IT drifting tar stadig mer tid og ressurser både på arbeidsplassen og hjemme på datarommet. Her finner du kurs og opplæring i innen IT-sikkerhet inne områder som for eksempel nettverk og systemadministrasjon. Typiske temaer er; brannmur, antivirus, datagjennvinning, intranett, IT-strategi, TCP/IP osv. Ta gjerne kontakt med oss hvis du ønsker et skreddersydd tilbud for din bedrift.
Det gis en grunnutdannelse i datateknologi og samtidig spisskompetanse rettet mot 1. og 2. linje support. Studiet omfatter datamaskinens oppbygning og virkemåte, maskinvare, operativsystem og kontorapplikasjoner med brukerspesifikk konfigurasjon og feilsøking.
Dette er et ettårig studie som gir dypere kunnskap og ferdigheter innen drift og administrasjon av nettverk og servere. Studiet bygger videre på emner fra studiet IT Drift og Supportteknikk.
De fleste bedrifter i dag har anskaffet seg produktet Microsoft 365, men det er bare et fåtall som utnytter potensialet i pakken. Microsoft 365 er mye mer enn lokalt installert programvare, det er programvare for moderne kommunikasjon, dokumentproduksjon og samhandling i skyen.
Vi tilbyr kurs i Teams - Next Level. På tide å komme videre med Microsoft Teams! Ja, absolutt, på dette kurset lærer du å utnytte Teams til å samarbeide og kommunisere effektivt, redusere bruk av epost, samhandle på dokumenter m.m.
Vi tilbyr grunnkurs i Teams. Kom i gang med Teams du også! De fleste av oss har nå deltatt i teams møter og kjenner derfor litt til programmet, men Teams er så mye mer en bare møter
We offer online course about (In)Security in C++. The course teaches C++ developers fundamental concepts from Exploit Development and Reverse Engineering, and uses these concepts to demonstrate common vulnerabilities in C++ codebases.
We offer online course about Attack and Defense: API and Web Application Security. The major cause of webservice and web application insecurity is insecure software development practices.
We offer online course about Building Secure API´s and Web Applications. The major cause of webservice, microservice, and web application insecurity is insecure software development practices.
We offer online course about secure programming for the enterprise in .NET and .NET Core. Not encrypting your data is a risky move and just relying on hope that you won´t get hacked and compromised is not a winning strategy.
We offer online course about Secure Programming for the Enterprise in .NET Framework / .NET Core. Not encrypting your data is a risky move and just relying on the hope that you won´t get hacked and compromised is not a winning strategy.
We offer online course about Secure Programming for the Enterprise in .NET, .NET Core and Future. Not encrypting your data is a risky move and just relying on hope that you won´t get hacked and compromised is not a winning strategy.
We offer online course about TLS / HTTPS Security for Web Developers. Spend two days to understand both the theory and practice of SSL/TLS and Internet PKI.
Vi tilbyr nettkurs om lær å bygge passordlister med instruktør Roy Hansen. Enhver nettverkskonsulent, sikkerhetsanalytiker og pentester bør ha en ordliste av høy kvalitet i verktøykista si.
Vi tilbyr nettkurs i lær å dumpe passord. Her lærer du hvordan en angriper kan dumpe ut passordene fra en maskin i løpet av få sekunder, og hvordan denne dumpfila kan åpnes i etterkant for å grave frem passord.
Kurset er egnet som et innføringskurs i hvordan fange opp og analysere trafikken i et nettverk. Kurset fokuserer på å forstå ulike former for tregheter, som for eksempel om tregheten oppstår på en arbeidsstasjon eller en server, eller i selve nettverket.
Vi tilbyr kurs i nettverksskanning med nmap. Lær å skanne nettverket for å få oversikt aktive hoster, identifisere åpne og lukkede porter og hvilke operativsystem som blir benyttet.
Vi tilbyr nettkurs i passordcracking. Lær å cracke passord ved å blandt annet analysere tilgjengelige passorddatabaser, utforske hasher og bli kjent med verktøyet oclHashcat! Vi gjennomfører brute force angrep, ordlistebasert angrep og hybride angrep!
In this course, you will build on concepts introduced in Architecting on AWS. You will learn how to build complex solutions that incorporate data services, governance, and security on the AWS platform.
The Advanced Developing on AWS course uses the real-world scenario of taking a legacy, on-premises monolithic application and refactoring it into a serverless microservices architecture.
