IT drifting tar stadig mer tid og ressurser både på arbeidsplassen og hjemme på datarommet. Her finner du kurs og opplæring i innen IT-sikkerhet inne områder som for eksempel nettverk og systemadministrasjon. Typiske temaer er; brannmur, antivirus, datagjennvinning, intranett, IT-strategi, TCP/IP osv. Ta gjerne kontakt med oss hvis du ønsker et skreddersydd tilbud for din bedrift.
We provide course about advanced Architecting on AWS. In this course, each module presents a scenario with an architectural challenge to be solved. You willexamine available AWS services and features as solutions to the problem.
We provide course about Architecting on AWS. In this course, you will learn to identify services and features to buildresilient, secure, and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size.
We provide course about AWS Cloud Practitioner Essentials. This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud,independent of specific technical roles.
We provide course about AWS Security Essentials. AWS Security Essentials covers fundamental AWS Cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured.
We provide course about CCNA: Implementing and Administering Cisco Solutions. The Implementing and Administering Cisco Solutions course provides a broad range of fundamental knowledge for all IT careers.
We provide course about Developing on AWS. This course includes presentations, demonstrations, and hands-on labs. This course teaches experienced developers how to programmatically interact with AWS services to buildweb solutions.
Vi tilbyr kurs om DevOps Foundation. Kurset gir en grunnleggende innføring i DevOps-terminologi for å sikre at alle snakker samme språk. Kurset gir også en grunnleggende forståelse av hvordan DevOps støtter en organisasjons suksess.
We provide course about ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies. The course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks.
We provide course about ISO/IEC 27001 Lead Implementer. ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
We provide course about ISO/IEC 27001 Transition. The new version of ISO/IEC 27001 has been recently published and is now aligned with the new version of ISO/IEC 27002, which was published in February, 2022.
We provide course about ISTQB Foundation v4.0 Certificate. In the ISTQB® Foundation v4.0 course, you will learn how to apply test principles and control your own test activities using test processes and methodologies that are globally recognised as best practice.
Vi tilbyr kurs om ITIL® 4 Foundation. ITIL 4 bygger på essensen av beste praksis som ITIL tilbyr når det gjelder tjenesteleveranser (Service management). ITIL 4 gir oss en praktisk og fleksibel tilnærming når vi nå flytter våre tjenester til den nye digitale verden.
We provide course about Kubernetes & Kubernetes Advanced Combined. Kubernetes has evolved over the years into a comprehensive solution for container orchestration with plenty of integration practices.
We provide course about MasterClass: Windows Security and Infrastructure Management with Windows Internals. This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals.
We provide course about MS-102: Microsoft 365 Administrator. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.
We provide course about SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
We provide course about SC-400: Administering Information Protection and Compliance in Microsoft 365. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
We provide course about SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
We provide course about Spring Cloud Development. This course takes a detailed and pragmatic look at how to create Spring Cloud solutions. You will learn how to create microservices in Spring Cloud, and how to configure, discover, and route microservice applications.
We provide course about VMware vSphere: Fast Track (V8). Product alignment: VMware ESXi 8.0 and VMware vCenter 8.0. This 5-day, extended hour course takes you from introductory to advanced VMware vSphere® 8 management skills.
We provide course about VMware vSphere: Install, Configure, Manage (V8). This 5-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8.
Vi tilbyr Bachelor i Cyber Security. IT-utdanning som lærer deg å sikre digitale systemer mot cyberangrep, datakriminalitet og digital krigføring. Studiet gjør deg klar til å jobbe praktisk med IKT-sikkerhet og redusere digital sårbarhet.
Vi tilbyr Bachelor i digital etterforskning. IT-utdanning som lærer deg datasikkerhet og etterforskning av digital kriminalitet. Studiet gjør deg klar til å jobbe praktisk med digital sikkerhet og etterretning for politi og andre organisasjoner med behov for økt digital sikkerhet.
I løpet av første året på studiet vil du tilegne deg grunnleggende kunnskap om kjernefaglige tekniske grunnprinsipper og få en bred forståelse av forretningsstyring og -prosesser.
