quality characteristics to address and how to plan organise and execute the testing.
Validate your cloud expertise with an industry-recognized credential and grow your career This course will cover the topics and techniques you will need to be successful in the AWS Certified Cloud Practitioner exam so that you can achieve this recognized level of certification.
In this introductory course, you will learn about AWS products, services, and common solutions. You will learn the fundamentals of identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements.
Develop your all-round BA skills with the BCS Foundation Certificate. Gain a full overview of the BA ecosystem, focusing on requirements engineering and beyond. Take the first step on a career path with high earning potential and strong job prospects.
Drive business improvement by enhancing your analysis, planning and strategic skills. Effectively identify business issues, opportunities, problems and solutions. Build on your strategic BA skills.
Gain practical, proven techniques for modelling, analysing and improving business processes. Apply your learning by following a detailed case study. Learn methods for improving your processes and realise business outcomes.
Become an expert in defining and documenting business requirements following a best practice approach to ensure successful outcomes for your IT projects. Master requirements engineering and acquire a highly versatile skillset essential for overseeing successful projects.
Configuring BGP on Cisco Routers provides students with an in-depth knowledge of Border Gateway Protocol (BGP), a routing protocol that is one of the foundations of the Internet and New World technologies such as Multiprotocol Label Switching (MPLS).
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
The Implementing and Administering Cisco Solutions course provides a broad range of fundamental knowledge for all IT careers. Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network.
CCSP: Certified Cloud Security Professional Certification Preparation. As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical.
This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice
Now completely updated for 2020 with the latest material. (ISC)2 Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification.
CLACCM: Implementing Cisco Advanced Call Control and Mobility Services. The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services.
The Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 course helps you prepare for the Cisco CCNP Collaboration and CCIE Collaboration certifications, and advanced-level roles focused on implementation and operation of Cisco collaboration solutions.
The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program built to incorporate critical secure network skills - Protect, Detect, Respond and Predict Maps to NICE 2.0
Learn the skills required to implement Citrix ADC Essential components including secure Load Balancing, High Availability, and Citrix ADC Management.
ILT/VILT: 2 Days eL: 12 HrsProducts: Citrix ADCLanguage: esFocus: Technical Learn the skills required to configure and manage Citrix ADC Traffic Management features, including Content Switching, Traffic Optimization, and Global Server Load Balancing.
Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB)
Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
In this three-day course, you will learn how Citrix SD-WAN can simplify branch networking for your organization.
CNS-320: Citrix ADC Advanced Concepts - Security, Management and Optimization. Learn how to configure your Citrix networking environment to address application services security requirements
COBIT 2019 Builds on, and integrates over 25 years of development in the Enterprise Governance of IT domain. COBIT 2019 incorporates new insights from science, and developed these insights into operational practices. COBIT 2019 is a major evolution of the framework, and replaces COBIT 2005.
In the COBIT 5 Assessor course participants will master the understanding of how to perform a formal Process Capability Assessment and how it can be used to enable business goals, prioritize improvement activities and identify opportunities for improving the governance and management of IT assets.
Get a practical appreciation of how to apply COBIT® 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives.
IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
CWS-215: Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud. If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
CWS-315: Citrix Virtual Apps and Desktops 7 Advanced Administration. Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
Learn how to navigate the move from Citrix Virtual Apps and Desktops 7 on-premises to Citrix Virtual Apps and Desktops Service on Citrix Cloud. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix Cloud
Learn how to design a cloud-based data warehousing solution using Amazon RedShift. In this course, you will learn concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS.
The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) course helps you prepare for the Cisco CCNP Data Center and CCIE Data Center certifications and for advanced-level data center roles.
DEVASC: Developing Applications and Automating Workflows using Cisco Platforms. This course will help you prepare for the Cisco® DevNet Associate certification and for associate-level network automation engineer roles.
In this course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. We will explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.
DevOps is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support. The goal is to add value by improving the flow in this process.
DevOps Engineering on AWS. In this course, you will learn the most common DevOps patterns to develop, deploy, and maintain applications on the AWS platform.
This course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals.
