IT drifting tar stadig mer tid og ressurser både på arbeidsplassen og hjemme på datarommet. Her finner du kurs og opplæring i innen IT-sikkerhet inne områder som for eksempel nettverk og systemadministrasjon. Typiske temaer er; brannmur, antivirus, datagjennvinning, intranett, IT-strategi, TCP/IP osv. Ta gjerne kontakt med oss hvis du ønsker et skreddersydd tilbud for din bedrift.
Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform.
This course will take your Git knowledge to the next level. It fuses a deeper look into how Git really works with a range of carefully selected practical techniques and advice on best practices.
Advanced Machine Learning with Microsoft ML Server, SQL Server, and Azure ML. The agenda for this 4 day Advanced class with Rafal Lukawiecki is under development. Content will be released.
What is Domain Driven Design (DDD) really about? How might Command Query Responsibility Segregation (CQRS) help us to build better software? Far from being esoteric concepts, they can be harnessed by everyday developers to create long-lasting, flexible solutions.
Architecting on AWS covers the fundamentals of building IT infrastructure on AWS. The course is designed to teach solutions architects how to optimize the use of the AWS Cloud by understanding AWS services and how these services fit into cloud-based solutions.
Designed for testers with experience with functional testing this course highlights the issues and best approaches for testing mobile applications. Attendees will learn how to approach mobile testing projects, which quality characteristics to address and how to plan, organise and execute the testing
AWS Business Essentials helps IT business decisionmakers understand the benefits of cloud computing and how a cloud strategy can help you meet your business objectives.
AWS Technical Essentials introduces you to AWS products services and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS
Develop your all-round BA skills with the BCS Foundation Certificate. Gain a full overview of the BA ecosystem, focusing on requirements engineering and beyond.
Drive business improvement by enhancing your analysis, planning and strategic skills. Effectively identify business issues, opportunities, problems and solutions.
Build on your strategic BA skills.
Gain practical, proven techniques for modelling, analysing and improving business processes. Apply your learning by following a detailed case study.
Learn methods for improving your processes and realise business outcomes.
This course is for Business Analysis practitioners and other interested stakeholders who wish to gain or improve their skills in business system requirements investigation and specification.
Configuring BGP on Cisco Routers provides students with an in-depth knowledge of Border Gateway Protocol (BGP), a routing protocol that is one of the foundations of the Internet and New World technologies such as Multiprotocol Label Switching (MPLS).
Big Data on AWS introduces you to cloud-based big data solutions such as Amazon Elastic MapReduce (EMR), Amazon Redshift, Amazon Kinesis and the rest of the AWS big data platform.
After four days of lecture and intensive hands-on labs, BizTalk Developer Deep Dive attendees will obtain the skills required to build advanced integration and business process automation solutions using BizTalk Server. The course is delivered in cooperation with iBiz Solutions.
This 3 days course teaches advanced management topics that are not covered in any other publicly available courses. Attendees will learn how to install, configure, deploy, monitor, and manage a BizTalk Server environment.
After 4-days of intense hands-on training, developers will leave with the core skills required to design and build the next generation of integration and business process solutions using BizTalk Server.
The Building Cisco Service Provider Next-Generation Networks, Part 2 (SPNGN2) v1.2 course is an instructor-led course that is presented by Cisco Learning Partners to their end-user customers.
The Building Cisco Service Provider Next-Generation Networks, Part 1 (SPNGN1) v1.2 is a course that provides network engineers and technicians with the basic knowledge and skills necessary to support a service provider network.
The Business Intelligence on Oracle Cloud training provides step-by-step instructions for creating analyses and dashboards using Oracle Business Intelligence Cloud Service.
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
The accelerated CCNA Bootcamp is an intensive program designed to teach learners how to install, operate, configure and verify a basic IPv4 and IPv6 network including configuring a LAN switch, configuring an IP router, connecting to a WAN and identifying basic security threats.
