IT drifting tar stadig mer tid og ressurser både på arbeidsplassen og hjemme på datarommet. Her finner du kurs og opplæring i innen IT-sikkerhet inne områder som for eksempel nettverk og systemadministrasjon. Typiske temaer er; brannmur, antivirus, datagjennvinning, intranett, IT-strategi, TCP/IP osv. Ta gjerne kontakt med oss hvis du ønsker et skreddersydd tilbud for din bedrift.
Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform.
Beyond a solid knowledge in using various security features of .NET and ASP.NET, even for experienced programmers it is essential to have a deep knowledge in Web-related vulnerabilities both on server and client side along with the consequences of the various risks.
This course will take your Git knowledge to the next level. It fuses a deeper look into how Git really works with a range of carefully selected practical techniques and advice on best practices.
Advanced Machine Learning with Microsoft ML Server, SQL Server, and Azure ML. The agenda for this 4 day Advanced class with Rafal Lukawiecki is under development. Content will be released.
AirWatch Enterprise Mobility: Configure and Deploy Integrated Solutions. This 2-day course is designed to provide you with the skills required to configure and provision AirWatch cloud deployments.
This 2-day course provides insight into the current challenges of enterprise mobility and how AirWatch can help you solve those challenges.
AirWatch Enterprise Mobility: Install and Deploy On-Premise Solutions. This one-day course is designed to equip students with the skills needed to install, configure, and upgrade an on premise AirWatch server.
After this intensive one training the attendees will leave with a thorough understanding of the Azure API Management platform and the requirements needed to start exposing APIs in a structured and secure manner.
What is Domain Driven Design (DDD) really about? How might Command Query Responsibility Segregation (CQRS) help us to build better software? Far from being esoteric concepts, they can be harnessed by everyday developers to create long-lasting, flexible solutions.
Architecting on AWS covers the fundamentals of building IT infrastructure on AWS. The course is designed to teach solutions architects how to optimize the use of the AWS Cloud by understanding AWS services and how these services fit into cloud-based solutions.
Designed for testers with experience with functional testing this course highlights the issues and best approaches for testing mobile applications. Attendees will learn how to approach mobile testing projects, which quality characteristics to address and how to plan, organise and execute the testing
AWS Business Essentials helps IT business decisionmakers understand the benefits of cloud computing and how a cloud strategy can help you meet your business objectives.
AWS Technical Essentials introduces you to AWS products services and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS
Configuring BGP on Cisco Routers provides students with an in-depth knowledge of Border Gateway Protocol (BGP), a routing protocol that is one of the foundations of the Internet and New World technologies such as Multiprotocol Label Switching (MPLS).
Big Data on AWS introduces you to cloud-based big data solutions such as Amazon Elastic MapReduce (EMR), Amazon Redshift, Amazon Kinesis and the rest of the AWS big data platform.
After four days of lecture and intensive hands-on labs, BizTalk Developer Deep Dive attendees will obtain the skills required to build advanced integration and business process automation solutions using BizTalk Server. The course is delivered in cooperation with iBiz Solutions.
This 3 days course teaches advanced management topics that are not covered in any other publicly available courses. Attendees will learn how to install, configure, deploy, monitor, and manage a BizTalk Server environment.
After 4-days of intense hands-on training, developers will leave with the core skills required to design and build the next generation of integration and business process solutions using BizTalk Server.
The Building Cisco Service Provider Next-Generation Networks, Part 2 (SPNGN2) v1.2 course is an instructor-led course that is presented by Cisco Learning Partners to their end-user customers.
The Building Cisco Service Provider Next-Generation Networks, Part 1 (SPNGN1) v1.2 is a course that provides network engineers and technicians with the basic knowledge and skills necessary to support a service provider network.
The Business Intelligence on Oracle Cloud training provides step-by-step instructions for creating analyses and dashboards using Oracle Business Intelligence Cloud Service.
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
The accelerated CCNA Bootcamp is an intensive program designed to teach learners how to install, operate, configure and verify a basic IPv4 and IPv6 network including configuring a LAN switch, configuring an IP router, connecting to a WAN and identifying basic security threats.
The cloud is here. Are you ready to meet the security challenge? This CCSP: Certified Cloud Security Professional Boot Camp is the most comprehensive review of cloud security concepts and industry best practices covering all six domains of the (ISC)2 Common Body of Knowledge (CBK)!