A DevOps Leader is a tactical or strategic individual who helps design, influence, implement or motivate the cultural transformation proven to be a critical success factor in DevOps adoption.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
Build your Cisco Meraki technical knowledge and skills with this full-day, virtual, instructor-led training. This is the first of two courses that will prepare you for the Cisco Meraki Solutions Specialist certification exam.
Elevate your Cisco Meraki technical knowledge and skills with this three-day, instructor-led training! In this advanced technical training course, you’ll gain the knowledge and skills to plan, design, implement, and operate complex Cisco Meraki solutions.
Elasticsearch course is intended for those who want to learn how to use technology Elasticsearch to store and to retrieve large amounts of data to be easily scaled.
The course is designed for those who want to learn how to create a full-text search in their project, which we will explore more in deep. In addition to using Elasticsearch, we will learn other user search concepts.
ENARSI: Implementing Cisco Enterprise Advanced Routing and Services. The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) provides you with the knowledge you need to install, configure, operate, and troubleshoot an enterprise network.
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks.
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.0 course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any related issues.
Exam Readiness: AWS Certified Developer - Associate. The AWS Certified Developer - Associate exam validates technical expertise in developing and maintaining applications on the AWS platform.
Exam Readiness: AWS Certified Solutions Architect - Associate. The AWS Certified Solutions Architect - Associate exam validates technical expertise in designing and deploying scalable, highly available, and fault-tolerant systems on AWS.
Vi tilbyr kurs i IP1: Generell nettverksteknologi. Dette kurset gir deg kunnskap om relevante nettverksbegreper og forståelse av protokollen som benyttes i alle nettverk - IP. Routere, switcher og lag 3 switcher er vanlige komponenter i et nettverk.
Vi tilbyr IP2: IP- og nettverks-workshop. Dette kurset er en kombinasjon av teori og praksis. Det er stort fokus på praktiske oppgaver!
IREB Certified Professional for Requirements Engineering - Foundation Level provides you with basic knowledge in requirements management and prepares you for certification according to IREB (International Requirements Engineering Board).
As an international standard for Business Continuity Management System, the ISO 22301 is designed to protect, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.
ISO 22301 Lead Auditor training enables you to develop the necessary expertise to perform a Business Continuity Management System (BCMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework.
ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
ISO/IEC 27001 Introduction training course enables you to become familiar with the basic concepts of an Information Security Management System (ISMS).
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701.
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701.
Improve your ability to evaluate technical system attributes. Differentiate your skills by developing an internationally accredited advanced technical competency. Improve your ability to evaluate technical system attributes while acquiring advanced accreditation.
Gain the knowledge and skills necessary to guide a test automation project, and differentiate yourself in one of the fastest growing areas of Software Testing. Become an Accredited Test Automation Engineer!
Build your test management skills. Move into a more senior role as a testing professional. Plus, benefit from our free exam revision sessions. Are you looking to move into a senior role in testing? Accredit your test management skills!
Designed for testers, this course provides an understanding of how Agile projects are organised, teaching commonly applied Agile development and testing practices.
Gain essential testing skills and build your career with this industry standard qualification for software testing professionals from the International Software Testing Qualifications Board.
ITIL 4 Foundation er et kurs, som er basert på AXELOS sine beskrivelser av stoffet til Foundation eksamen. Det grunnleggende målet med dette kurset er å hjelpe deltakerne til å forstå nøkkelbegrepene for tjenestestyring i ITIL 4 rammeverket og gjøre seg klare for en ITIL® 4 Foundation eksamen.
ITIL 4 is built on the established core of best practice in the ITIL guidance. ITIL 4 provides a practical and flexible approach to move to the new world of digital transformation and embrace an end-to-end operating model for the delivery and operation of products and services.
Vi tilbyr kurs i ITIL® Awareness for bedrifter. Kurset gir et overblikk over ITIL-rammeverket og hvilke fordeler man oppnår ved å innføre dette i en organisasjon. Dette er et introduksjonskurs som ikke går i dybden.
The ITIL ® 4 Specialist: Create, Deliver and Support module is part of the Managing Professional stream for ITIL 4 and participants need to pass the related certification exam for working towards the Managing Professional (MP) designation.
The Drive Stakeholder Value Specialist Certification is relevant to everyone in a supplier facing role. This means those managing one or more suppliers, and working with suppliers in providing a single integrated service management organization.