Vi tilbyr utdannelse i nettverk og IT-sikkerhet. Praktisk IT-utdanning som lærer deg å bekjempe hacking og datakriminalitet. Det akutte kompetansebehovet for IT-sikkerhet gir solide jobbmuligheter etter studiet.
Vi tilbyr studie i nettverks- og systemadministrasjon. Praktisk IT-utdanning som lærer deg administrasjon av nettverk og systemer. Studiet sentreres rundt Microsoft- og Unix-baserte teknologier, og infrastruktur for nettverk og serverdrift med fokus på IT-sikkerhet.
Kurset passer for personer som har liten eller ingen kjennskap til programmerbare logiske styringer, som enten skal prosjektere enkle automatiseringsanlegg med OMRON PLS, eller ha den daglige drift og vedlikehold av enkle automatiseringsanlegg.
Vi tilbyr grunnkurs i frekvensomformer. Kurset gir en god gjennomgang av Omron´s verktøy for konfigurering av frekvensomformere. Deltakerne får god innsikt i mulighetene med aktuell programvare samt å bli kjent med knapper, og funksjoner i omformeren.
Vi tilbyr kurs i Power BI - videregående - DAX formler. Kurset for deg som ønsker mer kunnskap om DAX-funksjoner og økte ferdigheter for å utvikle avanserte modeller og rapporter i Power BI Desktop.
Vi tilbyr kurs i profil systemadministrasjon. Kurset tar for seg systemadministrasjonen fra A til Å i Profil. Kurset passer godt for superbrukere og de med systemansvar i kommunen. Kurset vil gi deg gode forutsetninger for videre arbeid med systemadministrasjon i din kommune.
We provide online course about (In)Security in C++. The course teaches C++ developers fundamental concepts from Exploit Development and Reverse Engineering, and uses these concepts to demonstrate common vulnerabilities in C++ codebases.
We provide online course about a builder’s guide to single page application security. Frontend JavaScript frameworks such as Angular and React disrupt the traditional web security landscape, and finding reliable security advice is hard.
Securing modern web applications is hard, really hard. Not only do you have to make the right architectural security decisions, but you also have to be aware of various implementation vulnerabilities in both frontend apps and APIs.
We provide a 2-day online course about Attack and Defense: API and Web Application Security. The major cause of webservice and web application insecurity is insecure software development practices.
We provide online course about build your own application security program. As much as we wish it would, secure software doesn’t happen overnight. There’s no single action you can take or technology you can deploy that will solve this complex problem for you.
We provide online course about Building Secure API´s and Web Applications. The major cause of webservice, microservice, and web application insecurity is insecure software development practices.
We provide online course about Hack Yourself First: How to go on the Cyber-Offence. Cyber-attacks have become a reality of running software on the web today. We find ourselves under a constant barrage of malicious activity from hacktivists, online criminals and increasingly, nation states.
We provide online course about High Security OAuth. Since its publication in RFC 6749 and RFC 6750, OAuth 2.0 has gotten massive traction in the market.
We provide online course about Keynote: securing the future. Laura Bell Main graduated with a degree in Computer Science and Artificial Intelligence before that was a thing you could get a job in. It wasn’t her finest piece of planning.
We provide online course about Linux security and isolation APIs fundamentals. This workshop provides an introduction to the low-level Linux features - set-UID/set-GID programs, capabilities, and namespaces, cgroups (control groups).
Vi tilbyr nettstudiet fagbrev IT-utvikler for praksiskandidater. Jobber du med IT-utvikling men mangler formell kompetanse? Hvis du har yrkespraksis fra arbeide med utvikling av IT, kan du ta fagbrev i IT-utvikler for praksiskandidater.
Distribute, deploy, and monitor applications for managed users and systems. In this course, you will use Configuration Manager and its associated site systems to efficiently manage network resources.
We offer virtual course in advanced architecting on AWS. Advanced architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform.
AIX System Administration – Part I Course Overview This IBM AIX System Administration training course is designed to give delegates practical experience in the administration of an AIX System
AIX System Administration – Part II Course Overview This IBM AIX System Administration training course is for System Administrators and Support Staff,who wish to perform advanced administration tasks,perform basic troubleshooting and improve security.
Apache Tomcat Administration Course Overview This Apache Tomcat Administration course teaches the core skills needed to install and manage the Tomcat Web Container up to version 9.