What is Domain Driven Design (DDD) really about? How might Command Query Responsibility Segregation (CQRS) help us to build better software? Far from being esoteric concepts, they can be harnessed by everyday developers to create long-lasting, flexible solutions.
Architecting on AWS - Virtual. This course covers the fundamentals of building IT infrastructure on the AWS platform. Students learn how to optimize the AWS Cloud by understanding how AWS services fit into cloud-based solutions.
Designed for testers with experience with functional testing this course highlights the issues and best approaches for testing mobile applications. Attendees will learn how to approach mobile testing projects, which quality characteristics to address and how to plan organise and execute the testing.
Validate your cloud expertise with an industry-recognized credential and grow your career
This course will cover the topics and techniques you will need to be successful in the AWS Certified Cloud Practitioner exam so that you can achieve this recognized level of certification.
AWS Technical Essentials - Virtual. In this introductory course, you will learn about AWS products, services, and common solutions. You will learn the fundamentals of identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements.
Configuring BGP on Cisco Routers provides students with an in-depth knowledge of Border Gateway Protocol (BGP), a routing protocol that is one of the foundations of the Internet and New World technologies such as Multiprotocol Label Switching (MPLS).
C and C++ Secure Coding - Virtual. To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
The Implementing and Administering Cisco Solutions course provides a broad range of fundamental knowledge for all IT careers. Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network.
CCSP: Certified Cloud Security Professional Certification Preparation. As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice
Now completely updated for 2020 with the latest material. (ISC)2 Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification.
CLACCM: Implementing Cisco Advanced Call Control and Mobility Services - Virtual. The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services.
The Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 course helps you prepare for the Cisco CCNP Collaboration and CCIE Collaboration certifications, and advanced-level roles focused on implementation and operation of Cisco collaboration solutions.
CLFNDU: Understanding Cisco Collaboration Foundations - Virtual
The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program built to incorporate critical secure network skills - Protect, Detect, Respond and Predict Maps to NICE 2.0
Learn the skills required to implement Citrix ADC Essential components including secure Load Balancing, High Availability, and Citrix ADC Management.
ILT/VILT: 2 Days eL: 12 HrsProducts: Citrix ADCLanguage: esFocus: Technical Learn the skills required to configure and manage Citrix ADC Traffic Management features, including Content Switching, Traffic Optimization, and Global Server Load Balancing.
Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB)
Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
Virtual - Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
In this three-day course, you will learn how Citrix SD-WAN can simplify branch networking for your organization.
CNS-320: Citrix ADC Advanced Concepts - Security, Management and Optimization. Learn how to configure your Citrix networking environment to address application services security requirements
COBIT 2019 Builds on, and integrates over 25 years of development in the Enterprise Governance of IT domain. COBIT 2019 incorporates new insights from science, and developed these insights into operational practices. COBIT 2019 is a major evolution of the framework, and replaces COBIT 2005.
In the COBIT 5 Assessor course participants will master the understanding of how to perform a formal Process Capability Assessment and how it can be used to enable business goals, prioritize improvement activities and identify opportunities for improving the governance and management of IT assets.
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise.
The goal of this CWNA course is to add Wi-Fi expertise to a networking professional’s skillset, while covering all CWNA exam topics.
CWS-215: Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud. If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
CWS-315: Citrix Virtual Apps and Desktops 7 Advanced Administration. Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
Learn how to navigate the move from Citrix Virtual Apps and Desktops 7 on-premises to Citrix Virtual Apps and Desktops Service on Citrix Cloud. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix Cloud
Data Center Automation with vRealize Orchestrator and vSphere PowerCLI - Virtual. This five-day course teaches experienced VMware vSphere® administrators how to use the powerful automation tools that all vSphere customers have access to.
Learn how to design a cloud-based data warehousing solution using Amazon RedShift. In this course, you will learn concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS.
DCACIO: Cisco Application Centric Infrastructure Operations and Troubleshooting - Virtual. The Cisco Application Centric Infrastructure Operations and Troubleshooting course shows you how to operate and troubleshoot a Cisco data center network infrastructure running Cisco ACI.
Connect2Classroom - The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) course helps you prepare for the Cisco CCNP Data Center and CCIE Data Center certifications and for advanced-level data center roles.