This course includes the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing, focusing on rapid delivery of products & services to obtain maximum value.
The ITIL® 4 Strategist: Direct, Plan, and Improve course is designed to provide practitioners with a practical and strategic method for planning and delivering continual improvement with necessary agility.
Machine Learning and Data Science in R on Microsoft ML and SQL Servers - with Rafal Lukawiecki. This very intensive, hands-on, 5-day course has been designed for those who want to learn more in-depth machine learning and data science using R.
This course is a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them!
Masterclass: Internet Information Services 10 Management (IIS). Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks - we practiced both options!
MasterClass: System Forensics and Incident Handling. The secure infrastructure configuration should be the most important line of defense in every organization.
This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals. It is a must go for enterprise administrators, security officers and architects.
This migration training is focusing on describing the Azure services that participate in the modern Datawarehouse deployment first (such as Azure Data Lake, Azure Data Factory, Azure SQL DB, Azure Synapse Analytics, Azure Analysis Services, PBI).
Migrating to AWS . Learn about cloud migration strategies and dive into our recommended five-phase plan for migrating existing workloads to the AWS Cloud.
This course covers both introductory and advanced MPLS and MPLS VPNs concepts. Configuration, implementation and troubleshooting skills are all included with a significant focus on the use of labs to consolidate the learners knowledge.
Dette 2-dagers Kepner-Tregoe kurset gir en introduksjon til en systematisk prosess for problemløsning, slik at du blir i stand til å levere et høyt kvalitetsnivå og konsistens i kundestøtten.
ITIL, Lean, Lean IT, SCRUM, DevOps, ISO 27001, SIAM, PRINCE2, COBIT, Synes du det er mange rammeverk å forholde seg til? Hva er deres likheter og ulikheter? Hvordan passer de sammen? Hva er deres styrker? Hva handler de egentlig om? Og hvilke rammeverk passer egentlig for oss?
Apply the DevOps role to bring alignment throughout a SAFe® enterprise and put together high performing Agile teams. Get equipped with the tools and knowledge needed for DevOps to increase your value to SAFe teams.
SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
Your medical device written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud.
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities.
Vi tilbyr kurs om SIAM® Foundation. SIAM is a management methodology that can be applied in an environment where services are delivered using a number of service providers.
SISE: Implementing and Configuring Cisco Identity Services Engine.
This course takes a detailed look at how to use Spring Boot to create sophisticated applications rapidly, according to best practices and contemporary enterprise application patterns.
This course takes a detailed and pragmatic look at how to create Spring Cloud solutions. You will learn how to create microservices in Spring Cloud, and how to configure, discover, and route microservice applications.
SSNGFW: Securing Networks with Cisco Firepower Next Generation Firewall. The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) course shows you how to deploy and use Cisco Firepower Threat Defense system.
Want to improve the way your organisation works? In this course, you will learn why process improvement with TMMi (Test Maturity Model integration) is important, ways to identify opportunities, and the benefits of successfully improving said improvements.
You explore the common use cases of the VMware Cloud on AWS infrastructure that allows you to modernize, protect, and scale applications based on VMware vSphere® that leverage
VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration.
This two-day, hands-on course gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon® through a combination of lecture and hands-on labs.
This five-day, extended hour course takes you from introductory to advanced VMware vSphere® 8 management skills. Building on the installation and configuration content from our best-selling course
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 8, which includes VMware ESXi™ 8 and VMware vCenter Server® 8.
In this 2-day course, you will explore the new features and enhancements in VMware vCenter® 8.0, VMware ESXi™ 8.0, and VMware vSphere® 8.0. Through use-case scenarios, demonstrations, labs, and simulations, you develop skills to implement and configure vSphere 8.0.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code?
Your Web application written in C# works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
I dette internasjonalt anerkjente PECB-kurset får du nødvendig kunnskap og innsikt for å utføre rollen som ansvarlig for overvåkning av virksomhetens samsvar med GDPR.
Hva vil det si å ha en risikobasert tilnærming til informasjonssikkerhet? Hvordan kan vi vite om de tiltakene vi innfører fungerer?
I dette internasjonalt anerkjente PECB-sertifiseringskurset får du unik innsikt i hvordan du skal revidere mot ISO 27001-standarden. Etter gjennomført kurs og bestått eksamen kan du, avhengig av erfaring, søke om å bli sertifisert som ISO 27001 Lead Auditor.