Apache Web Server Course Overview This Apache Web Server course introduces the delegate to the main concepts of the APACHE Web server.
We offer virtual course in architecting on AWS. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting.
This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers.
The fundamental-level full day course is intended for individuals who seek an overall understanding of the AWS Cloud, independent of specific technical roles.
AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured.
AWS Technical Essentials introduces you to essential AWS services and common solutions. The course covers the fundamental AWS concepts related to compute, database, storage, networking, monitoring, and security.
We offer virtual course in designing and implementing Microsoft Azure networking solutions. This course teaches network engineers how to design, implement, and maintain Azure networking solutions.
This course is to provide training for their CISMP examination. The course will provide you with the knowledge and understanding of the main principals required to be an effective member of an information security team with security responsibilities as part of your day to day role.
Learn how to optimize management of CCE solutions for smooth, connected, and efficient digital experiences across multiple channels Manage the effects of using CCE solutions for scalability, flexibility, and growth to support larger contact center enterprises
Learn the troubleshooting techniques to maximize the benefits the prepackaged deployment model PCCE Anticipate and rectify possible deployment issues by learning the tools and processes that provide solutions for deployment issues
Vi leverer CCNA (Cisco Certified Network Associate) er en grunnleggende IT-sertifisering som tilbys av Cisco Systems. CCNA-sertifiseringen er anerkjent i IT-bransjen som et fundamentalt steg for karrierer innen IT-stillinger og nettverksroller. Ta Cisco-eksamen: 200-301
We offer virtual course in official (ISC)2 certified cloud security professional (CCSP) training included exam.
This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK®).
Students will explore how to manage Citrix Endpoint Management in this three day course. Venture into the cloud as students learn to manage devices, apps, and users.
The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential that industry professionals can obtain to demonstrate their expertise in understanding the essential principles of auditing cloud computing systems.
Certified CMMC Professional training course enables participants to acquire a comprehensive understanding of the Cybersecurity Maturity Model Certification (CMMC) model and its requirements.
CERTIFIED DATA PRIVACY SOLUTIONS ENGINEER (CDPSE) is focused on validating the technical skills and knowledge it takes to assess, build and implement a comprehensive privacy solutions.
As a CGEIT certified professional, you demonstrate that you are capable of bringing IT governance into an organization—that you grasp the complex subject holistically, and therefore, enhance value to the enterprise.
We offer course in GDPR – Certified Information Privacy Professional and Manager prep course (CIPPE-CIPM). This course is designed to provide the Data Protection Officer with a full range of competencies to deliver their organisations GDPR compliance.
We offer course in GDPR – Certified Information Privacy Professional and Technologist prep course (CIPPE-CIPT). In this course you will gain foundational knowledge on both broad and global concepts of privacy and data protection laws and practice.
Scrum is an agile framework for maximising the value of product development. This may take the form of a project but Scrum is designed to be applicable to both project and non-project environments.
The goal of this CWNA course is to add Wi-Fi expertise to a networking professional´s skillset, while covering all CWNA exam topics. The course begins with discussion topics and hands-on lab exercises covering the basic operation of 802.11 Wi-Fi technology.
The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) and Cisco NSO Advanced for Python Programmers (NSO300) courses
The Cisco SD-WAN Operation and Deployment(SDWFND) course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.
SDWSEC is a 3-day Cisco SD-WAN training targeted to engineers and technical personnel involved in designing, deploying, operating, and securing SD-WAN solutions both in enterprise and Service Provider environments.
The CISM (Certified Information Security Manager) course is a globally recognized certification program designed for professionals in the field of information security management.
We offer virtual course in official (ISC)2 certified information systems security professional training (CISSP) included exam.
We offer virtual course in CISSP-Certified Information Systems Security Professional – Certification Preparation (GK9803)
Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course.
Citrix Web App Firewall protects web apps and sites from known and unknown attacks. This threeday course will teach you how to address application services security requirements with Web App Firewall.
Learn how to configure your Citrix networking environment to address application services security requirements with Citrix Web App Firewall: automate and manage network services for scale-out of application architectures with Citrix Application Delivery Management
In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site.
