Vi tilbyr nettstudiet fagbrev IT-utvikler for praksiskandidater. Jobber du med IT-utvikling men mangler formell kompetanse? Hvis du har yrkespraksis fra arbeide med utvikling av IT, kan du ta fagbrev i IT-utvikler for praksiskandidater.
We provide online course about (In)Security in C++. The course teaches C++ developers fundamental concepts from Exploit Development and Reverse Engineering, and uses these concepts to demonstrate common vulnerabilities in C++ codebases.
We provide online course about a builder’s guide to single page application security. Frontend JavaScript frameworks such as Angular and React disrupt the traditional web security landscape, and finding reliable security advice is hard.
Securing modern web applications is hard, really hard. Not only do you have to make the right architectural security decisions, but you also have to be aware of various implementation vulnerabilities in both frontend apps and APIs.
We provide a 2-day online course about Attack and Defense: API and Web Application Security. The major cause of webservice and web application insecurity is insecure software development practices.
We provide online course about build your own application security program. As much as we wish it would, secure software doesn’t happen overnight. There’s no single action you can take or technology you can deploy that will solve this complex problem for you.
We provide online course about Building Secure API´s and Web Applications. The major cause of webservice, microservice, and web application insecurity is insecure software development practices.
We provide online course about Hack Yourself First: How to go on the Cyber-Offence. Cyber-attacks have become a reality of running software on the web today. We find ourselves under a constant barrage of malicious activity from hacktivists, online criminals and increasingly, nation states.
We provide online course about High Security OAuth. Since its publication in RFC 6749 and RFC 6750, OAuth 2.0 has gotten massive traction in the market.
We provide online course about Keynote: securing the future. Laura Bell Main graduated with a degree in Computer Science and Artificial Intelligence before that was a thing you could get a job in. It wasn’t her finest piece of planning.
We provide online course about Linux security and isolation APIs fundamentals. This workshop provides an introduction to the low-level Linux features - set-UID/set-GID programs, capabilities, and namespaces, cgroups (control groups).
ISO 27001 er standarden for Informasjonssikkerhet. Det har nå kommet en ny versjon av standarden, og for å sikre at du har den kompetansen du trenger for overgangen har vi utviklet et kurs som tar for seg endringene fra tidligere versjon til ny versjon. Kurset har varighet på 1/2 dag.
Vi tilbyr nettkurs om Introduksjonskurs ISO27001 – Informasjonssikkerhet. Kurset vil gi et solid fundament for videre praktisk arbeid med forberedelsene til sertifisering, eller innføring av et styringssystem for informasjonssikkerhet.
ISO/IEC 27701 is designed to specify requirements and provide guidance for establishing, implementing, maintaining, and continually improving a PIMS in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of your organization.
This course aims to provide you with the opportunity to learn about the subject of internal auditing of information security management systems, specifically those based on the ISO 27001:2022 international standard.
Additional course benefits: Gain free access to our online self-assessment tool where you can quickly implement and practice learnings as well as to measure your company performance against specific management system standards
We provide virtual course about Administering Splunk Enterprise Security. This course prepares architects and systems administrators to install and configure Splunk Enterprise Security (ES).
We provide virtual course about CBRCOR: Performing CyberOps Using Cisco Security Technologies. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals, methods, and automation.
We provide virtual course about CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals. The course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
We provide virtual course about CC: Certified in Cybersecurity. Course goals: After completing this course, the learners will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.
We provide virtual course about CCISO: Chief Information Security Officer. The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
(ISC)² developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks.
We provide virtual course about CEH: Certified Ethical Hacker v12. The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
We provide virtual course about Certified DORA Lead Manager. Attending the PECB Certified DORA Lead Manager training course offers a unique opportunity to engage with industry experts and peers, fostering valuable discussions and insights into best practices for digital operational resilience.
We provide virtual course about Certified ISO/IEC 42001 Lead Implementer. Artificial intelligence (AI) is becoming a driving force in today’s technology landscape. Its application has spanned across numerous sectors.
We provide virtual course about CGRC: Certified in Governance, Risk and Compliance. Earn Your GRC Certification - Be a Governance, Risk and Compliance Leader! Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification.
We provide course about CISA: Certified Information Systems Auditor. CISA is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security.
We provide virtual course about CISM: Certified Information Security Manager. This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations.
Virtual course - The Official ISC2® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.
We provide virtual course about CND: Certified Network Defender. The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program.
We offer virtual course about CNSE: Check Point Cloud Network Security Expert for Azure R81. The course provides an understanding of the concepts and skills necessary to deploy and manage CloudGuard Network and Cloud Security Posture Management security solution within an Azure security environment.
We provide virtual course about CNX-CFR: CyberSec First Responder. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
We provide virtual course about CompTIA Advanced Security Practitioner (CASP+). CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing.
We provide virtual course about CompTIA Cybersecurity Analyst (CySA+). The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques.
We provide virtual course about CompTIA Security+. CompTIA Security+ Certification SY0-701 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format.
We provide virtual course about CSSLP: Certified Secure Software Lifecycle Professional. The training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication.
We provide virtual course about EDU-210: Palo Alto Firewall Essentials: Configuration and Management. Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls.
