IT drifting tar stadig mer tid og ressurser både på arbeidsplassen og hjemme på datarommet. Her finner du kurs og opplæring i innen IT-sikkerhet inne områder som for eksempel nettverk og systemadministrasjon. Typiske temaer er; brannmur, antivirus, datagjennvinning, intranett, IT-strategi, TCP/IP osv. Ta gjerne kontakt med oss hvis du ønsker et skreddersydd tilbud for din bedrift.
We provide workshop about accelerated testing. This session will look at the some of the hindrances and enablers to accelerated testing, how epistemology can help with accelerated testing and why we need to refute conjectures.
We provide a advanced test design techniques workshop. Most testers are familiar with techniques such as boundary value analysis and equivalence partitioning. However, this workshop focuses on two of the more unusual and more complex techniques: Classification Trees and Pairwise Testing.
We provide workshop about exploratory testing. The workshop aims to dispel any misunderstandings people might have with this approach and how it can be applied to both traditional and agile projects. Applications are provided throughout the workshop.
We provide from user story to test case workshop. Agile Software Methods is becoming the preferred way of working in most organisations. However testers are often finding it difficult to know how to adapt to the new way of working. It is often difficult to know how to test User Stories.
We provide course about from weeks to hours: bridging the gap between business and IT. This one-day workshop is designed for both technical and non-technical professionals involved in the software development process.
We provide course about Google Cloud Fundamentals for Azure Professionals. This course teaches Azure professionals about the core capabilities of Google Cloud in the four technology pillars: networking, compute, storage, and database.
We provide course about Google Cloud Fundamentals: Big Data and Machine Learning. This 1-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform.
We provide course about Google Cloud Fundamentals: Core Infrastructure. This one-day instructor-led class provides an overview of Google Cloud Platform products and services.
Vi tilbyr kurs om ITIL® 4 Foundation. Kurset gir deg en grunnleggende innføring i ITIL® beste praksis rammeverket versjon 4. Kurset gir innføring i basis konseptet, prinsippene, prosessene og funksjonene som er definert som beste praksis.
Vi tilbyr kurs om ITIL® Service Transition. Kurset gjennomgår også roller og organisering innenfor Service Transition. Kurset forbereder kandidatene til ITIL® Service Transition eksamen. ITIL Service Transition-kurset bygger på de generelle prinsippene som dekkes av ITIL Foundation kurset.
We provide course about Journey to the Cloud. This course begins with an overview of the different cloud computing models and services provided by the major public cloud providers. Several cloud computing concerns like cost, governance, and security are addressed.
OWASP Top 10 er en globalt utarbeidet og anerkjent liste over de vanligste og mest kritiske sikkerhetssårbarhetene i moderne webapplikasjoner. Den ble laget for å øke bevissthet rundt sikkerhet og er en verdifull ressurs for utviklere, sikkerhetseksperter og organisasjoner.
We provide a workshop about test manager´s dashboard. Gathering and presenting clear information about quality, both product and process, may be the most important part of the test manager´s job. Test reports need to be concise, predictive, accurate and relevant to the people receiving them.
We provide transitioning to Agile testing workshop. This workshop briefly explains the principles of Agile and how this differs from traditional lifecycle models. This workshop will explain the fundamentals of Scrum and how testing can effectively contribute to this software development approach.
We provide course about advanced Architecting on AWS. In this course, each module presents a scenario with an architectural challenge to be solved. You willexamine available AWS services and features as solutions to the problem.
We provide course about advanced developing on AWS. The Advanced Developing on AWS course uses the real-world scenario of taking a legacy, on-premises monolithic application and refactoring it into a serverless microservices architecture.
We provide course about Applied Domain-Driven Design in .NET. What is Domain Driven Design (DDD) really about? How might Command Query Responsibility Segregation (CQRS) help us to build better software.
We provide course about Architecting on AWS. In this course, you will learn to identify services and features to buildresilient, secure, and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size.
We provide course about ASTQB Mobile Testing Certificate. Designed for testers with experience with functional testing, this course highlights the issues and best approaches for testing mobile applications.
We provide course about AWS Cloud Essentials for Business Leaders. This course is for business leaders who seek an overall understanding of the fundamental concepts of cloud computing. Learn how a cloud strategy can help you meet business objectives.
We provide course about AWS Cloud Essentials for Business Leaders - Financial Services. Learn the fundamental concepts of cloud computing from an expert AWS instructor. This course is for business leaders who seek an overall understanding of the fundamental concepts of cloud computing.
We provide course about AWS Cloud Practitioner Essentials. This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud,independent of specific technical roles.
We provide course about AWS Security Essentials. AWS Security Essentials covers fundamental AWS Cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured.
We provide course about AWS Technical Essentials. AWS Technical Essentials introduces you to essential AWS services and common solutions. The coursecovers the fundamental AWS concepts related to compute, database, storage, networking, monitoring, andsecurity.