This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
Å ivareta sikkerheten i en bedrift er komplekst. Nøkkelen til å lykkes er å konsolidere sikkerheten slik at alle sikkerhetsfunksjoner dekkes under samme paraply.
Å ivareta sikkerheten i en bedrift er komplekst. Nøkkelen til å lykkes er å konsolidere sikkerheten slik at alle sikkerhetsfunksjoner dekkes under samme paraply. R80.10 administrasjon sørger for slik konsolidering.
Vi tilbyr kurs i Check Point Cyber Security Engineering (CCSE) - R80.20. Dette kurset gir deg ytterligere kompetanse og hands-on på mer avanserte funksjoner på Check Points nyeste brannmur-plattform.
Vi tilbyr Check Point R80.20 CCSA / CCSE Boot Camp. Denne Boot Campen retter seg mot deg som skal jobbe med Check Points brannmurløsninger.
Check Point Certified Security Master (CCSM) R80.20 course provide an understanding of advanced concepts and skills necessary to manage virtualized security in high-end networks and advanced security optimization techniques.
Check Point workshop: Multi-Domain Management with Virtual System Extension (MDM with VSX R80). Master the skills to deploy and manage virtualized security in high-performance environments. This course covers everything you need to design, install, configure and manage MDM with VSX.
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis.
This 5-day course provides students with the knowledge and skills required for implementing a Cisco Collaboration solution at a single-site environment.
Now completely updated for 2019 with the latest material. (ISC)2 Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification.
In the COBIT 5 Assessor course participants will master the understanding of how to perform a formal Process Capability Assessment and how it can be used to enable business goals, prioritize improvement activities and identify opportunities for improving the governance and management of IT assets.
This 3-day, instructor-led IT Governance Foundation Course provides an overview of the main concepts of IT Governance according to COBIT 5, ISACA ’s latest governance framework, and how they can be applied.
Get a practical appreciation of how to apply COBIT® 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives.
To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code.
Students will explore how to manage Citrix Endpoint Management in this three day course. Venture into the cloud as students learn to manage devices, apps, and users.
CTX_CMB-310: Citrix XenAPP, XenDesktop, and Provisioning Services 7.1x Administration (Fast Track).
CTX_CNS-220: Citrix ADC 12.x Essentials and Traffic Management (formally Netscaler). Build your Citrix ADC knowledge and skills by enrolling in this 5-day course.
This foundational administration course covers the major aspects of installing, configuring and managing a highly available Citrix Virtual Apps and Desktops 7.1x environment.
Improve your XenApp and XenDesktop image management and performance with Provisioning Services. Learn to install and configure a highly available Provisioning Services farm according to leading practices.
Get more value out of your XenApp and XenDesktop investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, advanced features, and troubleshooting tools.
CTX_CXD-400: Designing App and Desktop Solutions with Citrix XenApp and XenDesktop.
CTX_CXM-202: Managing and Supporting a Mobility Solution with Citrix XenMobile. Designed for students with little or no previous XenMobile experience, this course is best suited for individuals who will be managing and supporting XenMobile environments.
CTX_CXM-303: Deploying and Enterprise Mobility Solution with Citrix XenMobile v10. This course provides the skills necessary to install, configure, and integrate components in a Citrix XenMobile 10 Enterprise solution.
Build a new skill set around Citrix XenServer 7.x focusing on the 7.1 Long Term Services Release, which delivers optimized server virtualization for all datacenter workloads.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
CTX-CNS-320: Citrix ADC Advanced Concepts - Security, Management and Optimization (formally Netscaler).
CWS-215: Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud. If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
CXD-252: Moving to the XenApp and XenDesktop Service on Citrix Cloud and Microsoft Azure.
Introducing Cisco Data Center Technologies provides an introduction to Cisco technologies and products that are deployed in the data center.
In addition to general approaches and technologies for network design, this course promotes Cisco solutions in designing and implementing scalable internetworks. Among specific goals is the promotion of the modular approach to network design.
Developing on AWS helps developers understand how to use the AWS SDK to develop secure and scalable cloud applications. The course provides in-depth knowledge about how to interact with AWS using code and covers key concepts, best practices, and troubleshooting tips.
DevOps is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support. The goal is to add value by improving the flow in this process.
DevOps Engineering on AWS demonstrates how to use the most common DevOps patterns to develop, deploy, and maintain applications on AWS.