Designed to learn how to set up scalability, redundancy and security configurations.
This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will learn how to assess existing environments, explore different scenarios and make design decisions based on business requirements.
If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team.
This accelerated 5-day course is designed for experienced IT professionals to build the foundational administration aspects of installing, configuring and managing a Citrix Virtual Apps and Desktops 7 environment.
This Citrix Virtual Apps and Desktop course, designed for experienced IT professionals builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment´s app and desktop workloads.
Cloud computing means implementing and using cloud technology to provide IT-related services hosted off-premise. Usually cloud services are distributed over the internet. Cloud supports businesses by offering flexible IT solutions based on clear service level agreements (SLAs).
Learn the core skills you need to develop high performance, secure containerized applications and orchestrate them on Kubernetes before deep diving into advanced techniques
CN251 is an intensive cloud native training bootcamp for IT professionals looking to develop skills in deploying and administering containerized applications in Kubernetes.
This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS.
The PECB CMMC Foundations training course enables participants to understand the fundamental concepts and principles of the CMMC model.
Learn the skills required to implement Citrix ADC Essential components including secure Load Balancing, High Availability, and Citrix ADC Management.
In this course, you will learn how Citrix SD-WAN can simplify branch networking for your organization. You´ll walk away understanding how to configure and manage SD-WAN, including the SD-WAN architecture, deployment options, provisioning, and how to use Citrix SD-WAN Orchestrator in your environment
In this expert level 5-day training course you will be exposed to advanced networking and Citrix ADC concepts and configurations.
This training course is designed to give participants the knowledge and skills to become a Collaboration Communications Systems Engineer.
We offer course in CompTIA (ITF+) IT Fundamentals (G001). The Official CompTIA IT Fundamentals (ITF+) (Exam FC0-U61) will provide students with the fundamental IT skills and concepts required to identify and explain the basics of computing, IT infrastructure, software development, and database use.
CompTIA A+ is the industry standard for establishing a career in IT and the preferred qualifying credential for technical support and IT operational roles. A+ supports the ability to connect users to the data they need to do their jobs regardless of the devices being used.
Learn fundamental cloud concepts and data-drivin cloud recommendation CompTIA Cloud Essentials+ validates the candidate has the knowledge and skills required to make clear and conscious decisions about cloud technologies and their business impact
CompTIA´s Cloud+ Certification is an upper-level certification designed for professionals with 2–3 years of hands-on work experience in a systems administrator job role.
The CompTIA Data+ exam will certify the successful candidate has the knowledge and skills required to transform business requirements in support of data-driven decisions through mining and manipulating data, applying basic statistical methods, and analyzing complex datasets
The CompTIA Security+ course is designed to help you prepare for the SY0-701 exam.
This 5-day CompTIA IT Server+ course is designed to give IT personnel all the necessary base skills to support network servers within the corporate network. The course gives hands-on experience with installation, configuration, diagnosis, and troubleshooting server hardware and NOS issues.
In this course, you’ll learn about how to use Citrix Content Collaboration to share, sync, and secure content for your organization.
We offer virtual course in official (ISC)2 certified secure software lifecycle professional (CSSLP) training included exam.
Learn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft´s public cloud and get hands-on practice deploying those machines using Machine Creation Services.
Moving to the Citrix virtual apps and desktop service on Citrix cloud. This course is designed for students with previous experience with XenApp and XenDesktop on-prem. You will learn how to navigate the move from XenApp and XenDesktop on-premises to the Citrix Cloud.
This 2-day DAMA DMBOK Data Management Fundamentals course addresses all disciplines as identified by the international standard, DAMA Body of Knowledge (DMBOK2) and is aimed to individuals interested in developing concrete professionalism in the field of Data Management.
Data Warehousing on AWS introduces you to concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials– platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB)
This course teaches developers how to create application using the SQL API and SDK for Azure Cosmos DB. Students will learn how to write efficient queries, create indexing policies, manage and provisioned resources, and perform common operations with the SDK.
AI-102 Designing and Implementing an Azure AI Solution is intended for software developers wanting to build AI infused applications that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework. The course will use C#, Python, or JavaScript as the programming language.