We provide course about BGP: Configuring BGP on Cisco Routers. The Configuring BGP on Cisco Routers (BGP) v.4.0 course teaches the underlying foundations of the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS).
We provide course about CC: Certified in Cybersecurity. Course goals: After completing this course, the learners will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.
We provide course about CCISO: Chief Information Security Officer. The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
We provide course about CCNA: Implementing and Administering Cisco Solutions. The Implementing and Administering Cisco Solutions course provides a broad range of fundamental knowledge for all IT careers.
(ISC)² developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks.
We provide course about CEH: Certified Ethical Hacker v12. The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
We provide course about Certified DORA Lead Manager. Attending the PECB Certified DORA Lead Manager training course offers a unique opportunity to engage with industry experts and peers, fostering valuable discussions and insights into best practices for digital operational resilience.
We provide course about Certified ISO/IEC 42001 Lead Implementer. Artificial intelligence (AI) is becoming a driving force in today’s technology landscape. Its application has spanned across numerous sectors.
We provide course about CGRC: Certified in Governance, Risk and Compliance. Earn Your GRC Certification - Be a Governance, Risk and Compliance Leader! Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification.
We provide course about Check Point Certified Security Administrator (CCSA) R81.20. This 3-day course covers everything you need to start-up, configure and manage daily operations of R81.20 Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
We provide course about Check Point Cyber Security Engineering (CCSE) R81.20. This advanced three-day course teaches how to build, modify, deploy and troubleshoot the R81.20 Check Point Security Systems on the GAiA operating system.
We provide course about CHFI: Computer Hacking Forensic Investigator. EC-Council’s Certified Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics.
We provide course about CISM: Certified Information Security Manager. This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations.
The Official ISC2® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.
We provide course about CLACCM: Implementing Cisco Advanced Call Control and Mobility Services. The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services.
We provide course about CLCOR: Implementing Cisco Collaboration Core Technologies. The course helps you prepare for the Cisco CCNP Collaboration and CCIE Collaboration certifications, and advanced-level roles focused on implementation and operation of Cisco collaboration solutions.
We provide course about Cloud Operations on AWS. This course teaches systems operators and anyone performing systems operations functions how tomanage and operate automatable and repeatable deployments of networks and systems on AWS.
We provide course about CND: Certified Network Defender. The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program.
We provide course about CNS-225: Deploy and Manage Citrix ADC 13.x with Traffic Management. Build your Citrix ADC knowledge and skills by enrolling in this five-day course.
We provide course about CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway. Expand your Citrix networking knowledge and skills by enrolling in this 5-day course.
We provide course about CNX-CFR: CyberSec First Responder. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
We provide course about COBIT 5 Assessor. COBIT® 5 provides an end-to-end business view of the governance of enterprise IT, reflecting the central role of information and technology in creating value for enterprises of all sizes.
We provide course about COBIT 5 Implementation. Get a practical appreciation of how to apply COBIT® 5 to specific business problems, pain points, trigger events and risk scenarios within the organization.
COBIT 2019 Builds on, and integrates over 25 years of development in the Enterprise Governance of IT domain. COBIT 2019 incorporates new insights from science, and developed these insights into operational practices. COBIT 2019 is a major evolution of the framework, and replaces COBIT 2005.
We provide course about CompTIA Advanced Security Practitioner (CASP+). CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing.
We provide course about CompTIA Cybersecurity Analyst (CySA+). The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques.
We provide course about CompTIA Network+. CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on.
We provide course about CompTIA Security+. CompTIA Security+ Certification SY0-701 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format.
We provide course about CSSLP: Certified Secure Software Lifecycle Professional. The training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication.
We provide course about CWAP: Certified Wireless Analysis Professional. Wireless troubleshooting involves knowledge of RF operations, 802.11 protocols, analysis tools (such as protocol and spectrum analyzers) and troubleshooting methodologies.
We provide course about CWNA: Certified Wireless Network Administrator. The goal of this CWNA course is to add Wi-Fi expertise to a networking professional’s skillset, while covering all CWNA exam topics.
We provide course about CWS-215: Citrix Virtual Apps and Desktops Deployment and Administration. In this course you will learn how to create a new Citrix Virtual Apps and Desktops (CVAD) deployment.
We provide course about CWS-322: Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration. Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
We provide course about CWS-415: Citrix Virtual Apps and Desktops 7 Assessment, Design and Advanced Configuration. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution.
We provide course about Data Warehouse on AWS. In this course, you will learn concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS.
We provide course about DCCOR: Implementing and Operating Cisco Data Center Core Technologies. The course helps you prepare for the Cisco CCNP Data Center and CCIE Data Center certifications and for advanced-level data center roles.
We provide course about DEVASC: Developing Applications and Automating Workflows using Cisco Platforms. This course will help you prepare for the Cisco® DevNet Associate certification and for associate-level network automation engineer roles.
We provide course about Developing on AWS. This course includes presentations, demonstrations, and hands-on labs. This course teaches experienced developers how to programmatically interact with AWS services to buildweb solutions.