ENWLSD: Designing Cisco Enterprise Wireless Networks - Virtual. The Designing Cisco Enterprise Wireless Networks (ENWLSD) course gives you the knowledge you need to design Cisco® wireless networks.
The Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) virtual course helps you prepare for the Cisco DevNet Professional certification and for professional-level network automation engineer roles.
Developing on AWS - Virtual. In this course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. We will explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.
DevOps Engineering on AWS. In this course, you will learn the most common DevOps patterns to develop, deploy, and maintain applications on the AWS platform.
This course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals.
A DevOps Leader is a tactical or strategic individual who helps design, influence, implement or motivate the cultural transformation proven to be a critical success factor in DevOps adoption.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
Build your Cisco Meraki technical knowledge and skills with this full-day, virtual, instructor-led training. This is the first of two courses that will prepare you for the Cisco Meraki Solutions Specialist certification exam.
Elevate your Cisco Meraki technical knowledge and skills with this three-day, instructor-led training! In this advanced technical training course, you’ll gain the knowledge and skills to plan, design, implement, and operate complex Cisco Meraki solutions.
The course is designed for those who want to learn how to create a full-text search in their project, which we will explore more in deep. In addition to using Elasticsearch, we will learn other user search concepts.
Elasticsearch course is intended for those who want to learn how to use technology Elasticsearch to store and to retrieve large amounts of data to be easily scaled.
ENARSI: Implementing Cisco Enterprise Advanced Routing and Services - Virtual. The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) provides you with the knowledge you need to install, configure, operate, and troubleshoot an enterprise network.
The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) course provides insight into Cisco Catalyst 9000 Series Switches and its solution components.
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks.
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.0 course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any related issues.
Exam Readiness: AWS Certified Developer - Associate, Virtual. The AWS Certified Developer - Associate exam validates technical expertise in developing and maintaining applications on the AWS platform.
Exam Readiness: AWS Certified Solutions Architect - Associate, Virtual. The AWS Certified Solutions Architect - Associate exam validates technical expertise in designing and deploying scalable, highly available, and fault-tolerant systems on AWS.
This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software.
ENWLSI: Implementing Cisco Enterprise Wireless Networks - Virtual. The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.0 course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any related issues.
Vi tilbyr kurs i IP1: Generell nettverksteknologi - Virtual. Dette kurset gir deg kunnskap om relevante nettverksbegreper og forståelse av protokollen som benyttes i alle nettverk - IP. Routere, switcher og lag 3 switcher er vanlige komponenter i et nettverk.
Vi tilbyr IP2: IP- og nettverks-workshop - Virtual. Dette kurset er en kombinasjon av teori og praksis. Det er stort fokus på praktiske oppgaver!
IREB CPRE Foundation Level - Connect2Classroom. IREB Certified Professional for Requirements Engineering - Foundation Level provides you with basic knowledge in requirements management and prepares you for certification according to IREB (International Requirements Engineering Board).
As an international standard for Business Continuity Management System, the ISO 22301 is designed to protect, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.
ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
Virtual - ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework.
ISO/IEC 27001 Foundation - Virtual. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
Virtual - ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Connect2Classroom - ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701.
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701.
Improve your ability to evaluate technical system attributes. Differentiate your skills by developing an internationally accredited advanced technical competency. Improve your ability to evaluate technical system attributes while acquiring advanced accreditation.
Gain the knowledge and skills necessary to guide a test automation project, and differentiate yourself in one of the fastest growing areas of Software Testing. Become an Accredited Test Automation Engineer!
ISTQB Advanced Level Test Manager - virtual. Build your test management skills. Move into a more senior role as a testing professional. Plus, benefit from our free exam revision sessions. Are you looking to move into a senior role in testing? Accredit your test management skills!
Designed for testers, this course provides an understanding of how Agile projects are organised, teaching commonly applied Agile development and testing practices.
ISTQB® Foundation - Connect2Classroom. Gain essential testing skills and build your career with this industry standard qualification for software testing professionals from the International Software Testing Qualifications Board.
ITIL 4 is built on the established core of best practice in the ITIL guidance. ITIL 4 provides a practical and flexible approach to move to the new world of digital transformation and embrace an end-to-end operating model for the delivery and operation of products and services.
Vi tilbyr kurs i ITIL® 4 Foundation - Virtual. ITIL 4 Foundation er et kurs, som er basert på AXELOS sine beskrivelser av stoffet til Foundation eksamen.