The Designing and Implementing Cloud Connectivity training helps you develop the skills required to design and implement enterprise cloud connectivity solutions. Learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers
Designing and Implementing Enterprise-Scale Analytics Solutions Using Microsoft Azure and Microsoft Power BI. This course covers methods and practices for performing advanced data analytics at scale.
The Developing on Amazon Web Services AWS course is designed to help individuals design and build secure, reliable and scalable AWS-based applications.
This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform.
This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution. This course positions learners to successfully complete the DevOps Engineering Foundation exam.
DevOps Engineering on AWS demonstrates how to use the most common DevOps patterns to develop, deploy and maintain applications on AWS.
The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success.
The DevOps Leader course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps.
This course explains how DevOps security practices differ from other approaches then delivers the education needed to apply changes to your organization. Participants learn the purpose, benefits, concepts, vocabulary and applications of DevSecOps. Most importantly, students learn how DevSecOps roles
The DevsecOps Practitioner course introduces more advanced ways to explore DevSecOps in your organization. Each section covers practical maturity guides, and then discusses how people, process and technology can be combined to improve outcomes.
In this course, you´ll learn how to create and manage individual containers using the Docker Engine. We´ll cover best practices in container image design and container deployment and auditing, as well as an introduction to single-node container networking and storage.
The BCS accredited Certificate in Artificial Intelligence Foundation course is our latest Artificial Intelligence training course. The course builds upon the basic knowledge of AI.
This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge.
We offer course in Comptia Network+. CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on.
The Certified Information Privacy Manager (CIPM) is the world´s first and only certification in privacy programme management. When you earn a CIPM, it shows that you know how to make a privacy programme work for your organisation.
The global gold standard in European data protection certification. This two-day training encompasses pan-European and national data protection laws, key data protection terminology and practical concepts concerning the protection of personal data and trans-border data flows.
The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 to meet the growing need that only tech pros can fill—securing data privacy at all stages of IT product and service lifecycles.
Comptia advanced security practitioner (CASP+). You have experience in the increasingly crucial field of information security, and now you´re ready to take that experience to the next level.
CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT professionals and IT channel organizations, and its industry-leading IT certifications are an important part of that mission.
This course provides knowledge of the advanced capabilitiesof the HPE Primera storage arrays, including lower level datareduction features, reporting, monitoring and alerting, QOS,and local and remote replication options.
HP-UX System Administration Course Overview This Hewlett Packard HP-UX System Administration training course is designed to give delegates practical experience in the administration of an HP-UX UNIX System.
Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
The Implementing and Troubleshooting Networks Using Cisco ThousandEyes (ENTEIT) course is designed to introduce you to Cisco® ThousandEyes.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions.
In the Implementing and Configuring Cisco Identity Services Engine (SISE) course you will learn to deploy & use Cisco Identity Services Engine(ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless,vpn
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002.
ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001.
The ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
This ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC 27002.
ISO/IEC 27002 Manager training course provides information on the implementation and management of information security controls based on ISO/IEC 27002.
By attending this 2-day ISO/IEC 27005 Foundation training course, participants will learn more about the structure of the standard including information security risk assessment, treatment, acceptance, communication and consultation, and monitoring and review.
ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27035 Foundation training enables you to learn the basic elements to implement an Incident Management Plan and manage Information Security Incidents. During this training course, you will be able to understand Information Security Incident Management processes.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
The ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS)
We offer course about ITIL® 4 - Create, deliver, support - includes exam. The course is based on the ITIL 4 best practice service value system featured in the latest 2019 guidelines. This course includes a web proctored exam.
This course provides those IT leaders, practitioners and support staff who already hold the ITIL 4 Foundation qualification with an understanding of all types of engagement and interactions between a service provider.
This course provides IT leaders, practitioners, support staff and staff interfacing with the organisation’s digital and information systems functions with a practical understanding of the key concepts.
This course provides those IT leaders, practitioners and support staff who already hold the ITIL v3 foundation certificate with a quick and easy way to upgrade to the ITIL4 foundation.
This course provides an understanding of the ways in which digital organizations and digital operating models function in high velocity environments, focusing on rapid delivery of products & services to obtain maximum value.