We provide course about DevOps. DevOps is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support. The goal is to add value by improving the flow in this process.
We provide course about DevOps Engineering on AWS. DevOps Engineering on AWS teaches you how to use the combination of DevOps cultural philosophies,practices, and tools to increase your organization’s ability to develop, deliver, and maintain applications andservices at high velocity on AWS.
Vi tilbyr kurs om DevOps Foundation. Kurset gir en grunnleggende innføring i DevOps-terminologi for å sikre at alle snakker samme språk. Kurset gir også en grunnleggende forståelse av hvordan DevOps støtter en organisasjons suksess.
We provide course about DevOps Leader. The DevOps Leader course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps.
We provide course about DevSecOps Foundation (DSOF). As companies deploy code faster and more often than ever, new vulnerabilities are also accelerating. When the boss says, “Do more with less”, DevOps practices adds business and security value as an integral, strategic component.
We provide course about DO457: Ansible for Network Automation. This course is based on Red Hat® Ansible Engine 2.5 and Red Hat® Ansible Tower 3.2. Configure and manage network infrastructure using Red Hat Ansible Automation for Networking.
We provide course about ECIH: Certified Incident Handler v3. This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
We provide course about ECMS1: Engineering Cisco Meraki Solutions 1. This course is designed to equip you with the knowledge and skills required to confidently operate Cisco Meraki solutions, the class includes a full-day of instruction, live demos, guided lab practice, and interactive Q&A.
Elevate your Cisco Meraki technical knowledge and skills with this three-day, instructor-led training! In this advanced technical training course, you’ll gain the knowledge and skills to plan, design, implement, and operate complex Cisco Meraki solutions.
We provide course about EDU-210: Palo Alto Firewall Essentials: Configuration and Management. Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls.
We provide course about ENARSI: Implementing Cisco Enterprise Advanced Routing and Services. The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) provides you with the knowledge you need to install, configure, operate, and troubleshoot an enterprise network.
We provide course about ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies. The course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks.
We provide course about ENSDWI: Implementing Cisco SD-WAN Solutions. Learn how to design, deploy, configure and manage your Cisco® Software-Defined WAN (SD-WAN) solution in a large-scale live network, including how to migrate from legacy WAN to SD-WAN.
We provide course about ENWLSI: Implementing Cisco Enterprise Wireless Networks. The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.0 course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any related issues.
Vi tilbyr kurs om IP1: generell nettverksteknologi. Dette kurset gir deg kunnskap om relevante nettverksbegreper og forståelse av protokollen som benyttes i alle nettverk - IP. Routere, switcher og lag 3 switcher er vanlige komponenter i et nettverk.
Vi tilbyr IP2: IP- og nettverks-workshop. Dette kurset er for deg som har basiskunnskaper tilsvarende kurset IP1: generell nettverksteknologi og som ønsker ytterligere kompetanse innen nettverk. Dette kurset er en kombinasjon av teori og praksis. Det er stort fokus på praktiske oppgaver!
We provide course about IREB CPRE Foundation Level. IREB® Certified Professional for Requirements Engineering - Foundation Level provides you with basic knowledge in requirements management and prepares you for certification according to IREB® (International Requirements Engineering Board).
We provide course about ISO 22301 Foundation. As an international standard for Business Continuity Management System, the ISO 22301 is designed to protect, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.
We provide course about ISO 22301 Lead Implementer. ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
We provide course about ISO 27005 Risk Manager. ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
We provide course about ISO 31000 Lead Risk Manager. The training course helps participants develop their competences to support an organization create and protect value by managing risks, making decisions, and improving performance using the ISO 31000 guidelines.
We provide course about ISO 37001 Lead Implementer. The benefits of implementing an anti-bribery management system (ABMS) based on ISO 37001 are manifold: helping the organization avoid or mitigate the costs, risks, and damage of involvement in bribery.
We provide course about ISO 37301 Lead Implementer. The PECB ISO 37301 Lead Implementer training course provides the knowledge needed to establish, implement, manage, maintain, and continually improve a CMS.
We provide course about ISO 9001 Lead Auditor. The PECB ISO 9001 Lead Auditor training course enables you to develop the necessary competence to perform quality management system (QMS) audits by applying widely recognized audit principles, procedures, and techniques.
We provide course about ISO 9001 Lead Implementer - Quality Management. The course helps you develop the competence necessary to establish, implement, operate, maintain, and continually improve a QMS.
We provide course about ISO/IEC 27001 Foundation. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
We provide course about ISO/IEC 27001 Introduction. By attending the ISO/IEC 27001 Introduction training course, you will understand the importance of ISMS and the benefits that businesses, society and governments can obtain.
We provide course about ISO/IEC 27001 Lead Auditor. ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide course about ISO/IEC 27001 Lead Implementer. ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
We provide course about ISO/IEC 27035 Lead Incident Manager. ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
We provide course about ISO/IEC 27701 Foundation. The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701.