The Implementing and Administering Cisco Solutions course provides a broad range of fundamental knowledge for all IT careers. Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network.
The cloud is here. Are you ready to meet the security challenge? This CCSP: Certified Cloud Security Professional Boot Camp is the most comprehensive review of cloud security concepts and industry best practices covering all six domains of the (ISC)2 Common Body of Knowledge (CBK)!
This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
Å ivareta sikkerheten i en bedrift er komplekst. Nøkkelen til å lykkes er å konsolidere sikkerheten slik at alle sikkerhetsfunksjoner dekkes under samme paraply. R80.10 administrasjon sørger for slik konsolidering.
Å ivareta sikkerheten i en bedrift er komplekst. Nøkkelen til å lykkes er å konsolidere sikkerheten slik at alle sikkerhetsfunksjoner dekkes under samme paraply.
Vi tilbyr kurs i Check Point Cyber Security Engineering (CCSE) - R80.20. Dette kurset gir deg ytterligere kompetanse og hands-on på mer avanserte funksjoner på Check Points nyeste brannmur-plattform.
Check Point Certified Security Master (CCSM) R80.20 course provide an understanding of advanced concepts and skills necessary to manage virtualized security in high-end networks and advanced security optimization techniques.
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis.
Now completely updated for 2019 with the latest material. (ISC)2 Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification.
In the COBIT 5 Assessor course participants will master the understanding of how to perform a formal Process Capability Assessment and how it can be used to enable business goals, prioritize improvement activities and identify opportunities for improving the governance and management of IT assets.
This 3-day, instructor-led IT Governance Foundation Course provides an overview of the main concepts of IT Governance according to COBIT 5, ISACA ’s latest governance framework, and how they can be applied.
Get a practical appreciation of how to apply COBIT® 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives.
To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code.
Students will explore how to manage Citrix Endpoint Management in this three day course. Venture into the cloud as students learn to manage devices, apps, and users.
CTX_CMB-310: Citrix XenAPP, XenDesktop, and Provisioning Services 7.1x Administration (Fast Track).
CTX_CNS-220: Citrix ADC 12.x Essentials and Traffic Management (formally Netscaler). Build your Citrix ADC knowledge and skills by enrolling in this 5-day course.
This foundational administration course covers the major aspects of installing, configuring and managing a highly available Citrix Virtual Apps and Desktops 7.1x environment.
Get more value out of your XenApp and XenDesktop investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, advanced features, and troubleshooting tools.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
CWS-215: Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud. If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
CXD-251: Citrix Virtual Apps and Desktops Service on Microsoft Azure
Learn to deploy and manage your Citrix Virtual Apps and Desktops apps and desktops in Microsoft Azure.
CXD-252: Moving to the XenApp and XenDesktop Service on Citrix Cloud and Microsoft Azure.
Introducing Cisco Data Center Technologies provides an introduction to Cisco technologies and products that are deployed in the data center.
In addition to general approaches and technologies for network design, this course promotes Cisco solutions in designing and implementing scalable internetworks. Among specific goals is the promotion of the modular approach to network design.
Developing on AWS helps developers understand how to use the AWS SDK to develop secure and scalable cloud applications. The course provides in-depth knowledge about how to interact with AWS using code and covers key concepts, best practices, and troubleshooting tips.
DevOps is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support. The goal is to add value by improving the flow in this process.
DevOps Engineering on AWS demonstrates how to use the most common DevOps patterns to develop, deploy, and maintain applications on AWS.
This course is designed to provide you with the background knowledge you need to build your DevOps vocabulary and to understand the principles and practices of DevOps.
The new ECSAv10 program offers a seamless learning progress, continuing where the CEH program left off.
For the people who thought that the Advanced course was a piece of cake, this course fills the role of uncovering the final secrets of Git. It is aimed for people in the role of implementing workflows inside an organization: people who write scripts and set up the environments for others.
This course will enable students to understand QoS, virtualization and cloud services, network programmability related to WAN, access and core segments.