ITIL4 Strategic Leader (ITIL SL) is a stream of two modules that are part of ITIL 4, the next evolution of ITIL. ITIL SL recognizes the value of ITIL, not just for IT operations, but for all digitally-enabled services.
This module focuses on providing the candidates with the understanding of the key concepts, principles, value and challenges of the Business Relationship Management practice.
The ITIL 4 IT Asset Management module is structured and aligned around the ITIL framework and the ITIL Practice Guides.The examination is intended to assess whether the candidate can demonstrate understanding and application of the concepts covered in the ITIL 4 IT Asset Management publication.
This 3-day ITIL® 4 Specialist: Acquiring & Managing Cloud Services training provides a vendor-neutral, user-centric guidance on developing a practical understanding of how cloud procurement and technology can integrate with and support broader business strategy and functions.
Key concepts, principles, value and challenges of ITIL 4´s five management practices, namely, the ITIL 4 Incident Management Practice, the ITIL 4 Service Desk Practice, the ITIL 4 Service Request Management Practice,the ITIL 4 Monitoring and Event Management Practice,and the ITIL 4 Problem Managemen
This 3-day course compiles for the candidates the understanding of the key concepts, principles, value and challenges of ITIL 4´s five management practices
This course provides IT leaders, practitioners and support staff with the practical skills necessary to create a ‘learning and improving´ IT organization, with a strong and effective strategic direction.
JBoss Application Server Administration Course Overview This JBoss Application Server Administration course teaches the core skills needed to install and manage the JBoss Application Server up to WildFly version 21,equivalent to JBoss EAP version 7.3
Linux Advanced System Administration (LPI) Course Overview This instructor led Linux Advanced System Administration (LPI) training course is designed to teach the advanced administration,security,networking and performance tasks required on a Linux Enterprise system.
Linux Automation with Ansible Course Overview This highly practical instructor led Linux Automation with Ansible training course is designed to give delegates practical experience in the concepts and use of Linux Ansible Automation.
Linux Fundamentals Course Overview This Linux Operating System and Bash Shell Programming training course introduces the delegate to the main concepts of the LINUX Operating System
Linux Introduction Course Overview This Linux Operating System training course introduces the delegate to the main concepts of the LINUX Operating System. The most commonly used commands and utilities are described in detail as are the command line wildcard and redirection facilities.
Linux Networking Course Overview This highly practical instructor led Linux Networking course introduces the delegate to the main concepts of Linux networking and TCP/IP.
Linux System Administration (LPI & SCA) Course Overview This instructor led Linux System Administration (LPI & SCA) training course is designed to teach the key administration,security,networking and performance tasks required on a Linux Enterprise system.
The Linux Professional Institute (LPI) has established itself as the standard for distribution independent Linux certification.
MariaDB Database Administration Course Overview This MariaDB Database Administration course is designed for MariaDB 10 Database Administrators who have a basic understanding of a MariaDB database and a good working knowledge of SQL commands.
This 3-day AWS migration course is for individuals who seek an understanding of how to plan and migrate existing workloads to the AWS Cloud.
Learn to orchestrate containers into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Mirantis Kubernetes Engine and Mirantis Secure Registry.
MongoDB Essentials Course Overview The MongoDB Essentials course is designed to give delegates experience of installing and using the MongoDB database.
This 5-day classroom-based course provides the fundamental networking skills required to deploy and support Windows Server in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking.
The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco® Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath.
This course teaches you the administrative skills needed to install, configure, manage, and upgrade three different Nutanix storage solution products: Nutanix Files, Nutanix Volumes and Nutanix Objects.
This course teaches you the skills needed to install, configure, and operate Nutanix Era for the purpose of managing databases. The installation and management of databases themselves is not part of this course.
If you already have experience with administering a Nutanix environment, this course will extend, deepen, and broaden your knowledge as you grow in your career as a Nutanix administrator.
The Nutanix Hybrid Cloud Fundamentals course introduces you to the products, capabilities, and technologies that serve as the foundation of Nutanix´s Hybrid Cloud solution.
Oracle Linux 9 Administration Course Overview This highly practical instructor led Oracle Linux 9 Administration training course is designed to give delegates practical experience in the advanced concepts and use of Linux Administration.