We provide course about ISO/IEC 27701 Lead Auditor. The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide course about ISO/IEC 27701 Lead Implementer. The ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS).
We provide course about ISO/IEC 31000 Risk Manager. The ISO 31000 Risk Manager training course helps participants acquire the knowledge necessary and ability to integrate the risk management guidelines of ISO 31000 in an organization.
We provide course about ISO/IEC 38500 Lead IT Corporate Governance Manager. After mastering all the necessary concepts and core principles of IT Governance, you can sit for the exam and apply for a “PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager” credential.
We provide course about ISTQB Advanced Level Technical Test Analyst. Improve your ability to evaluate technical system attributes. Differentiate your skills by developing an internationally accredited advanced technical competency.
We provide course about ISTQB Advanced Level Test Analyst. Build upon your Foundation-level skills with advanced test design techniques learnt with real-world emphasis. Plus, benefit from our free exam revision sessions.
We provide course about ISTQB Advanced Level Test Automation Engineer Certificate. Gain the knowledge and skills necessary to guide a test automation project, and differentiate yourself in one of the fastest growing areas of Software Testing.
We provide course about ISTQB Advanced Level Test Manager. Build your test management skills. Move into a more senior role as a testing professional. Plus, benefit from our free exam revision sessions.
We provide course about ISTQB Agile Tester. Designed for testers, this course provides an understanding of how Agile projects are organised, teaching commonly applied Agile development and testing practices.
We provide course about ISTQB Foundation v4.0 Certificate. In the ISTQB® Foundation v4.0 course, you will learn how to apply test principles and control your own test activities using test processes and methodologies that are globally recognised as best practice.
We provide course about ISTQB Security Tester Certificate. In this ISTQB® Security Tester course, you will learn how to plan, perform and evaluate security tests from a variety of perspectives, including policy, risk, standards, requirements and vulnerability.
Vi tilbyr kurs om ITIL® 4 Foundation. ITIL 4 bygger på essensen av beste praksis som ITIL tilbyr når det gjelder tjenesteleveranser (Service management). ITIL 4 gir oss en praktisk og fleksibel tilnærming når vi nå flytter våre tjenester til den nye digitale verden.
We provide course about ITIL® 4 Foundation - 2 days course for ITIL experienced. The ITIL® (4) Foundation “Pro” is a 2-day classroom room based on the exam specifications specified by AXELOS for the ITIL® (4) Foundation certification.
We provide course about ITIL® 4 Foundation in english. The ITIL® (4) Foundation is a 3-day classroom room based on the exam specifications specified by AXELOS for the ITIL® (4) Foundation certification.
We provide course about ITIL® 4 Practitioner: Change Enablement. This module helps to maximise the number of successful service and product changes by ensuring that risks have been accurately assessed, authorizing changes to proceed, and managing the change schedule.
We provide course about ITIL® 4 Practitioner: Incident Management. This module covers general information and the processes and activities of the incident management practice and their roles in the service value chain.
We provide course about ITIL® 4 Practitioner: Information Security Management. This module provides best practice guidance on how to protect the information needed by the organisation to conduct its business.
We provide course about ITIL® 4 Practitioner: IT Asset Management. The ITIL 4 Practitioner: IT Asset Management is intended for IT professionals who want to prove and validate their skills in this specific practice area.
We provide course about ITIL® 4 Practitioner: Monitoring and Event Management. This module provides guidance on how to systematically observe services and service components, and record, report and respond to selected changes of state identified as events.
We provide course about ITIL® 4 Practitioner: Problem Management. This module provides practical guidance on the processes and activities of the Problem Management practice and their roles in the service value chain.
We provide course about ITIL® 4 Practitioner: Service Desk. This module helps to significantly influence user experience, customer experience, and the overall success of service relationships.
We provide course about ITIL® 4 Practitioner: Supplier Management. This module focuses on how to ensure that the organisation’s suppliers and their performances are managed appropriately to support the seamless provision of quality products and services.
We provide course about ITIL® 4 Specialist: Collaborate, Assure and Improve. This combined practice module covers the key concepts of five ITIL practices, namely, Relationship Management, Supplier Management, Service Level Management, Continual Improvement and Information Security Management.
We provide course about ITIL® 4 Specialist: Monitor, Support and Fulfil. This combined practice module covers the key concepts of five ITIL practices, namely, Incident Management, Service Desk, Service Request Management, Monitoring and Event Management and Problem Management.
We provide course about ITIL® 4 Specialist: Plan, Implement and Control. This combined practice module covers the key concepts of five ITIL practices, namely, Change Enablement, Deployment Management, Release Management, Service Configuration Management and IT Asset Management.
We provide course about ITIL® 4Practitioner: Service Configuration Management. This module ensures that accurate and reliable information about the configuration of services and the configuration items that support them is available when and where needed.
Vi tilbyr kurs om ITIL® Awareness for bedrifter. Kurset gir et overblikk over ITIL-rammeverket og hvilke fordeler man oppnår ved å innføre dette i en organisasjon. Dette er et introduksjonskurs som ikke går i dybden.