The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v3.0 course provides you with the knowledge and skills needed to install, configure, operate, and troubleshoot a small enterprise network.
This course provides up-to-date training on the key features of the Cisco ASA 5500-X Series Next-Generation Firewall, including ASAv, ASA IDFW, ASA FirePOWER Service Module, ASA Cloud Web Security and ASA Clustering. Extensive hands on labs are provided to underline the concepts covered in the class
SISE: Implementing and Configuring Cisco Identity Services Engine.
This is the second course in Cisco´s CCNA Cyber Ops Curriculum and is designed to provide students with an understanding of how a Security Operations Center (SOC) functions and the knowledge required in this environment.
This extensively hands-on course focuses on deploying, securing, operating and maintaining the Cisco Unified Computing System (UCS) and UCS C-Series Rack Servers for use in data centers.
This course has been designed to provide students with the knowledge and skills required to implement and manage security on Cisco ASA firewalls, Cisco Routers with the firewall feature set and Cisco Switches.
This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on experience is done using the IOS CLI.
After this intensive two day training attendees will leave with the solid understanding on how to design and build the next generation of integration and business process solutions using Azure App Services.
This live classroom course is new for 2018! It focuses on the newest technologies of Microsoft Machine Learning Server and SQL Server 2017, and teaches you R and how to use it for machine learning on the Microsoft platform.
Introducing Cisco Data Center Networking introduces students to the primary technologies that are used in the Cisco Data Center.
In the last several years, distributed version control has revolutionized the way we do development. Among the various DVCS offerings, Git is a popular, flexible and advanced open-source tool that increases team productivity as less time is spent on merge conflicts and branching becomes painless.
Introduction to Machine Learning, AI and Data Science with Azure ML. This live classroom course is new for 2018! It focuses on the newest technologies of Microsoft Machine Learning Server and SQL Server 2017.
Dette kurset gir deg kunnskap om relevante nettverksbegreper og forståelse av protokollen som benyttes i alle nettverk - IP. Routere, switcher og lag 3 switcher er vanlige komponenter i et nettverk.
IREB Certified Professional for Requirements Engineering - Foundation Level provides you with basic knowledge in requirements management and prepares you for certification according to IREB (International Requirements Engineering Board).
As an international standard for Business Continuity Management System, the ISO 22301 is designed to protect, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.
ISO 22301 Lead Auditor training enables you to develop the necessary expertise to perform a Business Continuity Management System (BCMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
Improve your ability to evaluate technical system attributes. Differentiate your skills by developing an internationally accredited advanced technical competency. Improve your ability to evaluate technical system attributes while acquiring advanced accreditation.
Build upon your Foundation-level skills with advanced test design techniques learnt with real-world emphasis. Plus, benefit from our free exam revision sessions. Boost your career and skillset with advanced test design techniques learnt with real-world emphasis.
Gain the knowledge and skills necessary to guide a test automation project, and differentiate yourself in one of the fastest growing areas of Software Testing. Become an Accredited Test Automation Engineer!
Build your test management skills. Move into a more senior role as a testing professional. Plus, benefit from our free exam revision sessions. Are you looking to move into a senior role in testing? Accredit your test management skills!
Designed for testers, this course provides an understanding of how Agile projects are organised, teaching commonly applied Agile development and testing practices.
Gain essential testing skills and build your career with this industry standard qualification for software testing professionals from the International Software Testing Qualifications Board.
Behovet for IT-kunnskap i økonomirollen blir større og større. Begrepet «nettsky» eller cloud kommer overalt, men hva kan du faktisk gjøre med det? Å be om IT-systemer og tjenester som støtter opp om økonomiprosessene krever IT-kompetanse på høyere nivå enn tidligere.
ITIL 4 is built on the established core of best practice in the ITIL guidance. ITIL 4 provides a practical and flexible approach to move to the new world of digital transformation and embrace an end-to-end operating model for the delivery and operation of products and services.