The ITIL ® 4 Specialist: Create, Deliver and Support module is part of the Managing Professional stream for ITIL 4 and participants need to pass the related certification exam for working towards the Managing Professional (MP) designation.
The Drive Stakeholder Value Specialist Certification is relevant to everyone in a supplier facing role. This means those managing one or more suppliers, and working with suppliers in providing a single integrated service management organization.
This course includes the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing, focusing on rapid delivery of products & services to obtain maximum value.
The ITIL® 4 Strategist: Direct, Plan, and Improve course is designed to provide practitioners with a practical and strategic method for planning and delivering continual improvement with necessary agility.
Machine Learning and Data Science in R on Microsoft ML and SQL Servers - with Rafal Lukawiecki Virtual. This very intensive, hands-on, 5-day course has been designed for those who want to learn more in-depth machine learning and data science using R.
MasterClass: System Forensics and Incident Handling - Virtual. The secure infrastructure configuration should be the most important line of defense in every organization.
This Virtual course is a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them!
Vietual Masterclass: Internet Information Services 10 Management (IIS). Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks - we practiced both options!
MasterClass: System Forensics and Incident Handling. The secure infrastructure configuration should be the most important line of defense in every organization.
This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals. It is a must go for enterprise administrators, security officers and architects.
Migrating to AWS - Virtual. Learn about cloud migration strategies and dive into our recommended five-phase plan for migrating existing workloads to the AWS Cloud.
This course covers both introductory and advanced MPLS and MPLS VPNs concepts. Configuration, implementation and troubleshooting skills are all included with a significant focus on the use of labs to consolidate the learners knowledge.
Vi tilbyr kurs om problemløsning basert på Kepner Tregoe - Virtual. Kurset gir en introduksjon til en systematisk prosess for problemløsning, slik at du blir i stand til å levere et høyt kvalitetsnivå og konsistens i kundestøtten.
SAFe® DevOps Certification - Virtual. Apply the DevOps role to bring alignment throughout a SAFe® enterprise and put together high performing Agile teams. Get equipped with the tools and knowledge needed for DevOps to increase your value to SAFe teams.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
SCOR: Implementing and Operating Cisco Security Core Technologies - Virtual. The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
The Understanding Cisco SDA Fundamentals (SDAFND) course introduces you to Cisco® Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks.
Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
Your medical device written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
Security Engineering on AWS - Virtual. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud.
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities.
Vi tilbyr kurs om SIAM® Foundation. SIAM is a management methodology that can be applied in an environment where services are delivered using a number of service providers.
SISE: Implementing and Configuring Cisco Identity Services Engine - virtual
This course takes a detailed look at how to use Spring Boot to create sophisticated applications rapidly, according to best practices and contemporary enterprise application patterns.
This course takes a detailed and pragmatic look at how to create Spring Cloud solutions. You will learn how to create microservices in Spring Cloud, and how to configure, discover, and route microservice applications.
SSFIPS: Securing Networks with Cisco Firepower Next-Generation IPS - Virtual. The Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 course shows you how to deploy and use Cisco Firepower® Next-Generation Intrusion Prevention System (NGIPS).
Virtual - The Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 course shows you how to deploy and use Cisco Firepower® Next-Generation Intrusion Prevention System (NGIPS).
SSNGFW: Securing Networks with Cisco Firepower Next Generation Firewall - Virtual. The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) course shows you how to deploy and use Cisco Firepower Threat Defense system.
In this course, you will learn how to create automatable and repeatable deployments of networks and systems on the AWS platform. We will explore the AWS features and tools related to, and best practices for, configuration and deployment.
Want to improve the way your organisation works? In this course, you will learn why process improvement with TMMi (Test Maturity Model integration) is important, ways to identify opportunities, and the benefits of successfully improving said improvements.
UCCXD: Deploying Cisco Unified Contact Center Express - Connect2Classroom. This course is designed for systems engineers who will be responsible for deploying the Cisco Unified Contact Center Express (Unified CCX) and Cisco Unified IP Interactive Voice Response (Unified IP IVR) products.
This course is designed to provide collaboration engineers with the knowledge and skills required to implement a complete Cisco TelePresence solution, including TelePresence endpoints and the integration of on premise with cloud and meeting solutions and management software.
This one-day course teaches you how to use the VMware Carbon Black® App Control™ product and leverage the capabilities to configure and maintain the system according to their organization’s security posture and organizational policies.