Vi tilbyr bedriftsinternt kurs om ITIL® for ledere. ITIL® er i bruk i en eller annen form i de fleste store bedrifter og ITIL har vokst fra å være et rammeverk for IT drift til å favne både tjenesteutvikling og tjenestestrategi.
We provide course about ITIL® Leader - Digital and IT Strategy. This course will focus on the alignment of digital business strategy with IT strategy. The course also covers how disruption from new technologies are impacting organizations in every industry and how business leaders are responding.
We provide course about ITIL® Specialist - Create, Deliver & Support. The module is part of the Managing Professional stream for ITIL 4 and participants need to pass the related certification exam for working towards the Managing Professional (MP) designation.
We provide course about ITIL® Specialist - Drive Stakeholder Value. The certification is relevant to everyone in a supplier facing role. This means those managing one or more suppliers, and working with suppliers in providing a single integrated service management organization.
We provide course about ITIL® Specialist - High Velocity IT. The High Velocity IT Specialist Certification is relevant to everyone working in Agile and DevOps Teams focusing on the rapid delivery of IT solutions.
We provide course about ITIL® Strategist - Direct, Plan and Improve. The ITIL® 4 Strategist: Direct, Plan, and Improve course is based on the ITIL® 4 Strategist Direct, Plan, and Improve candidate syllabus from AXELOS.
We provide course about ITIL®4 Practitioner: Service Request Management. This module provides understanding and application of the key concepts, principles, value and challenges of the Service Request Management practice.
We provide course about JSM Project Admin (Cloud). Clearvision´s Jira Service Management Project Administration training course provides a deeper understanding of JSM Project Administration.
We provide course about Kubernetes. Kubernetes´ architecture brings the first real way of operating docker containers in production. This solution was first developed by Google, and TCP Cloud was the world´s first real-world testing enterprise deployment experience.
We provide course about Kubernetes & Kubernetes Advanced Combined. Kubernetes has evolved over the years into a comprehensive solution for container orchestration with plenty of integration practices.
We provide course about Kubernetes Advanced. Kubernetes has evolved over the years into a comprehensive solution for container orchestration with plenty of integration practices. However, it is still not a platform that is ready for direct user use and requires knowledge of the whole system.
We provide course about MasterClass: Hacking and Securing Windows Infrastructure. This course is just a great workshop that teaches how to implement securing technologies one at a time.
We provide course about MasterClass: This training is not related to any specific certification. System Forensics and Incident Handling. Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity.
We provide course about MasterClass: Windows Security and Infrastructure Management with Windows Internals. This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals.
With vendors placing such a high emphasis on cloud skills, it’s easy to forget about the core essentials. With so many folks coming into the industry without these skills, this lack of knowledge is not only becoming an operational problem, but also a security one as well.
We provide course about Migrating to AWS. You will learn strategies for planning and migrating existing workloads to the AWS Cloud, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization.
We provide course about Modern Angular with Signals (Hands-on). This course provides an interactive learning experience, enabling you to deepen your understanding and retention through hands-on exercises that transform passive learning into an engaging, active journey.
We provide course about MPLS: Implementing Cisco MPLS. This course covers both introductory and advanced MPLS and MPLS VPNs concepts. Configuration, implementation and troubleshooting skills are all included with a significant focus on the use of labs to consolidate the learners knowledge.
We provide course about MS-102: Microsoft 365 Administrator. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.
We provide course about NIS 2 Directive Foundation. The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures.
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS2 Directive.
We provide course about PECB Certified Lead Cybersecurity Manager. The Lead Cybersecurity Manager training course enables participants to obtain the necessary competencies to effectively implement, manage, and continually improve a cybersecurity program.
We provide course about Planning and Designing Databases on AWS. In this course, you will learn about planning and designing your solutions with purpose-built Amazon Web Services (AWS) Cloud databases.
Vi tilbyr kurs om problemløsning basert på Kepner Tregoe. Dette 2-dagers Kepner-Tregoe kurset gir en introduksjon til en systematisk prosess for problemløsning, slik at du blir i stand til å levere et høyt kvalitetsnivå og konsistens i kundestøtten.
Vi tilbyr rammeverk-workshop: Hvilket rammeverk skal vi velge. I denne workshopen vil du få et innblikk i et sett utvalgte rammeverk, og en forståelse for hvordan de kan bidra til kvalitetsøking og verdiskapning på hver sine områder.
We provide course about Saltstack - for Automation and System Management. SaltStack (short for Salt) is a modern open-source tool for automating and managing system configurations.
We provide course about SC-100: Microsoft Cybersecurity Architect. The SC-100 course will lead towards the first expert level certification in the Microsoft Security, Compliance, and Identity portfolio.