Vi tilbyr kurs i ITIL Awareness for bedrifter. Kurset gir et overblikk over ITIL-rammeverket og hvilke fordeler man oppnår ved å innføre dette i en organisasjon. Dette er et introduksjonskurs som ikke går i dybden.
Dette er et av 4 kurs innen Service Capability - en del av ITIL Intermediate kvalifiseringen som bygger videre mot ITIL Expert. Kurset retter seg mot deg som er involvert i eller har ansvaret for en eller flere av prosessene i ITIL.
Vi tilbyr kurs i ITIL Foundation - versjon 3. Dette kurset er ment å gi deltakerne en oversikt over de sentrale definisjonene som ITIL bruker og en oversikt over hvilke prosesser og funksjoner som ITIL definerer.
Vi tilbyr kurs i ITIL Foundation - versjon 4. IITIL 4 bygger på essensen av beste praksis som ITIL tilbyr når det gjelder tjenesteleveranser (Service management).
This course is delivered in a classroom setting using a case study and exercises that are designed to enhance the candidates understanding of ITIL. Students who have attended this course, and have done some self study, are suitably prepared to take the associated ITIL Foundation test.
Dette er et av fem kurs innen Service Lifecycle, og det retter seg mot deltagere som behøver kunnskaper om praksis og tilpasning innen ITIL Service Lifecycle. Hovedfokuset ligger på ledelsesperspektivet for Service Management. Hvert kurs bygger på en av ITILs kjernebøker.
Dette er et av fem kurs innen ITIL Service Lifecycle, og det retter seg mot deltagere som behøver kunnskaper om praksis og tilpasning innen ITIL Service Lifecycle. Hovedfokuset ligger på ledelsesperspektivet for Service Management. Hvert kurs bygger på en av ITILs kjernebøker.
ITIL® Managing Across the Lifecycle (Malc) kurset er siste kurs og modul som kandidater må ta for å oppnå ITIL Expert sertifiseringen. Kurset og testen kan bare gjennomføres dersom alle komponentene knyttet til denne kvalifiseringen er gjennomført.
Dette 2-dagers Kepner-Tregoe Foundation kurset gir en introduksjon til en systematisk prosess for problemløsning, slik at du blir i stand til å levere et høyt kvalitetsnivå og konsistens i kundestøtten.
You will enjoy it! The course teaches infrastructure security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation.
MasterClass: Administering and Configuring Active Directory Federation Services and Claims. Active Directory Federation Services and Claims workshop is the best way to learn how to implement the most business oriented server role!
This is a super intense workshop! First you learn how to hack and then you learn how to secure. It brings security understanding, hands-on and scenario based approach: see and cause the problem, then implement the solution!
Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks – we practiced both options!
MasterClass: Managing Active Directory Federation Services for Multiple Organizations. Multi organization ADFS is a perfect course if you need to implement ADFS across different organizations!
The secure infrastructure configuration should be the most important line of defense in every organization.
This is a deep dive course on infrastructure monitoring! We would like to say: ‘finally!’ as it took long time to prepare good examples, tools and scenarios for you!
This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals. It is a must go for enterprise administrators, security officers and architects.
Public Key Infrastructure (PKI) is a core service that facilitates authentication, encryption, and digital signing. This 4-day course teaches the skills required to design, operate, and maintain your PKI system.
Med MCSA Windows Server 2016 sertifiseringen beviser du at du har et godt fundament av Windows Server 2016 ferdigheter som er relevante på tvers av flere løsningsområder i et bedriftsmiljø.
You have a Datawarehouse and a BI solution in place. You probably have some doubts about how it will scale or if it is aligned with modern trends. Then this workshop is for you!
This course covers both introductory and advanced MPLS and MPLS VPNs concepts. Configuration, implementation and troubleshooting skills are all included with a significant focus on the use of labs to consolidate the learners knowledge.
The main purpose of the course is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use of machine learning with big data tools such as HDInsight and R Services.
