Forbered deg på å bli Zscaler Digital Transformation Administrator
Det gis en grunnutdannelse i datateknologi og samtidig spisskompetanse rettet mot 1. og 2. linje support. Studiet omfatter datamaskinens oppbygning og virkemåte, maskinvare, operativsystem og kontorapplikasjoner med brukerspesifikk konfigurasjon og feilsøking.
Dette er et ettårig studie som gir dypere kunnskap og ferdigheter innen drift og administrasjon av nettverk og servere. Studiet bygger videre på emner fra studiet IT Drift og Supportteknikk.
Er du usikker på hva NIS2 betyr for din virksomhet eller hvordan du skal ta tak i etterlevelse av direktivet? NIS2-direktivet innføres etter planen i norsk lov i løpet av 2026. NIS2 er EUs nye regelverk for cybersikkerhet.
We provide virtual course about CISM: Certified Information Security Manager in english. This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations.
Grunnleggende e-læringskurs i kunstig intelligens (AI) for virksomheter. Kort, fleksibel og dokumenterbar opplæring – støtte for internkontroll, etterlevelse og risikostyring. Kunstig intelligens brukes allerede i arbeidslivet – ofte uten at virksomheten har etablert felles rammer for bruk.
We provide online course about (In)Security in C++. The course teaches C++ developers fundamental concepts from Exploit Development and Reverse Engineering, and uses these concepts to demonstrate common vulnerabilities in C++ codebases.
We provide online course about a builder’s guide to single page application security. Frontend JavaScript frameworks such as Angular and React disrupt the traditional web security landscape, and finding reliable security advice is hard.
Securing modern web applications is hard, really hard. Not only do you have to make the right architectural security decisions, but you also have to be aware of various implementation vulnerabilities in both frontend apps and APIs.
We provide a 2-day online course about Attack and Defense: API and Web Application Security. The major cause of webservice and web application insecurity is insecure software development practices.
We provide online course about build your own application security program. As much as we wish it would, secure software doesn’t happen overnight. There’s no single action you can take or technology you can deploy that will solve this complex problem for you.
We provide online course about Building Secure API´s and Web Applications. The major cause of webservice, microservice, and web application insecurity is insecure software development practices.
We provide online course about Hack Yourself First: How to go on the Cyber-Offence. Cyber-attacks have become a reality of running software on the web today. We find ourselves under a constant barrage of malicious activity from hacktivists, online criminals and increasingly, nation states.
We provide online course about High Security OAuth. Since its publication in RFC 6749 and RFC 6750, OAuth 2.0 has gotten massive traction in the market.
We provide online course about Keynote: securing the future. Laura Bell Main graduated with a degree in Computer Science and Artificial Intelligence before that was a thing you could get a job in. It wasn’t her finest piece of planning.
We provide online course about Linux security and isolation APIs fundamentals. This workshop provides an introduction to the low-level Linux features - set-UID/set-GID programs, capabilities, and namespaces, cgroups (control groups).
En introduksjon til ZeroTrust i praksis
Bli en Zscaler Digital Transformation Engineer
Vi leverer CCNA (Cisco Certified Network Associate) er en grunnleggende IT-sertifisering som tilbys av Cisco Systems. CCNA-sertifiseringen er anerkjent i IT-bransjen som et fundamentalt steg for karrierer innen IT-stillinger og nettverksroller. Ta Cisco-eksamen: 200-301
Comptia advanced security practitioner (CASP+). You have experience in the increasingly crucial field of information security, and now you´re ready to take that experience to the next level.
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002.
ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001.
The ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
This ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC 27002.
ISO/IEC 27002 Manager training course provides information on the implementation and management of information security controls based on ISO/IEC 27002.
By attending this 2-day ISO/IEC 27005 Foundation training course, participants will learn more about the structure of the standard including information security risk assessment, treatment, acceptance, communication and consultation, and monitoring and review.
ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27035 Foundation training enables you to learn the basic elements to implement an Incident Management Plan and manage Information Security Incidents. During this training course, you will be able to understand Information Security Incident Management processes.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
The ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS)
Prisma Cloud is the industry´s most complete Cloud Native Application Protection Platform (CNAPP), with the industry´s broadest security and compliance coverage—for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle
The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.
We offer course in Palo Alto Networks: Firewall 10.2: Troubleshooting (EDU-330).