We provide course about SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
We provide course about SC-400: Administering Information Protection and Compliance in Microsoft 365. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
We provide course about SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
We provide course about SCOR: Implementing and Operating Cisco Security Core Technologies. The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
We provide course about secure coding in C and C++. Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
We provide course about secure coding in C and C++ - ARM. Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
We provide course about secure coding in C and C++ for medical devices. Your medical device written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
We provide course about Security Engineering on AWS. This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud.
We provide course about security testing C and C++ applications. Your application written in C and C++ is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2^32?
We provide course about Security testing Python Web applications. Your Web application written in Python is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
We provide course about SFWIPF: Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention. The training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge.
We provide course about SIAM® Foundation. SIAM is a management methodology that can be applied in an environment where services are delivered using a number of service providers.
This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications.
We provide course about Spring Cloud Development. This course takes a detailed and pragmatic look at how to create Spring Cloud solutions. You will learn how to create microservices in Spring Cloud, and how to configure, discover, and route microservice applications.
Become an SSCP - Systems Security Certified Practitioner! Earning a globally recognized IT security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
We provide course about Terraform. Learn how to use Terraform to control your Cloud services. Our Terraform training course will show you how to use this tool for building, changing and versioning infrastructure safely and efficiently.
We provide course about The Machine Learning Pipeline on AWS. This course explores how to use the machine learning (ML) pipeline to solve a real business problem in a project-based learning environment.
We provide course about Threat Modelling. Learn how to think about security as part of agile development, and uncover security defects and requirements before they cost you time, money and feature velocity.
Become a certified TMMi Professional and learn how to improve testing processes. You will learn why process improvement with TMMi (Test Maturity Model integration) is important, ways to identify opportunities, and the benefits of successfully improving said improvements.
We provide course about understand wireless technology. This training will give you a good understanding of Wireless Network technology. There is no lab exercises in this training. Instructor will lecture and show demos during the course. The course will be tought from a Cisco perspective.
We provide course about VMware Aria Automation: Install, Configure, Manage (V8.10). During this 5-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10™ on-premises systems.
We provide course about VMware Cloud Foundation: Deploy, Configure, Manage (V5.0). This 5-day course includes instruction on the capabilities of VMware Cloud Foundation™ and how to successfully plan, deploy, manage, and operate hybrid and cloud infrastructures, including customization.
We provide course about VMware Cloud on AWS: Design, Configure, Manage 2023. This 4-day, hands-on training course provides you with the knowledge, skills, and tools for deploying and managing a VMware Cloud™ on AWS infrastructure.
We provide course about VMware HCX: Deploy, Configure, Manage. This 3-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware HCX.
We provide course about VMware Horizon 8: Skills for Virtual Desktop Management in english. This 3-day, hands-on course gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform.
We provide course about VMware NSX for Intrinsic Security (V4.x). This 5-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX® for intrinsic security.
We provide course about VMware NSX: Design (V4.x). This 5-day course provides comprehensive training on considerations and practices to design a VMware NSX® environment as part of a software-defined data center strategy.
We provide course about VMware NSX: Install, Configure, Manage (V4.0). This 5-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment.
We provide course about VMware NSX: Troubleshooting and Operations (V4.x). This 5-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX infrastructure.
We provide course about VMware NSX-T Data Center: Install, Configure, Manage (V3.2). This 5-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment.
We provide course about VMware Tanzu Kubernetes Grid: Install, Configure, Manage. During this course, you focus on installing VMware Tanzu™ Kubernetes Grid™ on a VMware vSphere® environment and then provisioning and managing Tanzu Kubernetes clusters.
We provide course about VMware vRealize Automation: Orchestration and Extensibility (V8.6). During this 5-day course, you focus on using VMware vRealize® Orchestrator™ to extend the functionality of VMware vRealize® Automation™.
We provide course about VMware vRealize Automation SaltStack Config: Deploy & Manage (V8.4). This 3-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in deploying and using VMware vRealize® Automation SaltStack® Config.
We provide course about VMware vRealize Automation SaltStack SecOps: Deploy and Manage. This 2-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize® Automation SaltStack® SecOps.
We provide course about VMware vRealize Operations: Advanced Use Cases (v8.x). This 2-day hands-on training course provides advanced knowledge, skills, and tools to achieve competency in operating VMware vRealize® Operations™ 8.X.
We provide course about VMware vRealize Operations: Install, Configure, Manage (V8.6). This 5-day, hands-on training course provides you with the knowledge and skills to deploy a VMware vRealize® Operations™ cluster that meets the monitoring requirements of your environment.
We provide course about VMware vSAN: Install, Configure, Manage (V8). During this four-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You will learn about managing and operating vSAN.
We provide course about VMware vSAN: Management and Operations (V7). In this 3-day course, you learn about managing and operating VMware vSAN™ 7. This course focuses on building the required skills for common Day-2 vSAN administrator tasks.
We provide course about VMware vSAN: Plan and Deploy (V7). This 2-day, hands-on training course provides you with the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster.
We provide course about VMware vSAN: Troubleshooting (V8). In this 2-day course, you focus on learning the tools and skills necessary to troubleshoot VMware vSAN™ 7 implementations.