The main purpose of the course is to give students the ability plan and implement big data workflows on HDInsight.
The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App.
The main purpose of the course is to give students the ability to add BI techniques to Excel data analysis. The course goes beyond the capabilities of tables and charts and uses Pivot Charts, the Excel Data Model, and Power BI.
Practical Machine Learning, AI and Data Science on SQL Server 2017, Microsoft ML Server, R, and Azure ML - with Rafal Lukawiecki. This live classroom course is new for 2018! It focuses on the newest technologies of Microsoft Machine Learning Server and SQL Server 2017.
This course is designed to provide professionals of medium-to-large network sites with information on the use of advanced routing in implementing scalability for Cisco routers that are connected to LANs and WANs. The ROUTE course is one of three courses that leads to CCNP certification.
SECFND: Understanding Cisco Cybersecurity Fundamentals.
The course provides essential skills for PHP developers necessary to make their applications resistant to contemporary attacks through the Internet.
SIAM is a management methodology that can be applied in an environment where services are delivered using a number of service providers.
I dette kurset får du oppleve hvordan Microsoft Teams kan få grupper av mennesker som skal jobbe sammen til å kommunisere og samarbeide på en bedre måte.
SPNGN1: Building Cisco Service Provider Next-Generation Networks, Part 1. The Building Cisco Service Provider Next-Generation Networks, Part 1 (SPNGN1) v1.2 is a course that provides network engineers and technicians with the basic knowledge and skills necessary to support a service provider network
SPNGN2: Building Cisco Service Provider Next Generation Networks, Part 2. The Building Cisco Service Provider Next-Generation Networks, Part 2 (SPNGN2) v1.2 course is an instructor-led course that is presented by Cisco Learning Partners to their end-user customers.
This course takes a detailed look at how to use Spring Boot to create sophisticated applications rapidly, according to best practices and contemporary enterprise application patterns.
This course takes a detailed and pragmatic look at how to create Spring Cloud solutions. You will learn how to create microservices in Spring Cloud, and how to configure, discover, and route microservice applications.
Implementing Cisco Switched Networks (SWITCH) v2.0 is a 5-day instructor-led training course, designed to help students prepare to plan, configure, and verify the implementation of complex enterprise switching solutions for campus environments using the Cisco Enterprise Campus Architecture.
System Operations on AWS is designed to teach those in a Systems Administrator or Developer Operations (DevOps) role how to create automatable and repeatable deployments of networks and systems on the AWS platform.
The TSHOOT course is designed to teach professionals that work in complex network environments the necessary skills to maintain their networks and to diagnose and resolve network problems quickly and effectively.
After completing this course, you will have basic knowledge that is required to perform the job role of an entry-level cybersecurity analyst in a threat-centric security operations center.
This hands-on training course builds your skills in the VMware View suite: VMware View Manager, VMware View Composer, and VMware ThinApp.
This 5-day, hands-on course gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. This course builds your skills in installing, configuring, and managing VMware Horizon® 7 through a combination of lecture and hands-on labs.
This 5-day, comprehensive, fast-paced training course presents VMware NSX as a part of the software-defined data center. You will learn how to use logical switching in NSX to virtualize your switching environment.
During this five-day course, you will focus on installing, configuring, and managing VMware vRealize Automation.
This two-day course is designed for data center operators who are responsible for the day-to-day management of a VMware vSphere® environment using VMware vRealize® Operations™.
This five-day course, designed for experienced VMware vSphere® users, teaches you how to use VMware vRealize® Operations™ as a forensic and predictive tool.
This 5-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 6.7, which includes VMware ESXi™ 6.7 and VMware vCenter Server® 6.7. This course prepares you to administer a vSphere infrastructure for an organization of any size.
This 5-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure.
In this 3-day, hands-on training course, you explore the new features and enhancements in VMware vCenter Server® 6.7 and VMware ESXi™ 6.7.