This course is designed to provide you with the background knowledge you need to build your DevOps vocabulary and to understand the principles and practices of DevOps.
The new ECSAv10 program offers a seamless learning progress, continuing where the CEH program left off.
For the people who thought that the Advanced course was a piece of cake, this course fills the role of uncovering the final secrets of Git. It is aimed for people in the role of implementing workflows inside an organization: people who write scripts and set up the environments for others.
This course will enable students to understand QoS, virtualization and cloud services, network programmability related to WAN, access and core segments.
The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v3.0 course provides you with the knowledge and skills needed to install, configure, operate, and troubleshoot a small enterprise network.
This course provides up-to-date training on the key features of the Cisco ASA 5500-X Series Next-Generation Firewall, including ASAv, ASA IDFW, ASA FirePOWER Service Module, ASA Cloud Web Security and ASA Clustering. Extensive hands on labs are provided to underline the concepts covered in the class
SISE: Implementing and Configuring Cisco Identity Services Engine.
This is the second course in Cisco´s CCNA Cyber Ops Curriculum and is designed to provide students with an understanding of how a Security Operations Center (SOC) functions and the knowledge required in this environment.
This extensively hands-on course focuses on deploying, securing, operating and maintaining the Cisco Unified Computing System (UCS) and UCS C-Series Rack Servers for use in data centers.
This course has been designed to provide students with the knowledge and skills required to implement and manage security on Cisco ASA firewalls, Cisco Routers with the firewall feature set and Cisco Switches.
This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on experience is done using the IOS CLI.
After this intensive two day training attendees will leave with the solid understanding on how to design and build the next generation of integration and business process solutions using Azure App Services.
This live classroom course is new for 2018! It focuses on the newest technologies of Microsoft Machine Learning Server and SQL Server 2017, and teaches you R and how to use it for machine learning on the Microsoft platform.
Introducing Cisco Data Center Networking introduces students to the primary technologies that are used in the Cisco Data Center.
In the last several years, distributed version control has revolutionized the way we do development. Among the various DVCS offerings, Git is a popular, flexible and advanced open-source tool that increases team productivity as less time is spent on merge conflicts and branching becomes painless.
Introduction to Machine Learning, AI and Data Science with Azure ML. This live classroom course is new for 2018! It focuses on the newest technologies of Microsoft Machine Learning Server and SQL Server 2017.
Dette kurset gir deg kunnskap om relevante nettverksbegreper og forståelse av protokollen som benyttes i alle nettverk - IP. Routere, switcher og lag 3 switcher er vanlige komponenter i et nettverk.
Vi tilbyr IP2: IP- og nettverks-workshop. Dette kurset er en kombinasjon av teori og praksis. Det er stort fokus på praktiske oppgaver!
IREB Certified Professional for Requirements Engineering - Foundation Level provides you with basic knowledge in requirements management and prepares you for certification according to IREB (International Requirements Engineering Board).
As an international standard for Business Continuity Management System, the ISO 22301 is designed to protect, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.
ISO 22301 Lead Auditor training enables you to develop the necessary expertise to perform a Business Continuity Management System (BCMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
Improve your ability to evaluate technical system attributes. Differentiate your skills by developing an internationally accredited advanced technical competency. Improve your ability to evaluate technical system attributes while acquiring advanced accreditation.
Build upon your Foundation-level skills with advanced test design techniques learnt with real-world emphasis. Plus, benefit from our free exam revision sessions. Boost your career and skillset with advanced test design techniques learnt with real-world emphasis.
Gain the knowledge and skills necessary to guide a test automation project, and differentiate yourself in one of the fastest growing areas of Software Testing. Become an Accredited Test Automation Engineer!
Build your test management skills. Move into a more senior role as a testing professional. Plus, benefit from our free exam revision sessions. Are you looking to move into a senior role in testing? Accredit your test management skills!
Designed for testers, this course provides an understanding of how Agile projects are organised, teaching commonly applied Agile development and testing practices.
Gain essential testing skills and build your career with this industry standard qualification for software testing professionals from the International Software Testing Qualifications Board.
Behovet for IT-kunnskap i økonomirollen blir større og større. Begrepet «nettsky» eller cloud kommer overalt, men hva kan du faktisk gjøre med det? Å be om IT-systemer og tjenester som støtter opp om økonomiprosessene krever IT-kompetanse på høyere nivå enn tidligere.