We provide course about VMware vSphere with Tanzu: Deploy and Manage (V7). You will learn to managing VMware vSphere® with Tanzu. You learn about how vSphere with Tanzu can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a vSphere environment.
This 3-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security.
We provide course about VMware vSphere: Fast Track (V8). Product alignment: VMware ESXi 8.0 and VMware vCenter 8.0. This 5-day, extended hour course takes you from introductory to advanced VMware vSphere® 8 management skills.
We provide course about VMware vSphere: Install, Configure, Manage (V8). This 5-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8.
We provide course about VMware vSphere: Operate, Scale and Secure (V8). This 5-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure.
We provide course about VMware vSphere: Optimize and Scale (V7). This 5-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure.
We provide course about VMware vSphere: Troubleshooting (V8). This 5-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 8 environment.
We provide course about VMware vSphere: What´s New (V8). In this 2-day course, you will explore the new features and enhancements in VMware vCenter® 8.0, VMware ESXi™ 8.0, and VMware vSphere® 8.0.
We provide course about Web Application Security. Your Web application written in any programming language works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe?
We provide course about web application security for PCI DSS. Your Web application written in any programming language works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe?
We provide course about web application security in C#. Your Web application written in C# works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
We provide course about web application security in Python. Your Web application written in Python works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -2^31?
We provide course about Web Security for Developers. The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates.
Vi tilbyr Bachelor i Cyber Security. IT-utdanning som lærer deg å sikre digitale systemer mot cyberangrep, datakriminalitet og digital krigføring. Studiet gjør deg klar til å jobbe praktisk med IKT-sikkerhet og redusere digital sårbarhet.
Vi tilbyr Bachelor i digital etterforskning. IT-utdanning som lærer deg datasikkerhet og etterforskning av digital kriminalitet. Studiet gjør deg klar til å jobbe praktisk med digital sikkerhet og etterretning for politi og andre organisasjoner med behov for økt digital sikkerhet.
I løpet av første året på studiet vil du tilegne deg grunnleggende kunnskap om kjernefaglige tekniske grunnprinsipper og få en bred forståelse av forretningsstyring og -prosesser.
Vi tilbyr utdannelse i nettverk og IT-sikkerhet. Praktisk IT-utdanning som lærer deg å bekjempe hacking og datakriminalitet. Det akutte kompetansebehovet for IT-sikkerhet gir solide jobbmuligheter etter studiet.
Vi tilbyr studie i nettverks- og systemadministrasjon. Praktisk IT-utdanning som lærer deg administrasjon av nettverk og systemer. Studiet sentreres rundt Microsoft- og Unix-baserte teknologier, og infrastruktur for nettverk og serverdrift med fokus på IT-sikkerhet.
Vi tilbyr heltidsstudiet som nettverksadministrator med design. Studiet nettverksadministrator med design er praktisk rettet, og gjennom opplæringen trenes studentene i installasjon, administrasjon og drift av servere og nettverk i klasserommet.
Vi tilbyr deltidsstudiet som i Sky-administrasjon med Microsoft Azure og Microsoft 365. Tradisjonelle nettverksløsninger hvor serveren er plassert i foretakets serverrom (on-premise) er i ferd med å bli erstattet av skybaserte løsninger.
Vi tilbyr heltidsstudiet som i Sky-administrasjon med Microsoft Azure og Microsoft 365. Tradisjonelle nettverksløsninger hvor serveren er plassert i foretakets serverrom (on-premise) er i ferd med å bli erstattet av skybaserte løsninger.
IPv6 grunnkurs (NLT-IPV6-Intro) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og Enterprise-kunder. Kurset vil gi deltagerne kunnskap og ferdigheter som er nødvendige for å designe og konfigurere nettverk. IPv6 introkurs kan kombineres med andre IPv6 kurs,
Vi arrangerer kurset Juniper Networks Certified Internet Specialist (JNCIS-SP). Et 6 dagers kurs som gjennomføres som 5 dagers bootcamp, og inngår i “Service Provider Routing and Switching Learning Path”
Junos grunnkurs er et av nLogics mest populære kurs, som vi har tilbudt i snart 10 år. Kurset er en del av nLogics education services. I tillegg til kurs tilbyr vi workshops, seminarer, sertifiseringsløp og POC-lab for å kunne bistå med opplæring og testning i alle faser av en leveranse.
To innholdsrike dager med seminar og workshops, der vi presenterer siste nytt fra oss, våre kunder og utvalgte partnere.
Vi gjentar suksessen og inviterer til nLogic Summit, 13. juni 2024. Vårt utgangspunkt er å gi innblikk i reelle caser, problemstillinger og løsninger, der vår målsetningen for dagen er å styrke din kompetanse på nettverk, IT-sikkerhet og datasenter.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent kurs tilknyttet EUs personvernforordning (GDPR). Lær deg systematisk ledelse og kontroll av personvern.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent innføringskurs i den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg systematisk ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent revisorkurs tilknyttet den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg hvordan systematisk revidere virksomhetens ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent implementeringskurs i den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg hvordan systematisere virksomhetens ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent kurs i den populære beste praksis standarden ISO/IEC 27005:2018. Lær deg informasjonssikkerhetsmessig risikostyring.