This Oracle WebLogic Administration course teaches the core skills needed to install and configure the Oracle WebLogic Application Server.
This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies.
This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics.
The Cortex™ XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training
We offer course about Palo Alto Networks: Firewall 10.2 Essentials: Configuration and Management (EDU-210).
This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server´s role in managing and securing the overall network.
Prisma Cloud is the industry´s most complete Cloud Native Application Protection Platform (CNAPP), with the industry´s broadest security and compliance coverage—for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle
The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.
We offer course in Palo Alto Networks: Firewall 10.2: Troubleshooting (EDU-330).
The PHP & MariaDB for Web Development course is designed to give delegates the knowledge to develop/maintain HTML/PHP code that utilises the MariaDB Database system.
The Relational Databases & Data Modelling Overview course is designed to give delegates practical experience in data modelling using entity relationship diagrams & data normalisation,also in designing relational databases using the normalised entity model.
Applying the Scrum Master role within a Scaled Agile Framework (SAFe) enterprise with SAFe® 4 Scrum Master Certification. Based on version 4.6 of SAFe. In this two-day course, attendees will gain an understanding of the role of a Scrum Master in a SAFe enterprise.
Are you the (future) Product Owner of a Scrum project? Or are you otherwise directly or indirectly involved in a Scrum process from a business perspective? Do you already have (some) experience in working as a Scrum Product Owner, but are you not yet certified? Then this training is suitable for you
Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware. Help streamline email security policy management
COURSE OVERVIEW: Not available. Please contact.
This training course enables service desk and support analysts to gain a professional qualification, issued by PeopleCert, and equips them with the skills essential to delivering excellent levels of customer service and support.
This certification course covers themes such as: potential benefits as well as the challenges and risks of implementing SIAM®.
The EXIN SIAM™ Professional certification tests a candidate´s knowledge and skills of the activities in the four stages of the SIAM roadmap. A candidate who successfully completes the EXIN SIAM™ Professional can analyze, plan, build and inspect a multi-service provider environment.
We offer virtual course in official (ISC)2 systems security certified practitioner (SSCP) training included exam.
New – Learn to implement, monitor and administer IT infrastructure in accordance with information security policies to prepare for the SSCP certification.
This Statistics course aims to address the growing need for a practical and systematic introduction to statistics at work.
This is a 5-day ILT course that is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment.
This instructor led SUSE Linux Advanced System Administration training course is designed to teach the advanced administration,security,networking and performance tasks required on a SUSE Linux Enterprise system.
This instructor led SUSE Linux System Administration training course is designed to teach the key administration,security,networking and performance tasks required on a SUSE Linux Enterprise Server (SLES).
During this training you will learn the most important concepts of Terraform and gain experience in the hands-on lab on how to set up a (Linux-based) IT infrastructure.
This one-day tutor-led workshop includes slides, exercises and practical work, and uses a hands-on approach based on group exercises and discussions
The ‘Introduction to Testing Techniques ‘workshop provides delegates with practical guidance on the application of test case design techniques (and measures of test coverage), and advice on the choice of which of these techniques and measures to use.
This course explores how to use the machine learning (ML) pipeline to solve a real business problem in a project-based learning environment.
This 3-day TMAP: Quality for cross-functional teams training course offers the members of the high-performance IT delivery team (such as DevOps or Scrum) the required knowledge and skills to build quality into an IT-system.
This course teaches you the key components and procedures that you need to know to manage, monitor, and troubleshoot Cisco® Nexus® 9000 Series Switches in Application Centric Infrastructure (ACI) mode.
Build a foundation of networking knowledge in a real-world, multi-vendor environment! A strong foundation of basic networking concepts is fundamental to a successful career in information technology. Networking technologies underly all IT activities and a strong comprehension of the hardware and pr
The Veeam® Backup & Replication™ v12: Configure, Manage and Recover training course is a three-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v12 solution.
The two-day, Veeam® Backup & Replication™ v11: Architecture and Design training course, is focused on teaching IT professionals how to effectively architect a Veeam solution through attaining technical excellence following the Veeam Architecture Methodology used by Veeam´s own Solution Architects.
This five-day instructor-led is intended for IT professionals who are interested in furthering their skills in Windows PowerShell and administrative automation.