We provide virtual course about EDU-220: Palo Alto Networks: Panorama managing firewalls at scale. This 2-day course from Palo Alto will help students to gain in-depth knowledge about how to configure and manage a Palo Alto Networks Panorama management server.
We provide virtual course about EDU-330: Palo Alto Networks: Firewall troubleshooting. Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks next-generation firewalls.
We provide virtual course about ISO 22301 Lead Implementer. ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
We provide virtual course about ISO/IEC 27001 Foundation. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
We provide virtual course about ISO/IEC 27001 Lead Auditor. ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide virtual course about ISO/IEC 27001 Lead Implementer. The training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
We provide virtual course about ISO/IEC 27701 Lead Auditor. The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide virtual course about MasterClass: This training is not related to any specific certification. System Forensics and Incident Handling. Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity.
We provide virtual course about NIS 2 Directive Foundation. The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures.
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS2 Directive.
We provide virtual course about PECB Certified Lead Cybersecurity Manager. The Lead Cybersecurity Manager training course enables participants to obtain the necessary competencies to effectively implement, manage, and continually improve a cybersecurity program.
We provide virtual course about SAUI: Implementing Automation for Cisco Security Solution. The Implementing Automation for Cisco Security Solutions (SAUI) course teaches you how to design advanced automated security solutions for your network.
We provide virtual course about SC-100: Microsoft Cybersecurity Architect. The SC-100 course will lead towards the first expert level certification in the Microsoft Security, Compliance, and Identity portfolio.
We provide virtual course about SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
Virtual course - This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
We provide virtual course about SC-400: Administering Information Protection and Compliance in Microsoft 365. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
We provide virtual course about SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
We provide virtual course about secure coding in C and C++ in english. Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
We provide virtual course about Security Engineering on AWS. This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud.
We provide virtual course about security testing C and C++ applications in english. Your application written in C and C++ is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2^32?
We provide virtual course about SESA: Securing Email with Cisco Email Security Appliance. Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware.
Virtual course - Become an SSCP - Systems Security Certified Practitioner! Earning a globally recognized IT security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
We provide virtual course about Web Security for Developers. The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates.
Vi tilbyr Bachelor i Applied Data Science som nettstudie. IT-utdanning som gjør deg svært ettertraktet innen maskinlæring, kunstig intelligens og big data-analyse. Gå rett i jobb som data scientist, det mest sexy yrket i det 21. århundret, ifølge Harvard Business Review.
Vi tilbyr Bachelor i Cyber Security som nettstudie. IT-utdanning som lærer deg å sikre digitale systemer mot cyberangrep, datakriminalitet og digital krigføring. Studiet gjør deg klar til å jobbe praktisk med IKT-sikkerhet og redusere digital sårbarhet.
Vi tilbyr Bachelor i digital etterforskning som nettstudie. IT-utdanning som lærer deg datasikkerhet og etterforskning av digital kriminalitet. Studiet gjør deg klar til å jobbe praktisk med digital sikkerhet og etterretning for politi og andre organisasjoner med behov for økt digital sikkerhet.
I løpet av første året på studiet vil du tilegne deg grunnleggende kunnskap om kjernefaglige tekniske grunnprinsipper og få en bred forståelse av forretningsstyring og -prosesser.
Vi tilbyr utdannelse i nettverk og IT-sikkerhet som nettstudie. Praktisk IT-utdanning som lærer deg å bekjempe hacking og datakriminalitet. Det akutte kompetansebehovet for IT-sikkerhet gir solide jobbmuligheter etter studiet.
Vi tilbyr et kurs hvor du lærer sende, motta og oppbevare Crypto sikkert. Crypto er digitale eiendeler og kanskje fremtidens penger. En innføring i hvordan Bitcoin ble skapt og hvorfor. Sammen med litt praktisk informasjon om systemet. Ta kontakt for avtale!
De fleste bedrifter i dag har anskaffet seg produktet Microsoft 365, men det er bare et fåtall som utnytter potensialet i pakken. Microsoft 365 er mye mer enn lokalt installert programvare, det er programvare for moderne kommunikasjon, dokumentproduksjon og samhandling i skyen.
Vi tilbyr kurs i Teams - Next Level. På tide å komme videre med Microsoft Teams! Ja, absolutt, på dette kurset lærer du å utnytte Teams til å samarbeide og kommunisere effektivt, redusere bruk av epost, samhandle på dokumenter m.m.
Vi tilbyr onlinekurs om CCSP - Certified Cloud Security Professional. Øk din kompetanse på å utforme, implementere og administrere cybersikkerhet i skytjenester. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr onlinekurs om CISSP Certified Information Systems Security Professional. Grundig intensivkurs som dekker hele kunnskapsbasen for informasjonssikkerhet fra et ledelsesperspektiv. Målet er at man skal forstå og kunne anvende kunnskapene i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr onlinekurs om CSSLP - Certified Secure Software Lifecycle Professional. Øk din kompetanse på sikker utvikling. CSSLP kurset dekker hele livssyklusen for sikker programutvikling.
Vi tilbyr onlinekurs om SSCP - System Security Certified Practitioner. Øk din kompetanse på sikkerhet i datasenter og skytjenester. Målet med kurset er at man skal kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.