Vi tilbyr bachelor i data Science. Overalt rundt oss jobber forskere og vitenskapsfolk med spennende prosjekter hvor man samler inn enorme mengder rådata, noe som må bearbeides og analyseres for å kunne oppdage fenomener, se sammenhenger og komme frem til spennende konklusjoner.
Hvis du har lyst til å jobbe med nyskapende IT-løsninger og bygge bro mellom informasjonsteknologi og forretningsdrift, er dette mastergraden du har ventet på!
Dette er studiet som gjør deg til en brobygger mellom teknologi og organisasjoner. Informasjonssystemer er både en profesjon og en akademisk disiplin som har til hensikt å bygge bro mellom de tekniske mulighetene som IT gir og forretningsbehov.
Vi har master i Information Systems – Digital Marketing Denne mastergraden gir ettertraktet og spesialisert kunnskap innen datadrevet digital markedsføring.
Vi tilbyr Master i Information Systems – FinTech Business Innovation Denne mastergraden gir deg ettertraktet og spesialisert kunnskap innen Fintech, slik at du kan være med å drive frem nye og innovative tjenester innen finans.
Vi tilbyr Master - Information systems - management and Innovation. Utdanningen for deg som ønsker en karriere som forretningsanalytiker, som sikter mot en lederstilling, og som ikke bare vil forstå, men også utvikle morgendagens teknologi.
Vi tilbyr Master i Applied Computer Science - Software Integration. Få innsikt og kompetanse i hvordan du knytter teknologiske muligheter innen IT opp mot næringslivets behov. Dette er studiet for deg som brenner for IT og teknologi, og som ønsker å skape innovative brukeropplevelser og løsninger.
Vi tilbyr kurs om CCSP - Certified Cloud Security Professional. Øk din kompetanse på å utforme, implementere og administrere cybersikkerhet i skytjenester. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr kurs om CISSP Certified Information Systems Security Professional. Grundig intensivkurs som dekker hele kunnskapsbasen for informasjonssikkerhet fra et ledelsesperspektiv. Målet er at man skal forstå og kunne anvende kunnskapene i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr kurs om CSSLP - Certified Secure Software Lifecycle Professional. Øk din kompetanse på sikker utvikling. CSSLP kurset dekker hele livssyklusen for sikker programutvikling.
Vi tilbyr kurs om Experis Ciber Security Foundation - Cybersikkerhet grunnleggende. Etter gjennomført ECSF har man et godt grunnlag for å gå videre på SSCP, CISSP eller CCSP kursene. Man har en grunnleggende forståelse av nøkkelteknologier innen sikkerhet.
Vi tilbyr kurs om Experis Ciber Security Introduction - Cybersikkerhet introduksjon. Kurset tar for seg grunnleggende risikostyring, virkemidler og fremgangsmåter for innføring av sikkerhet i en organisasjon basert på ivaretakelse av konfidensialitet, integritet og tilgjengelighet.
Vi tilbyr kurs om ISO/IEC 27001 Foundation (PECB). Kurset er en 1-dags innføring i ISO/IEC 27001 for ledere som trenger å vite hva standarden innebærer, hvordan den kan nyttiggjøres og hva som skal til for å implementere den.
Vi tilbyr kurs om ISO/IEC 27001 Introduction (PECB). Kurset er en 1-dags innføring i ISO/IEC 27001 for ledere som trenger å vite hva standarden innebærer, hvordan den kan nyttiggjøres og hva som skal til for å iverksette den.
Vi tilbyr kurs om ISO/IEC 27001 Lead Auditor (PECB). Lead Auditor-kurset gir en meget grundig innføring i det mest omfattende rammeverket for å bygge effektiv og risikobasert sikkerhetsstyring i en virksomhet. ISO/IEC 27001 dekker også områder utenfor cybersikkerhet.
Vi tilbyr kurs om ISO/IEC 27001 Lead Implementer (PECB). Øk din kompetanse på implementering av ISO 27001. Kurset muliggjør formell sertifisering som ISO/IEC 27001-implementer på nivåene «provisional», «implementer» eller «lead implementer» avhengig av erfaring.
Vi tilbyr kurs om ISO/IEC 27005 Lead Risk Manager (PECB). ISO/IEC 27005 gir et rammeverk for risikostyring for organisasjoner for å håndtere informasjonssikkerhetsrisikoer. Spesielt gir den retningslinjer for å identifisere, analysere, evaluere, behandle og overvåke informasjonssikkerhetsrisikoer.
Vi tilbyr kurs om SSCP - System Security Certified Practitioner. Øk din kompetanse på sikkerhet i datasenter og skytjenester. Målet med kurset er at man skal kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.