This one-day course teaches you how to configure and scope the rules within VMware Carbon Black® App ControlTM product to maintain the system according to your organization’s security posture and organizational policies.
This one-day course teaches you how to use the VMware Carbon Black® Cloud Audit and Remediation™ product to build queries for IT hygiene, incident response, and vulnerability assessment to support your organization’s security posture and policies.
This one-day course teaches you how to use the VMware Carbon Black Cloud Endpoint™ Standard product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies.
This one-day course teaches you how to use the VMware Carbon Black® Cloud Enterprise EDR™ product and leverage its capabilities to configure and maintain the system according to your organization’s security posture and policies.
This one-day course teaches you how to use the VMware Carbon Black® EDR™ product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies.
This one-day course teaches you how to use the advanced features of the VMware Carbon Black® EDR™ product.
This one-day course teaches you how to use the VMware Carbon Black® EDR™ product during incident response. Using the SANS PICERL framework, you will configure the server and perform an investigation on a possible incident.
This 5-day course teaches you how to install, configure, and manage the VMware Carbon Black® Portfolio suite of products, which include
This five-day virtual course includes instruction on the capabilities of VMware Cloud Foundation™ and how to successfully plan, deploy, manage, and operate hybrid and cloud infrastructures, including customization.
You explore the common use cases of the VMware Cloud on AWS infrastructure that allows you to modernize, protect, and scale applications based on VMware vSphere® that leverage
VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration.
VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track - virtual. This five-day accelerated, hands-on training course is a blend of VMware Horizon® 8: Skills for Virtual Desktop Management, VMware Horizon 8
VMware Integrated Openstack: Install, Configure, Manage (V5) - Virtual. This five-day, hands-on course provides you with the skills to build private cloud using VMware® Integrated OpenStack on VMware-proven SDDC.
VMware NSX-T Data Center: Design (V3.2) - Virtual. This five-day course provides comprehensive training on considerations and practices to design a VMware NSX-T™ Data Center environment as part of a software-defined data center strategy.
VMware NSX-T Data Center: Install, Configure, Manage (V3.2) - Virtual. This five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment.
VMware NSX-T Data Center: Troubleshooting and Operations [V3.0) - Virtual.. This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX-T™ Data Center environment.
VMware SD-WAN by VeloCloud: Deploy and Manage - Virtuelt. During this one-day course, you gain an understanding of the architecture and features of VMware SD-WAN by VeloCloud™.
VMware SD-WAN by VeloCloud: Design and Deploy [V3.x] - Virtuelt. Customers demand a scalable, secure, and manageable VMware SD-WAN™ by VeloCloud®
During this three-day course, you focus on installing VMware Tanzu™ Kubernetes Grid™ on a VMware vSphere® environment and then provisioning and managing Tanzu Kubernetes clusters.
VMware vCloud Director: Tenant Operations [V10.x] - Virtual. In this five-day course, you focus on configuring and managing VMware vCloud Director® for Service Providers 10.x Tenant Operations.Providers 10.x.
VMware vRealize Automation: Design and Deploy (V7.6) - Virtual. This five-day course focuses on designing and deploying an enterprise cloud by using a distributed architecture deployment of VMware vRealize® Automation™.
VMware vRealize Automation: Install, Configure, Manage (V8.3) virtual. During this five-day course, you will focus on installing, configuring, and managing VMware vRealize® Automation™.
VMware vRealize Automation: Orchestration and Extensibility [V8.6] - virtual. During this five-day course, you focus on using VMware vRealize® Orchestrator™ to extend the functionality of VMware vRealize® Automation™.
During this five-day virtualcourse, you focus on installing, configuring, and managing VMware vRealize® Automation™.
VMware vRealize Network Insight: Install, Configure, Manage (V5.0) Connect2Classroom. This two-day, hands-on course gives you the skills to deploy and use VMware vRealize® Network Insight™ to ensure an optimized, highly available, and secure infrastructure for your applications.
VMware vRealize Operations: Install, Configure, Manage [V8.6] - Virtual. This five-day course is for users of both cloud and on-premises versions of the VMware vRealize® Operations™ product.
VMware vSAN: Deploy and Manage v6.7 - Virtual. In this three-day course, you focus on deploying and managing a software-defined storage solution with VMware vSAN™ 6.7. You learn how vSAN functions as an important component in the VMware software-defined data center.
