Alle kategorier
Du har valgt: IT-kurs
Nullstill
Filter
Ferdig

-

Mer enn 100 treff i IT-kurs
 

Oslo Trondheim 2 dager 16 900 kr
27 Jan
17 Feb
24 Mar
Modern Application Architecture [+]
Modern Application Architecture [-]
Les mer
Nettkurs 365 dager 2 995 kr
Excel for Selgere - elæringskurs [+]
Excel for Selgere - elæringskurs [-]
Les mer
Virtuelt klasserom 4 dager 23 000 kr
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), se... [+]
. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). TARGET AUDIENCE IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. COURSE OBJECTIVES Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design security for infrastructure Design a strategy for data and applications COURSE CONTENT Module 1: Build an overall security strategy and architecture Learn how to build an overall security strategy and architecture. Lessons M1 Introduction Zero Trust overview Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design a security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Understand security for protocols Exercise: Build an overall security strategy and architecture Knowledge check Summary After completing module 1, students will be able to: Develop Integration points in an architecture Develop security requirements based on business goals Translate security requirements into technical capabilities Design security for a resiliency strategy Design security strategy for hybrid and multi-tenant environments Design technical and governance strategies for traffic filtering and segmentation Module 2: Design a security operations strategy Learn how to design a security operations strategy. Lessons M2 Introduction Understand security operations frameworks, processes, and procedures Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Evaluate security workflows Review security strategies for incident management Evaluate security operations strategy for sharing technical threat intelligence Monitor sources for insights on threats and mitigations After completing module 2, students will be able to: Design a logging and auditing security strategy Develop security operations for hybrid and multi-cloud environments. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A Evaluate security workflows. Review security strategies for incident management. Evaluate security operations for technical threat intelligence. Monitor sources for insights on threats and mitigations. Module 3: Design an identity security strategy Learn how to design an identity security strategy. Lessons M3 Introduction Secure access to cloud resources Recommend an identity store for security Recommend secure authentication and security authorization strategies Secure conditional access Design a strategy for role assignment and delegation Define Identity governance for access reviews and entitlement management Design a security strategy for privileged role access to infrastructure Design a security strategy for privileged activities Understand security for protocols After completing module 3, students will be able to: Recommend an identity store for security. Recommend secure authentication and security authorization strategies. Secure conditional access. Design a strategy for role assignment and delegation. Define Identity governance for access reviews and entitlement management. Design a security strategy for privileged role access to infrastructure. Design a security strategy for privileged access. Module 4: Evaluate a regulatory compliance strategy Learn how to evaluate a regulatory compliance strategy. Lessons M4 Introduction Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency Requirements Translate privacy requirements into requirements for security solutions After completing module 4, students will be able to: Interpret compliance requirements and their technical capabilities Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance scores and recommend actions to resolve issues or improve security Design and validate implementation of Azure Policy Design for data residency requirements Translate privacy requirements into requirements for security solutions Module 5: Evaluate security posture and recommend technical strategies to manage risk Learn how to evaluate security posture and recommend technical strategies to manage risk. Lessons M5 Introduction Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks After completing module 5, students will be able to: Evaluate security postures by using benchmarks Evaluate security postures by using Microsoft Defender for Cloud Evaluate security postures by using Secure Scores Evaluate security hygiene of Cloud Workloads Design security for an Azure Landing Zone Interpret technical threat intelligence and recommend risk mitigations Recommend security capabilities or controls to mitigate identified risks Module 6: Understand architecture best practices and how they are changing with the Cloud Learn about architecture best practices and how they are changing with the Cloud. Lessons M6 Introduction Plan and implement a security strategy across teams Establish a strategy and process for proactive and continuous evolution of a security strategy Understand network protocols and best practices for network segmentation and traffic filtering After completing module 6, students will be able to: Describe best practices for network segmentation and traffic filtering. Plan and implement a security strategy across teams. Establish a strategy and process for proactive and continuous evaluation of security strategy. Module 7: Design a strategy for securing server and client endpoints Learn how to design a strategy for securing server and client endpoints. Lessons M7 Introduction Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type After completing module 7, students will be able to: Specify security baselines for server and client endpoints Specify security requirements for servers Specify security requirements for mobile devices and clients Specify requirements for securing Active Directory Domain Services Design a strategy to manage secrets, keys, and certificates Design a strategy for secure remote access Understand security operations frameworks, processes, and procedures Understand deep forensics procedures by resource type Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services Learn how to design a strategy for securing PaaS, IaaS, and SaaS services. Lessons M8 Introduction Specify security baselines for PaaS services Specify security baselines for IaaS services Specify security baselines for SaaS services Specify security requirements for IoT workloads Specify security requirements for data workloads Specify security requirements for web workloads Specify security requirements for storage workloads Specify security requirements for containers Specify security requirements for container orchestration After completing module 8, students will be able to: Specify security baselines for PaaS, SaaS and IaaS services Specify security requirements for IoT, data, storage, and web workloads Specify security requirements for containers and container orchestration Module 9: Specify security requirements for applications Learn how to specify security requirements for applications. Lessons M9 Introduction Understand application threat modeling Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs After completing module 9, students will be able to: Specify priorities for mitigating threats to applications Specify a security standard for onboarding a new application Specify a security strategy for applications and APIs Module 10: Design a strategy for securing data Learn how to design a strategy for securing data. Lessons M10 Introduction Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion After completing module 10, students will be able to: Prioritize mitigating threats to data Design a strategy to identify and protect sensitive data Specify an encryption standard for data at rest and in motion [-]
Les mer
1 dag 12 500 kr
Google Cloud Fundamentals: Core Infrastructure [+]
Google Cloud Fundamentals: Core Infrastructure [-]
Les mer
Nettkurs 1 time
Få en gratis, effektiv og god innføring i SharePoint! Vi viser deg nyttig funksjonalitet slik at du kommer i gang. [+]
Få en gratis, effektiv og god innføring i SharePoint Online! Vi viser deg nyttig funksjonalitet slik at du kommer igang. Webinaret varer i 1 time og består av 1 økt à 45 min, samt 15 min spørsmålsrunde. Webinaret kan også spesialtilpasses og holdes bedriftsinternt kun for din bedrift.   Kursinnhold:   Hva er SharePoint? Bruksområder for SharePoint i Office 365 SharePoint eller OneDrive? Ord og uttrykk i SharePoint   Bli kjent med områder Lagre informasjon i lister Lagre filer i bibliotek Presentere informasjon på sider   Jobbe med dokumenter Opprette og redigere dokument Deling av dokumenter Søk etter innhold   Veien videre Flow Nyheter Teams   3 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Du får tilgang til korte "how-to"-videoklipp [-]
Les mer
Sentrum 2 dager 11 900 kr
25 Nov
24 Feb
23 Jun
Føler du at du ikke mestrer Project, men ønsker å styre ulike prosjekter. Da er dette Project Grunnkurset noe for deg! [+]
Ønsker du å styre ulike prosjekter, men føler du ikke mestrer Project? Trenger du oversikt over aktiviteter, ressurser og kostnader i prosjekter? Da er ”Project Grunnleggende” kurset for deg! Kurset kan også spesialtilpasses og holdes bedriftsinternt i deres eller våre lokaler.   Kursinnhold:   Dag 1   Hva er Project? Få oversikt. Bli kjent med programvinduet og hvordan du kan tilpasse det etter dine behov. Prosjektstyring. Ulike faser i prosjektstyring. Formatering. Lær å formatere samt betydningen av begrepet.   Å jobbe effektivt med Project Innstillinger. Få oversikt over viktige innstillinger. Hurtigtaster. Effektiv bruk av tastatur og mus. Visninger. Bli kjent med de ulike visningene i Project. Tabeller. Få oversikt over tabellene i ulike visninger. Praktisk oppgaveløsing. Jobb med skreddersydde oppgaver innenfor dagens temaer.   Planlegge et prosjekt Aktiviteter. Opprette en aktivitetsliste og redigere denne. Disposisjon. Lær å sette opp hovedaktiviteter med delaktiviteter. Avhengighet. Bli kjent med de ulike avhengighetstypene mellom aktiviteter.   Ressurser og kalendere Ressurser. Hva er ressurser? Tildeling. Tildeling av ressurser på aktiviteter, og endring av tildelinger. Ressurssituasjon. Vise ressurssituasjon og finne konflikter. Ressursutjevning. Løse konflikter ved hjelp av ressursutjevning.   Dag 2   Oversikt over kostnader Kostnader. Kontrollere når kostnader påløper. Ressurskostnader. Knytte kostnader til ressurser. Faste kostnader. Tilknytning av faste kostnader til aktiviteter.   Oppfølging av prosjekter Kritisk linje. Hvordan vise kritisk linje i et prosjekt? Oppfølging. Registrering av virkelig informasjon. Opprinnelig plan. Lagre opprinnelig plan og sammenligning mot virkelig informasjon. Utskrift. Få oversikt over de vanligste problemstillingene ved utskrift og lær å få riktig resultat gang på gang.   4 gode grunner til å velge KnowledgeGroup 1. Best practice kursinnhold 2. Markedets beste instruktører 3. Små kursgrupper 4. Kvalitets- og startgaranti   [-]
Les mer
Virtuelt klasserom 3 dager 9 760 kr
Certificate of Cloud Security Knowledge (CCSK) [+]
  Certificate of Cloud Security Knowledge (CCSK)    CCSK er et bevis på at innehaveren forstår hovedkonseptene i de tre dokumentene CSA bruker som kunnskapsbase for CCSK: CSAs eget rammeverk for beste praksis innen skysikkerhet, «Security Guidance for Critical Areas of Focus in Cloud Computing, v4.0” ENISAs – det europeiske byrået for nettverks- og informasjonssikkerhet – white paper «Cloud Computing: Benefits, Risks and Recommendations for Information Security.» ENISA er EUs ekspertisesenter for internettsikkerhet i Europa. CSA har i en årrekke hatt et tett samarbeid med ENISA. «CSA Cloud Controls Matrix» er et verktøy for å evaluere skytjenester opp mot en lang rekke standarder og rammeverk, for enklere å forstå hvor godt den enkelte skytjeneste er egnet til å understøtte deg og din bedrift i deres forpliktelser. I tillegg til det offisielle materialet, får kursdeltakere fra kraftbransjen tilgang til Berigos egenutviklede materiale som utvider Cloud Controls Matrix til også å omfatte kraftberedskapsforskriften.   [-]
Les mer
Nettkurs 1 time 549 kr
En pivottabell er et kraftig verktøy i Microsoft Excel som gjør at du kan beregne, summere og analysere store mengder data på en rask og effektiv måte. En pivottabell kan... [+]
En pivottabell er et kraftig verktøy i Microsoft Excel som gjør at du kan beregne, summere og analysere store mengder data på en rask og effektiv måte. En pivottabell kan brukes til å analysere numeriske data og til å besvare uventede spørsmål om dataen. Kort fortalt, en pivottabell hjelper deg med å ta informerte beslutninger basert på funnene i dataene dine. I dette kurset, ledet av Espen Faugstad, vil du lære alt du trenger å vite for å jobbe med pivottabeller i Microsoft Excel. Kurset vil dekke hva en pivottabell er, hvordan du klargjør data, organiserer data, formaterer data, presenterer data, og mye mer. For å ta dette kurset, bør du ha grunnleggende forståelse av Microsoft Excel. Kurset er strukturert i følgende kapitler: Kapittel 1: Introduksjon Kapittel 2: Grunnleggende Kapittel 3: Viderekommen Kapittel 4: Avslutning Etter å ha fullført kurset vil du være i stand til å bruke pivottabeller til å analysere data, trekke innsikter og ta informerte beslutninger basert på dataene i Excel.   Varighet: 1 time   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Vår tjeneste fungerer på samme måte som strømmetjenester for musikk eller TV-serier, der våre kunder betaler en fast månedspris for tilgang til alle kursene vi har tilgjengelig. Vi har opplevd betydelig vekst de siste årene, med over 30 000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling engasjerende, spennende og tilgjengelig for alle, og vi har støtte fra Innovasjon Norge og Forskningsrådet. [-]
Les mer
Majorstuen 1 dag 5 900 kr
Fra og med Microsoft Office 2019 – etterhvert Microsoft 365 – har abonnenter får nye oppdateringer flere ganger i året. I dette kurset ser vi på noen av de viktigste forb... [+]
Fra og med Microsoft Office 2019 – etterhvert Microsoft 365 – har abonnenter får nye oppdateringer flere ganger i året. I dette kurset ser vi på noen av de viktigste forbedringene i denne perioden.Vi utforsker både funksjoner og funksjonalitet.Vi ser blant annet på:•   Tabeller•   Rask utfylling•   Navn på celler og områder•   Overflyt•   Tegne fanen•   Eksempler på nye funksjoner      o   Xoppslag      o   Kjed.Sammen/      o   .Sett familien – gjør det mulig å ha flere kriterier. (eksempel: summer.hvis.sett/sumifs)       o   La      o   Xsamsvar      o   Rad, kolonne og matrisefunksjoner•   Dynamiske matriser   [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Introduksjon til Windows Phone, live tiles og panorama view, installasjon av nødvendig programvare, Hello World, deployment av applikasjoner på telefonen eller emulator, ... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Grunnleggende erfaring med objektorientert programmering er en fordel. Innleveringer: Øvinger: 6 av 8 må være godkjent. Større eller mindre øvinger tilsvarende 8 øvinger hvor 6 må være godkjent før endelig karakter settes. Personlig veileder: ja Vurderingsform: Karakter settes basert på et prosjekt som gjennomføres individuelt. Prosjektet gjennomføres mot slutten av emnet. Ansvarlig: Atle Nes         Læremål: KUNNSKAPERKandidaten:- kjenner til grensesnittet og egenskaper ved Windows Phone- kjenner til ulike programmeringsspråk som kan benyttes ved utvikling av applikasjoner på Windows Phone- kan forklare hvordan en Windows Phone applikasjon publiseres på Marketplace FERDIGHETER:Kandidaten:- kan installere nødvendig programvare på egen datamaskin for å komme i gang med applikasjonsutvikling for Windows Phone- kan utvikle enkle mobilapplikasjoner basert på C# eller VB og XAML (Silverlight)- kan deploye en Windows Phone applikasjon til egen telefon eller til emulator- kan bestemme layout og orientering- kan legge til ulike kontrollere og håndtere hendelser- kan legge til multimedia-elementer- kan utnytte telefonens egenskaper ved hjelp av Windows Phone SDK GENERELL KOMPETANSE:Studenten får en grunnleggende innføring i utvikling av applikasjoner for mobiltelefoner med Windows Phone Innhold:Introduksjon til Windows Phone, live tiles og panorama view, installasjon av nødvendig programvare, Hello World, deployment av applikasjoner på telefonen eller emulator, XAML, layout og orientering, touch og navigasjon, ulike kontrollere og hendelser, multimedia (bilder, lyd og video), Windows Phone SDK, utnyttelse av telefonens egenskaper (GPS, akselerometer, kontaktliste, kamera), publisering av applikasjoner på Marketplace.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Applikasjonsutvikling for Windows Phone 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.   [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
OFFICIAL (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL TRAINING - INCLUDING EXAM [+]
COURSE OVERVIEW The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the cybersecurity market. CISSP validates a cybersecurity professional’s deep technical and managerial knowledge and experience to effectively design, engineer and manage an organization’s overall security posture. Please note an exam voucher is included as part of this course TARGET AUDIENCE Cybersecurity professionals with at least 5 years in the information security field. Member data has shown that amajority of CISSP holders are in middle management and a much smaller proportion are in senior or junior/entry-level positions. Roles include:• Chief Information Officer• Chief Information Security Officer• Chief Technology Officer• Compliance Manager / Officer• Director of Security• Information Architect• Information Manager / Information RiskManager or Consultant• IT Specialist / Director / Manager• Network / System Administrator• Security Administrator• Security Architect / Security Analyst• Security Consultant• Security Manager• Security Systems Engineer / Security EngineerSectorsCISSP is relevant across all sectors and industries, including:• Aerospace• Automotive• Banking, financial services, insurance (BFSI)• Construction• Cybersecurity• Energy• Engineering• Government• Healthcare, IT products, services, consulting• Manufacturing• Pharma• Retail• Telecom COURSE OBJECTIVESAfter completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age. Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections. Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function. List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7. Identify standard terms for applying physical and logical access controls to environments related to their security practice. Appraise various access control models to meet business security requirements. Name primary methods for designing and validating test and audit strategies that support business requirements. Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures. Recognize risks to an organization’s operational endeavours and assess specific threats, vulnerabilities and controls. Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security. COURSE CONTENT Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security Architecture and Engineering Domain 4: Communication and Network Security Domain 5: Identity and Access Management (IAM) Domain 6: Security Assessment and Testing Domain 7: Security Operations Domain 8: Software Development Security TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)2 Certified Information Systems Security Professional Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification Please note an exam voucher is included as part of this course   [-]
Les mer
Arne Rettedals Hus 3 timer 3 200 kr
13 Feb
22 May
Microsoft Teams er et sted for samarbeid med dine kollegaer der alle samtaler, møter, filer og notater er tilgjengelig for alle i ditt team, alt på ett sted. [+]
Microsoft Teams er et sted for samarbeid med dine kollegaer der alle samtaler, møter, filer og notater er tilgjengelig for alle i ditt team, alt på ett sted.  Mål for kursetEtter endt kurs skal du kunne bruke Microsoft Teams på en smart og effektiv måte. ForkunnskaperTeams forutsetter at du har et Microsoft 365 (Office 365) abonnement, og at du har gjort deg kjent med grunnleggende bruk av dette.  MålgruppeDette kurset er for deg som har et Microsoft 365 (Office 365) abonnement, og som ønsker å benytte Teams for å samarbeide med kollegaer på en effektiv måte.  UndervisningsformKlasseromsundervisning med maks 12 deltakere.En maskin utlånt til hver deltaker. Pris3200 kroner Ansatte ved UiS har egne prisbetingelser. Varighet1/2 dag fra 09:00 til 12:00 Emner Med Teams blir det mye enklere å samarbeide med dine kollegaer. På kurset vil vi forklare hvordan Teams fungerer, og vi vil med praktiske øvelser vise hvordan man kan bruke dette verktøyet på en effektiv måte. Opprettelse av Teams Medlemmer i Teams Chatte og videokonferanse med dine kollegaer Oversikt over kalender og innkalling av teammøter Opprette og dele dokumenter Bruk av Teams på en mengde enheter (PC, Mac, mobil og nettbrett) Notatblokk og møteagendaer for Teamet [-]
Les mer
Oslo 2 dager 15 900 kr
09 Jan
09 Jan
20 Mar
ITIL® 4 Foundation - 2 days course for ITIL experienced [+]
ITIL® 4 Foundation - 2 days course for ITIL experienced [-]
Les mer
Virtuelt klasserom 4 dager 30 000 kr
25 Nov
In this course, the student will learn about the data engineering patterns and practices as it pertains to working with batch and real-time analytical solutions using Azu... [+]
The students will learn how to interactively explore data stored in files in a data lake. They will learn the various ingestion techniques that can be used to load data using the Apache Spark capability found in Azure Synapse Analytics or Azure Databricks, or how to ingest using Azure Data Factory or Azure Synapse pipelines. The students will also learn the various ways they can transform the data using the same technologies that is used to ingest data. The student will spend time on the course learning how to monitor and analyze the performance of analytical system so that they can optimize the performance of data loads, or queries that are issued against the systems. They will understand the importance of implementing security to ensure that the data is protected at rest or in transit. The student will then show how the data in an analytical system can be used to create dashboards, or build predictive models in Azure Synapse Analytics. After completing this course, students will be able to: Explore compute and storage options for data engineering workloads in Azure Design and Implement the serving layer Understand data engineering considerations Run interactive queries using serverless SQL pools Explore, transform, and load data into the Data Warehouse using Apache Spark Perform data Exploration and Transformation in Azure Databricks Ingest and load Data into the Data Warehouse Transform Data with Azure Data Factory or Azure Synapse Pipelines Integrate Data from Notebooks with Azure Data Factory or Azure Synapse Pipelines Optimize Query Performance with Dedicated SQL Pools in Azure Synapse Analyze and Optimize Data Warehouse Storage Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link Perform end-to-end security with Azure Synapse Analytics Perform real-time Stream Processing with Stream Analytics Create a Stream Processing Solution with Event Hubs and Azure Databricks Build reports using Power BI integration with Azure Synpase Analytics Perform Integrated Machine Learning Processes in Azure Synapse Analytics Course prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions.Recommended prerequisites:M-DP900 - Microsoft Azure Data FundamentalsM-AZ900 - Microsoft Azure Fundamentals Agenda Module 1: Explore compute and storage options for data engineering workloads This module provides an overview of the Azure compute and storage technology options that are available to data engineers building analytical workloads. This module teaches ways to structure the data lake, and to optimize the files for exploration, streaming, and batch workloads. The student will learn how to organize the data lake into levels of data refinement as they transform files through batch and stream processing. Then they will learn how to create indexes on their datasets, such as CSV, JSON, and Parquet files, and use them for potential query and workload acceleration. Module 2: Design and implement the serving layer This module teaches how to design and implement data stores in a modern data warehouse to optimize analytical workloads. The student will learn how to design a multidimensional schema to store fact and dimension data. Then the student will learn how to populate slowly changing dimensions through incremental data loading from Azure Data Factory. Module 3: Data engineering considerations for source files This module explores data engineering considerations that are common when loading data into a modern data warehouse analytical from files stored in an Azure Data Lake, and understanding the security consideration associated with storing files stored in the data lake. Module 4: Run interactive queries using Azure Synapse Analytics serverless SQL pools In this module, students will learn how to work with files stored in the data lake and external file sources, through T-SQL statements executed by a serverless SQL pool in Azure Synapse Analytics. Students will query Parquet files stored in a data lake, as well as CSV files stored in an external data store. Next, they will create Azure Active Directory security groups and enforce access to files in the data lake through Role-Based Access Control (RBAC) and Access Control Lists (ACLs). Module 5: Explore, transform, and load data into the Data Warehouse using Apache Spark This module teaches how to explore data stored in a data lake, transform the data, and load data into a relational data store. The student will explore Parquet and JSON files and use techniques to query and transform JSON files with hierarchical structures. Then the student will use Apache Spark to load data into the data warehouse and join Parquet data in the data lake with data in the dedicated SQL pool. Module 6: Data exploration and transformation in Azure Databricks This module teaches how to use various Apache Spark DataFrame methods to explore and transform data in Azure Databricks. The student will learn how to perform standard DataFrame methods to explore and transform data. They will also learn how to perform more advanced tasks, such as removing duplicate data, manipulate date/time values, rename columns, and aggregate data. Module 7: Ingest and load data into the data warehouse This module teaches students how to ingest data into the data warehouse through T-SQL scripts and Synapse Analytics integration pipelines. The student will learn how to load data into Synapse dedicated SQL pools with PolyBase and COPY using T-SQL. The student will also learn how to use workload management along with a Copy activity in a Azure Synapse pipeline for petabyte-scale data ingestion. Module 8: Transform data with Azure Data Factory or Azure Synapse Pipelines This module teaches students how to build data integration pipelines to ingest from multiple data sources, transform data using mapping data flowss, and perform data movement into one or more data sinks. Module 9: Orchestrate data movement and transformation in Azure Synapse Pipelines In this module, you will learn how to create linked services, and orchestrate data movement and transformation using notebooks in Azure Synapse Pipelines. Module 10: Optimize query performance with dedicated SQL pools in Azure Synapse In this module, students will learn strategies to optimize data storage and processing when using dedicated SQL pools in Azure Synapse Analytics. The student will know how to use developer features, such as windowing and HyperLogLog functions, use data loading best practices, and optimize and improve query performance. Module 11: Analyze and Optimize Data Warehouse Storage In this module, students will learn how to analyze then optimize the data storage of the Azure Synapse dedicated SQL pools. The student will know techniques to understand table space usage and column store storage details. Next the student will know how to compare storage requirements between identical tables that use different data types. Finally, the student will observe the impact materialized views have when executed in place of complex queries and learn how to avoid extensive logging by optimizing delete operations. Module 12: Support Hybrid Transactional Analytical Processing (HTAP) with Azure Synapse Link In this module, students will learn how Azure Synapse Link enables seamless connectivity of an Azure Cosmos DB account to a Synapse workspace. The student will understand how to enable and configure Synapse link, then how to query the Azure Cosmos DB analytical store using Apache Spark and SQL serverless. Module 13: End-to-end security with Azure Synapse Analytics In this module, students will learn how to secure a Synapse Analytics workspace and its supporting infrastructure. The student will observe the SQL Active Directory Admin, manage IP firewall rules, manage secrets with Azure Key Vault and access those secrets through a Key Vault linked service and pipeline activities. The student will understand how to implement column-level security, row-level security, and dynamic data masking when using dedicated SQL pools. Module 14: Real-time Stream Processing with Stream Analytics In this module, students will learn how to process streaming data with Azure Stream Analytics. The student will ingest vehicle telemetry data into Event Hubs, then process that data in real time, using various windowing functions in Azure Stream Analytics. They will output the data to Azure Synapse Analytics. Finally, the student will learn how to scale the Stream Analytics job to increase throughput. Module 15: Create a Stream Processing Solution with Event Hubs and Azure Databricks In this module, students will learn how to ingest and process streaming data at scale with Event Hubs and Spark Structured Streaming in Azure Databricks. The student will learn the key features and uses of Structured Streaming. The student will implement sliding windows to aggregate over chunks of data and apply watermarking to remove stale data. Finally, the student will connect to Event Hubs to read and write streams. Module 16: Build reports using Power BI integration with Azure Synapase Analytics In this module, the student will learn how to integrate Power BI with their Synapse workspace to build reports in Power BI. The student will create a new data source and Power BI report in Synapse Studio. Then the student will learn how to improve query performance with materialized views and result-set caching. Finally, the student will explore the data lake with serverless SQL pools and create visualizations against that data in Power BI. Module 17: Perform Integrated Machine Learning Processes in Azure Synapse Analytics This module explores the integrated, end-to-end Azure Machine Learning and Azure Cognitive Services experience in Azure Synapse Analytics. You will learn how to connect an Azure Synapse Analytics workspace to an Azure Machine Learning workspace using a Linked Service and then trigger an Automated ML experiment that uses data from a Spark table. You will also learn how to use trained models from Azure Machine Learning or Azure Cognitive Services to enrich data in a SQL pool table and then serve prediction results using Power BI. [-]
Les mer
Webinar + nettkurs 3 dager 12 550 kr
Kom i gang med Autodesk Revit Structure på vårt grunnkurs. [+]
Kurset er rettet mot deg som har vært gjennom Revit Grunnkurs for bygg og har litt erfaring i bruk av programmet.  Hensikten med kurset er å gi deg en utvidet forståelse av bruken av 3D-prosjekteringsverktøyet Autodesk Revit Structure. Du vil lære avansert funksjonalitet i Revit Structure og få et dypere innblikk i de mulighetene programmet gir. For eksempel håndtering av Revit-prosjekter og utarbeidelse av rapporter, armeringstegninger og bøyelister. Kursinnhold Tags Families Group Tabeller Armering med norsk bøyeliste DWG import - export Fagverk Terreng/kart Prosjektfaser Worksharing Legend Filter I løpet av kurset gjøres øvelser for alle emner som blir tatt opp. [-]
Les mer