I dette internasjonalt anerkjente PECB-sertifiseringskurset får du den nødvendige kunnskapen og ekspertisen til å planlegge og implementere et effektivt styringssystem (ISMS) for din virksomhet i henhold til ISO 27001.
I dette internasjonalt anerkjente PECB-sertifiseringskurset får du kunnskap om de grunnleggende elementene innen risikostyring, blant annet vurdering, analyse og håndtering.
I dette internasjonalt anerkjente PECB-sertifiseringskurset får du den nødvendige kunnskapen og ekspertisen til å planlegge og implementere et effektivt cybersikkerhetsprogram for virksomheten i henhold til ISO 27032. Standarden innebærer beskyttelse av personvern, integritet og tilgjengelighet.
Bruken av skytjenester øker i takt med digitaliseringen og god skysikkerhet er svært viktig når personopplysninger og virksomhetens informasjon flyttes ut i skyen.
We provide workshop about accelerated testing. This session will look at the some of the hindrances and enablers to accelerated testing, how epistemology can help with accelerated testing and why we need to refute conjectures.
We provide a advanced test design techniques workshop. Most testers are familiar with techniques such as boundary value analysis and equivalence partitioning. However, this workshop focuses on two of the more unusual and more complex techniques: Classification Trees and Pairwise Testing.
We provide workshop about exploratory testing. The workshop aims to dispel any misunderstandings people might have with this approach and how it can be applied to both traditional and agile projects. Applications are provided throughout the workshop.
We provide from user story to test case workshop. Agile Software Methods is becoming the preferred way of working in most organisations. However testers are often finding it difficult to know how to adapt to the new way of working. It is often difficult to know how to test User Stories.
We provide course about from weeks to hours: bridging the gap between business and IT. This one-day workshop is designed for both technical and non-technical professionals involved in the software development process.
We provide course about Google Cloud Fundamentals for Azure Professionals. This course teaches Azure professionals about the core capabilities of Google Cloud in the four technology pillars: networking, compute, storage, and database.
We provide course about Google Cloud Fundamentals: Big Data and Machine Learning. This 1-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform.
We provide course about Google Cloud Fundamentals: Core Infrastructure. This one-day instructor-led class provides an overview of Google Cloud Platform products and services.
Vi tilbyr kurs om ITIL® 4 Foundation. Kurset gir deg en grunnleggende innføring i ITIL® beste praksis rammeverket versjon 4. Kurset gir innføring i basis konseptet, prinsippene, prosessene og funksjonene som er definert som beste praksis.
Vi tilbyr kurs om ITIL® Service Transition. Kurset gjennomgår også roller og organisering innenfor Service Transition. Kurset forbereder kandidatene til ITIL® Service Transition eksamen. ITIL Service Transition-kurset bygger på de generelle prinsippene som dekkes av ITIL Foundation kurset.
We provide course about Journey to the Cloud. This course begins with an overview of the different cloud computing models and services provided by the major public cloud providers. Several cloud computing concerns like cost, governance, and security are addressed.
OWASP Top 10 er en globalt utarbeidet og anerkjent liste over de vanligste og mest kritiske sikkerhetssårbarhetene i moderne webapplikasjoner. Den ble laget for å øke bevissthet rundt sikkerhet og er en verdifull ressurs for utviklere, sikkerhetseksperter og organisasjoner.
We provide a workshop about test manager´s dashboard. Gathering and presenting clear information about quality, both product and process, may be the most important part of the test manager´s job. Test reports need to be concise, predictive, accurate and relevant to the people receiving them.
We provide transitioning to Agile testing workshop. This workshop briefly explains the principles of Agile and how this differs from traditional lifecycle models. This workshop will explain the fundamentals of Scrum and how testing can effectively contribute to this software development approach.
Vi tilbyr kurs om sikrere og enklere digital hverdag. Har du kontroll? Med informasjon i mange ulike kilder og steder er det ikke like lett å holde oversikten over din informasjon, bilder, filer og tjenester. Vi deler lett, men glemmer igjen informasjon over alt.
Vi tilbyr 1-dags kurs i WordPress: sikkerhet for deg som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.