ITIL 4 is built on the established core of best practice in the ITIL guidance. ITIL 4 provides a practical and flexible approach to move to the new world of digital transformation and embrace an end-to-end operating model for the delivery and operation of products and services.
Vi tilbyr kurs i ITIL Awareness for bedrifter. Kurset gir et overblikk over ITIL-rammeverket og hvilke fordeler man oppnår ved å innføre dette i en organisasjon. Dette er et introduksjonskurs som ikke går i dybden.
Dette er et av 4 kurs innen Service Capability - en del av ITIL Intermediate kvalifiseringen som bygger videre mot ITIL Expert. Kurset retter seg mot deg som er involvert i eller har ansvaret for en eller flere av prosessene i ITIL.
Vi tilbyr kurs i ITIL Foundation - versjon 3. Dette kurset er ment å gi deltakerne en oversikt over de sentrale definisjonene som ITIL bruker og en oversikt over hvilke prosesser og funksjoner som ITIL definerer.
The ITIL 2011 Foundation course is the entry level certification course for IT Service Management Best Practices training in ITIL. This course covers the latest version of core ITIL best practices presented from a lifecycle perspective.
This course is delivered in a classroom setting using a case study and exercises that are designed to enhance the candidates understanding of ITIL. Students who have attended this course, and have done some self study, are suitably prepared to take the associated ITIL Foundation test.
Dette er et av fem kurs innen Service Lifecycle, og det retter seg mot deltagere som behøver kunnskaper om praksis og tilpasning innen ITIL Service Lifecycle. Hovedfokuset ligger på ledelsesperspektivet for Service Management. Hvert kurs bygger på en av ITILs kjernebøker.
Dette er et av fem kurs innen ITIL Service Lifecycle, og det retter seg mot deltagere som behøver kunnskaper om praksis og tilpasning innen ITIL Service Lifecycle. Hovedfokuset ligger på ledelsesperspektivet for Service Management. Hvert kurs bygger på en av ITILs kjernebøker.
ITIL® Managing Across the Lifecycle (Malc) kurset er siste kurs og modul som kandidater må ta for å oppnå ITIL Expert sertifiseringen. Kurset og testen kan bare gjennomføres dersom alle komponentene knyttet til denne kvalifiseringen er gjennomført.
Dette 2-dagers Kepner-Tregoe Foundation kurset gir en introduksjon til en systematisk prosess for problemløsning, slik at du blir i stand til å levere et høyt kvalitetsnivå og konsistens i kundestøtten.
You will enjoy it! The course teaches infrastructure security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation.
MasterClass: Administering and Configuring Active Directory Federation Services and Claims. Active Directory Federation Services and Claims workshop is the best way to learn how to implement the most business oriented server role!
This is a super intense workshop! First you learn how to hack and then you learn how to secure. It brings security understanding, hands-on and scenario based approach: see and cause the problem, then implement the solution!
Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks – we practiced both options!
MasterClass: Managing Active Directory Federation Services for Multiple Organizations. Multi organization ADFS is a perfect course if you need to implement ADFS across different organizations!
The secure infrastructure configuration should be the most important line of defense in every organization.
This is a deep dive course on infrastructure monitoring! We would like to say: ‘finally!’ as it took long time to prepare good examples, tools and scenarios for you!
This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals. It is a must go for enterprise administrators, security officers and architects.
Public Key Infrastructure (PKI) is a core service that facilitates authentication, encryption, and digital signing. This 4-day course teaches the skills required to design, operate, and maintain your PKI system.
Med MCSA Windows Server 2016 sertifiseringen beviser du at du har et godt fundament av Windows Server 2016 ferdigheter som er relevante på tvers av flere løsningsområder i et bedriftsmiljø.
Managing Enterprise Networks with Cisco Prime Infrastructure is an instructor led, lab-based, hands-on course.
This course covers both introductory and advanced MPLS and MPLS VPNs concepts. Configuration, implementation and troubleshooting skills are all included with a significant focus on the use of labs to consolidate the learners knowledge.
The main purpose of the course is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use of machine learning with big data tools such as HDInsight and R Services.
The main purpose of the course is to give students the ability plan and implement big data workflows on HDInsight.
The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App.
The main purpose of the course is to give students the ability to add BI techniques to Excel data analysis. The course goes beyond the capabilities of tables and charts and uses Pivot Charts, the Excel Data Model, and Power BI.