In this 5-day course, you will configure and secure unified endpoint activation, registration, and authentication. You will learn how to integrate industry-recognized enterprise technologies with VMware Workspace™ ONE™.
This 5-day, intensive course takes you from introductory to advanced VMware vSphere® management skills.
This hands-on training workshop provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 6 environment.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code?
Testing plays a very important role in ensuring security and robustness of web applications. Various approaches - from high level auditing through penetration testing to ethical hacking - can be applied to find vulnerabilities of different types.
The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates.
This course looks at the fundamentals required in the planning, implementation and operation of a Cisco Wireless Lan network.
Vi tilbyr CCSP sertifiseringskurs som ledes av en (ISC)² autorisert instruktør. Dette kurset vil gi deltakerne en omfattende gjennomgang av skysikkerhet i forkant av CCSP eksamen.
Få en grundig gjennomgang av de viktigste temaer for CISM eksamen.
Lær deg om forholdet mellom en informasjonssikkerhetspolicy og overordnede forretningsmål og strategi. Kurset gir deg kunnskap om informasjonssikkerhet og utvikling og drift av informasjonssikkerhet policy.
CISSP er en forkortelse for Certified Information System Security Professional. Sertifiseringen regnes som ”gullstandard” innen IT-sikkerhetssertifisering for henholdsvis teknikere og ledere internasjonalt.
Dette CISSP kurset av (ISC)2, er en av de beste veiene til CISSP sertifisering / CISSP Certification. Denne sertifiseringen regnes som en ”gullstandard” innen IT-sikkerhetssertifisering / security certifications for henholdsvis teknikere og ledere internasjonalt.
Få en grundig gjennomgang av de viktigste temaer for CRISC eksamen.
Lær deg om IT risk management, hvordan du designer, implementerer, monitorerer og vedlikeholder et risikobasert kontrollsystem. Kurset gir deg kunnskap om foretningsrisikoer og muligheter til møte risikoer ved bruk av kontroller.
Vi tilbyr 2 dagers sertifiseringskurs i ISO 27001 Foundation. Få en rask innføring i de beste metodene for implementering og administrering av et ISMS (Information Security Management System) basert på ISO 27001.
Vi tilbyr ISO 27001 Lead Auditor - sertifiseringskurs. ISO 27001 er kanskje den viktigste sikkerhetsstandarden og for mange et kvalitetsstempel for sikkerhet i virksomheten. ISO 27001 krever at revisjonen skal bestå av en intern- og en eksternrevisjon.
Vi tilbyr ISO 27001 Lead Auditor - sertifiseringskurs for bedrifter. ISO 27001 er kanskje den viktigste sikkerhetsstandarden og for mange et kvalitetsstempel for sikkerhet i virksomheten. ISO 27001 krever at revisjonen skal bestå av en intern- og en eksternrevisjon.
Dette intensive 5-dagers kurset innenfor "security management" gir deg den nødvendige kunnskapen og ekspertisen for å planlegge og implementere et effektivt styringssystem (ISMS) for din virksomhet i henhold til ISO 27001.
Dette intensive Risk Manager kurset lærer deg å mestre de grunnleggende elementene innen risikoanalyse og risikostyring relatert til alle verdier som er relevant i forhold til informasjonssikkerhet.
Vi tilbyr ISO 27005 Risk Manager - sertifiseringskurs for bedrifter. Dette intensive Risk Manager kurset lærer deg å mestre de grunnleggende elementene innen risikoanalyse og risikostyring relatert til alle verdier som er relevant i forhold til informasjonssikkerhet.
SSCP er en forkortelse for System Security Certified Practitioner. CISSP er en forkortelse for Certified Information System Security Professional. Begge sertifiseringer regnes som ”gullstandard” innen IT-sikkerhetssertifisering for henholdsvis teknikere og ledere internasjonalt.
Vi tilbyr kurs om årsrapport i InDesign. Det blir to dager med fordypning i hvordan du legger opp gode maler til dine rapporter som f.eks. årsrapporter.