In this three-day course, you learn about managing and operating VMware vSAN™ 7.
VMware vSAN: Production Operations (V7) - Connect2Classroom. In this two-day course, you focus on building skills in configuring and performing common administrator and end-user tasks with VMware vSAN™ 7.
In this two-day course, you focus on learning the tools and skills necessary to troubleshoot VMware vSAN™ 7 implementations. You gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises.
This five-day, extended hour course takes you from introductory to advanced VMware vSphere® 8 management skills. Building on the installation and configuration content from our best-selling course
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 8, which includes VMware ESXi™ 8 and VMware vCenter Server® 78
VMware vSphere: Optimize and Scale plus Troubleshooting Fast Track [V7]. This five-day, accelerated, hands-on training course is a blend of the VMware vSphere®: Optimize and Scale and VMware vSphere: Troubleshooting courses.
This five-day, hands-on training course provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 7.x environment.
In this three-day, hands-on training course, you explore the new features and enhancements in VMware vCenter Server® 7.0 and VMware ESXi™ 7.0.
In this five-day course, you learn about the advanced VMware Workspace ONE® use cases and integrations. The course also addresses the industry standard authentication protocol and technologies that can be integrated with Workspace ONE.
In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multi-platform endpoint management solution with VMware Workspace ONE® UEM.
In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE® Access™ with VMware Workspace ONE® UEM to securely distribute business-critical applications from any device and configure access management controls.
In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE® Access™ with VMware Workspace ONE® UEM to securely distribute business-critical applications from any device and configure access management controls
In this three-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multi-platform endpoint management solution with VMware Workspace ONE®.
Students should supply their own devices to complete the lab exercises. Anyone using an iOS or Android device should ensure they are running IOS12.3 or Android 8 for optimal performance.
As a developer, your duty is to write bulletproof code. However.. What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed?What if, as you are reading this, hackers were trying to break into your code?
Your Web application written in C# works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
Brannmuradministratorer står nå overfor utfordringen med å identifisere skadelig programvare som allerede har infisert nettverket
Cortex XDR-trening for avansert endepunktsbeskyttelse og utbedring
Lær å sikre eksterne nettverk og mobilbrukere i skyen.
Live Online Training
Velg mellom å ta kurset på hele 5 dager eller 10 halve dager.
For mer informasjon se https://dataequipment.no/kurs/firewall-configuration-and-management
Lær hvordan feilsøke problemer relatert til brannmuren
Kurset gjennomføres online over 4 halve dager.
Instructor-Led Virtual - Live Online Training
Vi tilbyr praktisk nettverkskurs. Har du ikke nok oversikt over hva som skjer i nettverket ditt eller har problemer med å forstå hvordan nettverket virker? Praktisk kurs hvor vi starter med gjennomgang av topologien som skal bygges.
Vi tilbyr Bachelor i Applied Data Science som nettstudie. IT-utdanning som gjør deg svært ettertraktet innen maskinlæring, kunstig intelligens og big data-analyse. Gå rett i jobb som data scientist, det mest sexy yrket i det 21. århundret, ifølge Harvard Business Review.
Vi tilbyr Bachelor i Cyber Security som nettstudie. IT-utdanning som lærer deg å sikre digitale systemer mot cyberangrep, datakriminalitet og digital krigføring. Studiet gjør deg klar til å jobbe praktisk med IKT-sikkerhet og redusere digital sårbarhet.
Vi tilbyr Bachelor i digital etterforskning som nettstudie. IT-utdanning som lærer deg datasikkerhet og etterforskning av digital kriminalitet. Studiet gjør deg klar til å jobbe praktisk med digital sikkerhet og etterretning for politi og andre organisasjoner med behov for økt digital sikkerhet.
Vi tilbyr utdannelse i nettverk og IT-sikkerhet som nettstudie. Praktisk IT-utdanning som lærer deg å bekjempe hacking og datakriminalitet. Det akutte kompetansebehovet for IT-sikkerhet gir solide jobbmuligheter etter studiet.
Vi tilbyr nettstudie i nettverks- og systemadministrasjon. Praktisk IT-utdanning som lærer deg administrasjon av nettverk og systemer. Studiet sentreres rundt Microsoft- og Unix-baserte teknologier, og infrastruktur for nettverk og serverdrift med fokus på IT-sikkerhet.
This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate.
This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure
This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration.
This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations.