IT-kurs
Du har valgt: Sikkerhetskurs for IT
Nullstill
Filter
Ferdig

-

34 treff i Sikkerhetskurs for IT
 

Oslo 5 dager 27 900 kr
20 Jan
20 Jan
ISO 27032 Lead Cybersecurity Manager [+]
ISO 27032 Lead Cybersecurity Manager [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microso... [+]
 In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. Global Knowledge will introduce you to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths. COURSE OBJECTIVES By actively participating in this course, you will learn about the following: Microsoft 365 Security Metrics Microsoft 365 Security Services Microsoft 365 Threat Intelligence Data Governance in Microsoft 365 Archiving and Retention in Office 365 Data Governance in Microsoft 365 Intelligence Search and Investigations Device Management Windows 10 Deployment Strategies Mobile Device Management COURSE CONTENT Module 1: Introduction to Microsoft 365 Security Metrics Threat Vectors and Data Breaches Security Solutions in Microsoft 365 Introduction to the Secure Score Introduction to Azure Active Directory Identity Protection Module 2: Managing Your Microsoft 365 Security Services Introduction to Exchange Online Protection Introduction to Advanced Threat Protection Managing Safe Attachments Managing Safe Links Monitoring and Reports Module 3: Lab 1 - Manage Microsoft 365 Security Services Exercise 1 - Set up a Microsoft 365 Trial Tenant Exercise 2 - Implement an ATP Safe Links policy and Safe Attachment policy Module 4: Microsoft 365 Threat Intelligence Overview of Microsoft 365 Threat Intelligence Using the Security Dashboard Configuring Advanced Threat Analytics Implementing Your Cloud Application Security Module 5: Lab 2 - Implement Alert Notifications Using the Security Dashboard Exercise 1 - Prepare for implementing Alert Policies Exercise 2 - Implement Security Alert Notifications Exercise 3 - Implement Group Alerts Exercise 4 - Implement eDiscovery Alerts Module 6: Introduction to Data Governance in Microsoft 365 Introduction to Archiving in Microsoft 365 Introduction to Retention in Microsoft 365 Introduction to Information Rights Management Introduction to Secure Multipurpose Internet Mail Extension Introduction to Office 365 Message Encryption Introduction to Data Loss Prevention Module 7: Archiving and Retention in Office 365 In-Place Records Management in SharePoint Archiving and Retention in Exchange Retention Policies in the SCC Module 8: Lab 3 - Implement Archiving and Retention Exercise 1 - Initialize Compliance in Your Organization Exercise 2 - Configure Retention Tags and Policies Exercise 3 - Implement Retention Policies Module 9: Implementing Data Governance in Microsoft 365 Intelligence Planning Your Security and Complaince Needs Building Ethical Walls in Exchange Online Creating a Simple DLP Policy from a Built-in Template Creating a Custom DLP Policy Creating a DLP Policy to Protect Documents Working with Policy Tips Module 10: Lab 4 - Implement DLP Policies Exercise 1 - Manage DLP Policies Exercise 2 - Test MRM and DLP Policies Module 11: Managing Data Governance in Microsoft 365 Managing Retention in Email Troubleshooting Data Governance Implementing Azure Information Protection Implementing Advanced Features of AIP Implementing Windows Information Protection Module 12: Lab 5 - Implement AIP and WIP Exercise 1 - Implement Azure Information Protection Exercise 2 - Implement Windows Information Protection Module 13: Managing Search and Investigations Searching for Content in the Security and Compliance Center Auditing Log Investigations Managing Advanced eDiscovery Module 14: Lab 6 - Manage Search and Investigations Exercise 1 - Investigate Your Microsoft 365 Data Exercise 2 - Configure and Deploy a Data Subject Request Module 15: Planning for Device Management Introduction to Co-management Preparing Your Windows 10 Devices for Co-management Transitioning from Configuration Manager to Intune Introduction to Microsoft Store for Business Planning for Mobile Application Management Module 16: Lab 7 - Implement the Microsoft Store for Business Exercise 1 - Configure the Microsoft Store for Business Exercise 2 - Manage the Microsoft Store for Business Module 17: Planning Your Windows 10 Deployment Strategy Windows 10 Deployment Scenarios Implementing Windows Autopilot Planning Your Windows 10 Subscription Activation Strategy Resolving Windows 10 Upgrade Errors Introduction to Windows Analytics Module 18: Implementing Mobile Device Management Planning Mobile Device Management Deploying Mobile Device Management Enrolling Devices to MDM Managing Device Compliance Module 19: Lab 8 - Manage Devices with Intune Exercise 1 - Enable Device Management Exercise 2 - Configure Azure AD for Intune Exercise 3 - Create Intune Policies Exercise 4 - Enroll a Windows 10 Device Exercise 5 - Manage and Monitor a Device in Intune TEST CERTIFICATION This course helps you to prepare for exam MS101. [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Hva menes med sikkerhet, hensikt med sikkerhet, tiltak som kan iverksettes for å oppnå tilsiktet sikkerhet, identifisering av inntrengere, passordsikkerhet, autentisering... [+]
  Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Gode IKT-kunnskaper og god kjennskap til drift av Windows server og prosesser i Windows operativsystem. Innleveringer: For å kunne gå opp til eksamen må 8 øvingsoppgaver være godkjent. Nærmere opplysninger gis ved kursstart Personlig veileder: ja Vurderingsform: Netteksamen på egen PC - 5 timer. Hver student skal bruke virtuelle maskiner under eksamen. Ansvarlig: Stein Meisingseth Eksamensdato: 10.12.13 / 13.05.14         Læremål: KUNNSKAPER: Kandidaten:- har innsikt i hvordan et nettverk kan sikres og hvordan man kan unngå at lokale maskiner, servere eller større nettverk kan bli hacket- kjenner til løsninger for å sikre små og store nettverk FERDIGHETER:Kandidaten:- kan forstå hensikten med å legge stor vekt på sikkerhet- skal kunne oppdage og identifisere inntrengere- skal kunne forhindre eksterne angrep- skal kunne forstå faren med interne angrep- skal kunne lage rutiner for gode passordrutiner, autentiseringssystemer og viruskontroll- forstår hvordan sikkerhet fungerer i Windows 7 og Windows 2008 server- bruker Group Policy til å sette tilpasset sikkerhet- skal kunne bruke og å konfigurere de interne brannmurer i Windows GENERELL KOMPETANSE:Kandidaten har:- perspektiv og kompetanse i å velge riktige løsninger for å oppnå maksimal og tilpasset sikkerhet- kompetanse i generelt sikkerhetsarbeid Innhold:Hva menes med sikkerhet, hensikt med sikkerhet, tiltak som kan iverksettes for å oppnå tilsiktet sikkerhet, identifisering av inntrengere, passordsikkerhet, autentiseringssystemer, viruskontroll, sikkerhet i Windows og 2008 servere, bruk av brannmuren til Windows server 2008, sette sikkerhet i Group Policy, brannvegger generelt, forhindre virus og inntrenging, tiltak for å forhindre angrep utenfra, digitale signaturer.Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Datasikkerhet 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Skadelig programvare: sikkerhetshull, informasjonskapsler, virus og antivirus Nettverk: Virtuelle private nett (VPN), brannmur, demilitarisert sone (DMZ), tjenestenektang... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Ingen. Innleveringer: For å kunne gå opp til eksamen må 8 av 12 øvinger være godkjent. Personlig veileder: ja Vurderingsform: Skriftlig, individuell, 3 timer,  Ansvarlig: Olav Skundberg Eksamensdato: 16.12.13 / 26.05.14         Læremål: KUNNSKAPER:Kandidaten kan:- forklare hvordan en datamaskin utsettes for angrep gjennom skadelig programvare og hvordan man kan beskytte seg mot dette- beskrive ulike typer nettbaserte angrep og hvordan man kan beskytte seg mot dette- beskrive ulike krypteringsmekanismer og forklare hvordan digitale sertifikat brukes for å oppnå sikre tjenester.- referere til aktuelle lover og retningslinjer innen sikkerhet- gjøre greie for en organisasjonsmessig informasjonssikkerhetssikkerhetspolicy FERDIGHETER:Kandidaten kan:- kontrollere egen PC for skadelig programvare- kontrollere at installert programvare er oppdatert- utføre pakkefangst med Wireshark og tolke resultatet GENERELL KOMPETANSE:Kandidaten:- er bevisst på å holde programvare oppdatert og å bruke nettvett Innhold:Skadelig programvare: sikkerhetshull, informasjonskapsler, virus og antivirus Nettverk: Virtuelle private nett (VPN), brannmur, demilitarisert sone (DMZ), tjenestenektangrep Sikre tjenester: Krypteringsmetoder og sjekksum. Digitale sertifikater og Public Key Infrastructure (PKI) Samfunn og virksomhet: ekom-loven og personvernloven. Sikkerhetshåndbok og ISO27001Les mer om faget herDemo: Her er en introduksjonsvideo for faget Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Internett og sikkerhet 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.  [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstilta... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: IFUD1012 Internett og sikkerhet Innleveringer: Øvinger: 3 av 5 må være godkjent. Vurderingsform: Skriftlig eksamen, 3 timer (60 %). Det gjennomføres 3 obligatoriske større øvingsarbeider gruppevis underveis i kurset. Disse får en midlertidig vurdering/tilbakemelding og kan deretter leveres på nytt til en samlet sluttvurdering som teller 40 % på karakteren. Ansvarlig: Ole Christian Eidheim Eksamensdato: 12.12.13 / 26.05.14         Læremål: Etter å ha gjennomført emnet Informasjonssikkerhetsstyring skal studenten ha følgende samlede læringsutbytter: KUNNSKAPER:Kandidaten:- kan gjøre rede for hva informasjonssikkerhet betyr for en bedrifts økonomi og omdømme- kan gjøre rede for hva standardene ISO 27001 og ISO 27002 inneholder og hvordan de benyttes i sikkerhetsarbeidet- kjenner til prinsippene i Demmings sirkel og kunne redegjøre for betydningen av disse for det kontinuerlige sikkerhetsarbeidet- kjenner til en trinnvis plan for innføring av et styringssystem for informasjonssikkerhet (ISMS) og kunne redegjøre for de kritiske suksessfaktorene i hver av fasene- kan redegjøre for forutsetninger og tiltak for å skape en sikkerhetskultur i en bedrift- kan redegjøre for den trinnvise prosessen frem mot sertifisering av et ISMS eller produkt- kan redegjøre for rollen til målinger og evalueringer i sikkerhetsarbeidet FERDIGHETER:Kandidaten kan:- kartlegge trusselbildet for en konkret bedrift- gjennomføre en risikoanalyse for en bedrift på en strukturert og systematisk måte- innføre tiltak for å redusere risikoverdien for kartlagte trusler som har for høy risikoverdi- velge og utarbeide relevante sikkerhetspolicyer for en konkret bedrift- utarbeide forslag til en organisasjonsstruktur for sikkerhetsarbeidet i en konkret bedrift- analysere behovet for sertifisering av ISMS for en konkret bedrift og gi anbefalinger om veien dit GENERELL KOMPETANSE:Kandidaten kan:- kommunisere med og forstå brukernes behov- involvere de ansatte i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med- involvere eksterne konsulenter i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med Innhold:Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstiltak, sikkerhetskultur, sikkerhet i informasjonssystemer, veien til sertifisering, måling og evaluering, kontinuerlig forbedringLes mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Informasjonssikkerhetsstyring 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Nettkurs 5 dager 16 500 kr
01 Jan
ISO/IEC 27001 Lead Implementer [+]
ISO/IEC 27001 Lead Implementer [-]
Les mer
Nettstudie Sentrum 1 dag 5 900 kr
09 Jan
Hvordan fylle rollen som personvernombud, og hva må du kunne. Ett kurs for deg som DPO og vil bli bedriftens kompetanse person på GDPR [+]
Personvernforordningen / General Data Protection Regulation (GDPR) Vi går gjennom de deler du må ha kompetanse om, og du får fyldig kursmateriale med deg hjem, slik at du enklere kan mester fagområdet etter kurset. Men på ettdagskurs er det ikke dybdegejnnomgang av områder som DPIA, teknologi og prosess rundt GAP planer. Du får alikevel med deg materiale så du kan lese etterpå. Hva er formålet med forordninga og hvordan forordningen er strukturert. Vi går gjennom  tilsynsmyndighet og hvilke innvirkninger den loven har på Norge, EU og andre land.  Du får kompetanse om hovedpunkter i forordningen med de viktige nøkkelkonsepter, kategorier for personlig informasjon og prinsipper for databeskyttelse. Den registrertes rettigheter og hvordan analyser utfordringer og problemer En viktig kompetanse som mange ikke kjenner godt nok er hvilke roller, forpliktelser og behandlingsaktiviteter som må mestres, så vi ser på personvernombudets betegnelser  Konsekvensanalyse av databeskyttelse og personvernombudet Behandlingsaktiviteter og personvernombudet  Kontrollers ansvar Personvernombudet sitt ansvarRegistrering av behandlingsaktiviteterSamarbeid med tilsynsmyndighetHvordan starte program for å etterleve personvernforordningenHvem må forholde seg til personvernforordningenMetoder og tilnærmingForbered program for personvernforordningenHvordan avdekke mangler  og i dentifiser strategiske målLedelsens ansvar og godkjenning [-]
Les mer
7 900 kr
ISO/IEC 27001 Introduction [+]
ISO/IEC 27001 Introduction [-]
Les mer
Oslo 4 dager 28 900 kr
24 Mar
24 Mar
10 Jun
Kubernetes Security Fundamentals (LFS460) [+]
Kubernetes Security Fundamentals (LFS460) [-]
Les mer
Sentrum 1 dag 8 500 kr
07 Jan
Dette éndagskurset gir ledere praktisk trening i cybersikkerhetsledelse, med fokus på strategisk IT-planlegging, risikohåndtering, og utvikling av effektive sikkerhetsrut... [+]
I en digital tidsalder hvor samhandling er essensielt for bedrifters suksess, er det kritisk for ledere å oppdatere sin kompetanse. Dette éndagskurset tilbyr praktisk trening og materiale for videre selvstudium, slik at ledere kan møte dagens databehov effektivt. Kurset fokuserer på tre hovedområder for å styrke deltakernes lederkompetanse innen datahåndtering. Det kombinerer teori og praksis for å maksimere læringen. Kurset avholdes på én arbeidsdag, med en strukturert agenda som dekker følgende temaer: Strategiske IT/IS-planer, inkludert organisatoriske strukturer, lederansvar, kompetansekartlegging, IT/IS-policyer, og en gjennomgang av IS-domener. Dette inkluderer også sikkerhetsaspekter som aktiva, nettverk, identitets- og tilgangsstyring, risikostyring, sikkerhetsvurdering og -testing, sikkerhetsoperasjoner, og sikkerhet i utviklingsfasen. Intern gapanalyse, oppbygging av en effektiv Enterprise Information Security Architecture (EISA), definering av opplæringskrav, tilpassede SETA-programmer, trusselvurdering, håndtering av sårbarheter, og en praktisk tilnærming til leverandørrisiko og sikkerhetsvurdering av digitale nettverk. Utvikling av KPI-dashboards, trusselvurdering, kommunikasjonsstrategier, introduksjon til økonomiske nøkkeltall innen informasjonssikkerhet, samt planlegging for forretningskontinuitet og katastrofegjenoppretting. Målsettingen er at hver deltaker etter kurset skal kunne sette SMART-mål for hvert punkt, hvor SMART representerer Spesifikke, Målbare, Oppnåelige, Relevante og Tidsbestemte mål. Kurset gir deltakerne verktøyene de trenger for å forbedre sitt lederskap i en digitalisert verden. Kursholder har jobbet med informasjonssikkerhet for ledende teknologiselskaper de siste 25 årene, og har hjulpet ledere finne farbare veier i krevende situasjoner. Han er sertifisert kvalitetsrevisor ISO 19011 og har utarbeidet sikkerhetsstyringsrutiner for selskaper som følger både enkle og svært strenge lovkrav. Han har en Ph.D. i Cybersecurity Leadership, en MBA innen Finans, Digital transformasjon, Forretningsstrategi, Kommunikasjon og Markedsføring. Han er sertifisert i Advanced Computer Security fra Stanford University og Cyber Forensics and Counterterrorism fra Harvard University. Han har også CISSP fra ISC2, Certified Data Privacy Solution Engineer fra ISACA, og CCSK (Certificate of Cloud Security Knowledge) fra CSA. I tillegg har han gjennomført NHH sitt styreprogram, som utgjør en relevant bakgrunn for dette kurset. Til daglig jobber han som CISO for et selskap med lokasjoner på 24 steder over hele verden. Selskapet må både sikre trygg drift og utvikle programvare og tjenester som må være i drift 24/7. [-]
Les mer
Oslo 5 dager 39 500 kr
24 Feb
24 Feb
19 May
CCSP: Certified Cloud Security Professional [+]
CCSP: Certified Cloud Security Professional [-]
Les mer
Bedriftsintern 1 dag
Hvordan personvernreglene implementeres i ledelsessystemet iht. ISO 9001 og/eller ISO 45001 [+]
EU’s personvernregelverk, som ble innført i 2018, fører fremdeles til en del usikkerhet rundt hva kravene betyr i praksis for kvalitetssystemet.  Hvorfor gå dette kurset? Få oversikten i løpet av én dag Bli trygg på at du har fått med deg det du må om regelverket Unngå kostbare misforståelser Utveksle erfaringer med andre deltakere Etter gjennomført kurs skal du ha kunnskap om: De viktigste kravene i GDPR Hvordan ledelsessystem for kvalitet og arbeidsmiljø tilpasses for å sikre at kravene i GDPR er riktig implementert Risiko i forhold til personopplysninger Revisjon av håndtering av personopplysninger   [-]
Les mer
Klasserom + nettkurs 4 dager 21 000 kr
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. COURSE OBJECTIVES After you complete this course you will be able to: Use administrative techniques and tools in Windows Server. Identify tools used to implement hybrid solutions, including Windows Admin Center and PowerShell. Implement identity services in Windows Server. Implement identity in hybrid scenarios, including Azure AD DS on Azure IaaS and managed AD DS. Integrate Azure AD DS with Azure AD. Manage network infrastructure services. Deploy Azure VMs running Windows Server, and configure networking and storage. Administer and manage Windows Server IaaS Virtual Machine remotely. Manage and maintain Azure VMs running Windows Server. Configure file servers and storage. Implement File Services in hybrid scenarios, using Azure Files and Azure File Sync. COURSE CONTENT Module 1: Identity services in Windows Server This module introduces identity services and describes Active Directory Domain Services (AD DS) in a Windows Server environment. The module describes how to deploy domain controllers in AD DS, as well as Azure Active Directory (AD) and the benefits of integrating Azure AD with AD DS. The module also covers Group Policy basics and how to configure group policy objects (GPOs) in a domain environment. Lessons for module 1 Introduction to AD DS Manage AD DS domain controllers and FSMO roles Implement Group Policy Objects Manage advanced features of AD DS Lab : Implementing identity services and Group Policy Deploying a new domain controller on Server Core Configuring Group Policy After completing module 1, students will be able to: Describe AD DS in a Windows Server environment. Deploy domain controllers in AD DS. Describe Azure AD and benefits of integrating Azure AD with AD DS. Explain Group Policy basics and configure GPOs in a domain environment. Module 2: Implementing identity in hybrid scenarios This module discusses how to configure an Azure environment so that Windows IaaS workloads requiring Active Directory are supported. The module also covers integration of on-premises Active Directory Domain Services (AD DS) environment into Azure. Finally, the module explains how to extend an existing Active Directory environment into Azure by placing IaaS VMs configured as domain controllers onto a specially configured Azure virtual network (VNet) subnet. Lessons for module 2 Implement hybrid identity with Windows Server Deploy and manage Azure IaaS Active Directory domain controllers in Azure Lab : Implementing integration between AD DS and Azure AD Preparing Azure AD for AD DS integration Preparing on-premises AD DS for Azure AD integration Downloading, installing, and configuring Azure AD Connect Verifying integration between AD DS and Azure AD Implementing Azure AD integration features in AD DS After completing module 2, students will be able to: Integrate on-premises Active Directory Domain Services (AD DS) environment into Azure. Install and configure directory synchronization using Azure AD Connect. Implement and configure Azure AD DS. Implement Seamless Single Sign-on (SSO). Implement and configure Azure AD DS. Install a new AD DS forest on an Azure VNet. Module 3: Windows Server administration This module describes how to implement the principle of least privilege through Privileged Access Workstation (PAW) and Just Enough Administration (JEA). The module also highlights several common Windows Server administration tools, such as Windows Admin Center, Server Manager, and PowerShell. This module also describes the post-installation confguration process and tools available to use for this process, such as sconfig and Desired State Configuration (DSC). Lessons for module 3 Perform Windows Server secure administration Describe Windows Server administration tools Perform post-installation configuration of Windows Server Just Enough Administration in Windows Server Lab : Managing Windows Server Implementing and using remote server administration After completing module 3, students will be able to: Explain least privilege administrative models. Decide when to use privileged access workstations. Select the most appropriate Windows Server administration tool for a given situation. Apply different methods to perform post-installation configuration of Windows Server. Constrain privileged administrative operations by using Just Enough Administration (JEA). Module 4: Facilitating hybrid management This module covers tools that facilitate managing Windows IaaS VMs remotely. The module also covers how to use Azure Arc with on-premises server instances, how to deploy Azure policies with Azure Arc, and how to use role-based access control (RBAC) to restrict access to Log Analytics data. Lessons for module 4 Administer and manage Windows Server IaaS virtual machines remotely Manage hybrid workloads with Azure Arc Lab : Using Windows Admin Center in hybrid scenarios Provisioning Azure VMs running Windows Server Implementing hybrid connectivity by using the Azure Network Adapter Deploying Windows Admin Center gateway in Azure Verifying functionality of the Windows Admin Center gateway in Azure After completing module 4, students will be able to: Select appropriate tools and techniques to manage Windows IaaS VMs remotely. Explain how to onboard on-premises Windows Server instances in Azure Arc. Connect hybrid machines to Azure from the Azure portal. Use Azure Arc to manage devices. Restrict access using RBAC. Module 5: Hyper-V virtualization in Windows Server This modules describes how to implement and configure Hyper-V VMs and containers. The module covers key features of Hyper-V in Windows Server, describes VM settings, and how to configure VMs in Hyper-V. The module also covers security technologies used with virtualization, such as shielded VMs, Host Guardian Service, admin-trusted and TPM-trusted attestation, and Key Protection Service (KPS). Finally, this module covers how to run containers and container workloads, and how to orchestrate container workloads on Windows Server using Kubernetes. Lessons for module 5 Configure and manage Hyper-V Configure and manage Hyper-V virtual machines Secure Hyper-V workloads Run containers on Windows Server Orchestrate containers on Windows Server using Kubernetes Lab : Implementing and configuring virtualization in Windows Server Creating and configuring VMs Installing and configuring containers After completing module 5, students will be able to: Install and configure Hyper-V on Windows Server. Configure and manage Hyper-V virtual machines. Use Host Guardian Service to protect virtual machines. Create and deploy shielded virtual machines. Configure and manage container workloads. Orchestrate container workloads using a Kubernetes cluster. Module 6: Deploying and configuring Azure VMs This module describes Azure compute and storage in relation to Azure VMs, and how to deploy Azure VMs by using the Azure portal, Azure CLI, or templates. The module also explains how to create new VMs from generalized images and use Azure Image Builder templates to create and manage images in Azure. Finally, this module describes how to deploy Desired State Configuration (DSC) extensions, implement those extensions to remediate noncompliant servers, and use custom script extensions. Lessons for module 6 Plan and deploy Windows Server IaaS virtual machines Customize Windows Server IaaS virtual machine images Automate the configuration of Windows Server IaaS virtual machines Lab : Deploying and configuring Windows Server on Azure VMs Authoring Azure Resource Manager (ARM) templates for Azure VM deployment Modifying ARM templates to include VM extension-based configuration Deploying Azure VMs running Windows Server by using ARM templates Configuring administrative access to Azure VMs running Windows Server Configuring Windows Server security in Azure VMs After completing module 6, students will be able to: Create a VM from the Azure portal and from Azure Cloud Shell. Deploy Azure VMs by using templates. Automate the configuration of Windows Server IaaS VMs. Detect and remediate noncompliant servers. Create new VMs from generalized images. Use Azure Image Builder templates to create and manage images in Azure. Module 7: Network infrastructure services in Windows Server This module describes how to implement core network infrastructure services in Windows Server, such as DHCP and DNS. This module also covers how to implement IP address managment and how to use Remote Access Services. Lessons for module 7 Deploy and manage DHCP Implement Windows Server DNS Implement IP address management Implement remote access Lab : Implementing and configuring network infrastructure services in Windows Server Deploying and configuring DHCP Deploying and configuring DNS After completing module 7, students will be able to: Implement automatic IP configuration with DHCP in Windows Server. Deploy and configure name resolution with Windows Server DNS. Implement IPAM to manage an organization’s DHCP and DNS servers, and IP address space. Select, use, and manage remote access components. Implement Web Application Proxy (WAP) as a reverse proxy for internal web applications. Module 8: Implementing hybrid networking infrastructure This module describes how to connect an on-premises environment to Azure and how to configure DNS for Windows Server IaaS virtual machines. The module covers how to choose the appropriate DNS solution for your organization’s needs, and run a DNS server in a Windows Server Azure IaaS VM. Finally, this module covers how to manage manage Microsoft Azure virtual networks (VNets) and IP address configuration for Windows Server infrastructure as a service (IaaS) virtual machines. Lessons for module 8 Implement hybrid network infrastructure Implement DNS for Windows Server IaaS VMs Implement Windows Server IaaS VM IP addressing and routing Lab : Implementing Windows Server IaaS VM networking Implementing virtual network routing in Azure Implementing DNS name resolution in Azure After completing module 8, students will be able to: Implement an Azure virtual private network (VPN). Configure DNS for Windows Server IaaS VMs. Run a DNS server in a Windows Server Azure IaaS VM. Create a route-based VPN gateway using the Azure portal. Implement Azure ExpressRoute. Implement an Azure wide area network (WAN). Manage Microsoft Azure virtual networks (VNets). Manage IP address configuration for Windows Server IaaS virtual machines (VMs). Module 9: File servers and storage management in Windows Server This module covers the core functionality and use cases of file server and storage management technologies in Windows Server. The module discusses how to configure and manage the Windows File Server role, and how to use Storage Spaces and Storage Spaces Direct. This module also covers replication of volumes between servers or clusters using Storage Replica. Lessons for module 9 Manage Windows Server file servers Implement Storage Spaces and Storage Spaces Direct Implement Windows Server Data Deduplication Implement Windows Server iSCSI Implement Windows Server Storage Replica Lab : Implementing storage solutions in Windows Server Implementing Data Deduplication Configuring iSCSI storage Configuring redundant Storage Spaces Implementing Storage Spaces Direct After completing module 9, students will be able to: Configure and manage the Windows Server File Server role. Protect data from drive failures using Storage Spaces. Increase scalability and performance of storage management using Storage Spaces Direct. Optimize disk utilization using Data DeDuplication. Configure high availability for iSCSI. Enable replication of volumes between clusters using Storage Replica. Use Storage Replica to provide resiliency for data hosted on Windows Servers volumes. Module 10: Implementing a hybrid file server infrastructure This module introduces Azure file services and how to configure connectivity to Azure Files. The module also covers how to deploy and implement Azure File Sync to cache Azure file shares on an on-premises Windows Server file server. This module also describes how to manage cloud tiering and how to migrate from DFSR to Azure File Sync. Lessons for module 10 Overview of Azure file services Implementing Azure File Sync Lab : Implementing Azure File Sync Implementing DFS Replication in your on-premises environment Creating and configuring a sync group Replacing DFS Replication with File Sync–based replication Verifying replication and enabling cloud tiering Troubleshooting replication issues After completing module 10, students will be able to: Configure Azure file services. Configure connectivity to Azure file services. Implement Azure File Sync. Deploy Azure File Sync Manage cloud tiering. Migrate from DFSR to Azure File Sync.   [-]
Les mer
5 dager 25 500 kr
MS-500: Microsoft 365 Security Administrator [+]
MS-500: Microsoft 365 Security Administrator [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course covers three central elements of Microsoft 365 enterprise administration: Microsoft 365 tenant and service management, Office 365 management, and Microsoft 36... [+]
COURSE OVERVIEW  In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management. This begins with an overview of Office 365 product functionality, including Exchange Online, SharePoint Online, Microsoft Teams, additional product resources, and device management. You will then transition to configuring Office 365, with a primary focus on configuring Office client connectivity to Office 365. Finally, you will examine how to manage Office 365 ProPlus deployments, from user-driven client installations to centralized Office 365 ProPlus deployments. You will wrap up this section by learning how to configure Office Telemetry and Microsoft Analytics. The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multi-factor authentication and self-service password management. This section wraps up with a comprehensive look at implementing application and external access. You will learn how to add and manage applications in Azure Active Directory, including how to configure multi-tenant applications. You will then examine how to configure Azure AD Application Proxy, including how to install and register a connector and how to publish an on-premises app for remote access. Finally, you will examine how to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration. TARGET AUDIENCE This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths. COURSE OBJECTIVES Designing, configuring, and managing your Microsoft 365 tenant Office 365 product functionality Configuring Office 365 Managing Office 365 ProPlus deployments Planning and implementing identity synchronization Implementing application and external access COURSE CONTENT Module 1: Designing Your Microsoft 365 Tenant Planning Microsoft 365 in your On-premises Infrastructure Planning Your Identity and Authentication Solution Planning Your Service Setup Planning Your Hybrid Enviroment Planning Your Migration to Office 365 Module 2: Configuring Your Microsoft 365 Tenant Planning  Your Microsoft 365 Experience Configuring  Your Microsoft 365 Experience Managing User Accounts and Licenses in Microsoft 365 Managing Security Groups in Microsoft 365 Implementing Your Domain Services Leveraging FastTrack and Partner Services Module 3: Lab 1 - Configuring your Microsoft 365 Tenant Exercise 1 - Set up a Microsoft 365 Trial Tenant Module 4: Managing Your Microsoft 365 Tenant Configuring Tenant Roles Managing Tenant Health and Services Module 5: Lab 2 - Managing your Microsoft 365 Tenant Exercise 1 - Manage Administration Delegation Exercise 2 - Configure Office 365 Message Encryption (OME) Exercise 3 - Monitor and Troubleshoot Office 365 Module 6: Office 365 Overview Exchange Online Overview SharePoint Online Overview Teams Overview Additional Resources Overview Device Management Overview Module 7: Lab 3 - Office 365 Overview Exercise 1 - Exchange Online Overview Exercise 2 - SharePoint Online Overview Exercise 3 - Teams Overview Module 8: Configuring  Office 365 Office 365 Client Overview Configuring Office Client Connectivity to Office 365 Module 9: Managing Office 365 ProPlus Deployments Managing User-Driven Client Installations Managing Centralized Office 365 ProPlus Deployments Configuring Office Telemetry Configuring Microsoft Analytics Module 10: Lab 4 - Managing Office 365 ProPlus installations Exercise 1 - Prepare an Office 365 ProPlus Managed Installation Exercise 2 - Manage a Centralized Office 365 ProPlus Installation Exercise 3 - Deploy and Configure Office Telemetry Components Module 11: Planning and Implementing Identity Synchronization Introduction to Identity Synchronization Planning for Azure AD Connect Implementing Azure AD Connect Managing Synchronized Identities Password Management in Microsoft 365 Module 12: Lab 5 - Implementing Identity Synchronization Exercise 1 - Set up your organization for identity synchronization Exercise 2 - Implement Identity Synchronization Module 13: Implementing Application and External Access Implementing Applications in Azure AD Configuring Azure AD App Proxy Designing Solutions for External Access TEST CERTIFICATION This course helps you to prepare for exam MS100. But as this is part of an expert certification you should already own one of the Microsoft 365 Associate certifications:  Modern Desktop Teamwork Administrator Security Administrator Messaging Administrator. [-]
Les mer