Har du ikke nok oversikt over hva som skjer i nettverket ditt eller har problemer
med å forstå hvordan nettverket virker?
Kurset gir en introduksjon til de viktigste sidene av det store og komplekse området som kalles nettverk og datakommunikasjon.
Live Instructor-led training
The EDU-290 is a 4 x half day online training
The Firewall Configuration and Management (EDU-210) training is the most crucial course as it covers all the fundamentals to understand the Next-Generation FireWall from the ground up.
På dette kurset fra Palo Alto Networks får du "hands-on" erfaring med feilsøking på sikkerhet, nettverk, beskyttelse mot angrep, logging og rapporterings funksjoner. Dette er kurset hvor du lærer mange nyttige kommandoer for feilsøking.
Live Instructor-led training
The EDU-214 is a 8 half day course (4 days x 2)
På dette Palo Alto Networks kurset får du dyptgående kunnskap om hvordan konfigurere og administrere Panorama Management Server.
Har du ikke nok oversikt over hva som skjer i nettverket ditt eller har problemer
med å forstå hvordan nettverket virker?
Praktisk kurs hvor vi starter med gjennomgang av topologien som skal bygges.
Har du ikke nok oversikt over hva som skjer i nettverket ditt eller har problemer
med å forstå hvordan nettverket virker?
I praktisk nettverkskurs del 2 tar vi i bruk tjenester og protokoller som er mer komplekse.
Driftslederforum er et årlig REN-arrangement i vår serie av faglige arrangment for kraftbransjen. Formålet med Driftslederforum er å skape et nettverk for driftsledere og andre sentrale personer i sikkerhetsarbeidet hvor man kan utveksle erfaringer og diskutere problemstillinger.
Velkommen til Temadager Anleggsbidrag!
Sett av datoen og hold deg faglig oppdatert
Temadager Vedlikehold retter fokus på vedlikehold innen mange virksomhetsområder. Deriblant rykende ferske REN-anbefalinger innen vedlikehold av stasjoner.
Vi tilbyr kurs i ITIL Foundation - grunnkurs med sertifisering. ITIL Foundation er grunnkurset innen ITIL, og gir kunnskap om beste praksis innen IT-serviceledelse. Bestått eksamen gir ITIL Foundation-sertifisering.
Vi tilbyr kurs i test av software - effektive testmetoder og teknikker i praksis. Sikre deg god kvalitet i systemene ved god testpraksis og finn en større andel av feilene! Spar deg for ekstraarbeid og gjør din virksomhet mer lønnsom.
The cloud is here. Are you ready to meet the security challenge?
This course is the most comprehensive review of cloud security concepts and industry best practices covering all six domains of the (ISC)2 Common Body of Knowledge (CBK®)!
For å slå en hacker, må du tenke som en hacker! Dette er forutsetningen for flaggskip-sertifiseringen, Certified Ethical Hacker (CEH), som lærer deg verktøy og teknikker fra verdens mest beryktede undergrunnshackere.
Dette kurset gir deg ytterligere kompetanse og hands-on på mer avanserte funksjoner på Check Points nyeste brannmur-plattform. konfigurasjon som vi
“CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths.”
The Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 course provides you with the knowledge and skills that are needed how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices
The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v3.0 course provides network administrators with the knowledge and skills needed to install, configure, operate, and troubleshoot a small enterprise network.
This 5 day course is designed to provide professionals working with medium to large networks with the skills and knowledge required to incorporate advanced routing concepts when implementing scalability for Cisco routers that are connected to LANs and WANs.
The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. The CISSP exam tests ones competence in the 8 domains of the CISSP CBK
This is a five-day course designed to help students prepare to plan, configure, and verify the implementation of complex enterprise switching solutions for campus environments using the Cisco Enterprise Campus Architecture.
This five day course is designed to provide professionals who work in complex network environments with the skills that they need to maintain their networks and to diagnose and resolve network problems quickly and effectively.