AZ-305 Designing Microsoft Azure Infrastructure with SIMS!
- Descrição
- Currículo
- FAQ
- Revisões
We really hope you’ll agree, this training is way more than the average course on Udemy!
Have access to the following:
-
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
-
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
-
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
-
Welcome to the course
-
Understanding the Microsoft Environment
-
Having a Solid Foundation of Active Directory Domains
-
Having a Solid Foundation of RAS, DMZ, and Virtualization
-
Having a Solid Foundation of the Microsoft Cloud Services
-
Order of concepts covered in the course
-
Questions for John Christopher
Setting up for hands on
-
IMPORTANT Using Assignments in the course
-
Creating a trial Microsoft 365/Azure Account
-
Adding a subscription to your Azure account
-
Creating some resources to use in the course
Design a solution for logging and monitoring
-
Starting content for AZ-305
-
Designing log routing based on the appropriate level of logging
-
Using the appropriate level of metric logging in Azure monitor
-
Log routing using a log analytics workspace
-
Setting up an alert strategy in Azure monitor
-
Using insights in Azure monitor
-
Using the Azure Advisor for strengthening your environment
-
Implementing a solution for DDos protection
Design authentication and authorization solutions
-
Authorization in the Microsoft cloud service environment
-
Clarifying role-based access control (RBAC) in Azure
-
Implementing a solution for role-based access control in Azure
-
Role-based access control concepts with Privileged Identity Management (PIM)
-
Using PIM to manage role-based access control in Azure
-
Identity management for guests using access reviews in Azure
Design governance
-
Organizational and hierarchical structure for Azure resources with scopes
-
Identity management by utilizing access management groups
-
Organizational management with administrative units
-
Utilizing defender for cloud to strengthen administrative governance
-
Using Microsoft Defender for Cloud to locate vulnerabilities in Azure
Design identities and access for applications
-
Identity and application access with zero trust concepts
-
Azure Key Vault access control
-
Generating Azure Key Vault keys, secrets & certificates for use with app & more
-
Key rotation with Azure Key Vaults
-
Visualizing application access registration concepts with Azure AD
-
Configuring an application registration with Azure AD, part of Microsoft Entra
-
Using an Azure app proxy for allowing application access through Azure
-
Exploring the configuration of an Azure application proxy
-
Removing un-needed resources before starting the next lesson
Design a data storage solution for relational data
-
Understanding the role storage accounts play as a storage solution
-
Adding a storage account for use in Azure
-
Configuring network access to storage accounts
-
Configuring a storage account for Azure AD authentication
-
Working with access keys on a storage account
-
Using shared access signature (SAS) tokens in regards to storage accounts
-
Implementing stored access policies
-
Understanding the use of storage redundancy in Azure
-
Implementing storage redundancy in Azure
-
Performing object replication
-
Managing Azure file shares and storage tiers
-
Working with Blob storage management
-
Blob lifecycle management with Azure storage
-
Understanding relational databases
-
Understanding database service tier sizing
-
Visualizing solutions for database scalability
Design data integration
-
Creating an Azure VM with SQL as a relational data storage solution
-
Assigning a Public Azure DNS name to your Azure SQL VM
-
Using SSMS (SQL Server Management Studio) to connect to an Azure SQL VM solution
-
Removing the un-needed SQL resources
-
Providing a solution for relational data using the Azure SQL databases resource
-
Managing client connections with the SQL firewall settings
-
Implementing database auditing
Recommend a data storage solution
-
Relational, semi-structured, and non-relational data storage solutions in Azure
-
Configuring a solution for data authentication
-
Utilizing Azure SQL dynamic masking
-
Implementing database encryption
-
Removing existing objects
-
Enabling Microsoft Defender for SQL
Design a data storage solution for non-relational data
-
Understanding non-relational data and NoSQL
-
Capacity planning to balance features, performance, and cost
-
Implementing a non-relational Cosmos database solution in Azure
-
Creating a container for non-relational data storage
-
Using replication for protection and durability
-
Understanding data lake storage
-
How to create a data lake storage account
-
Understanding Azure Databrick Storage
-
Visualizing the use of Azure Synapse
-
Registering Synapse as a resource provider
-
Adding a SQL DB and server for use with Synapse
-
Creating a Synapse workspace and Data Lake Storage account
-
SQL Pool usage with Azure Synapse
-
Creating a SQL Pool for usage with Azure Synapse
-
Understanding the Azure Data Factory
-
Setting up an Azure Data Factory resources
-
Using Azure Data Factory copying data into Azure Synapse Analytics
-
Removing data storage resources that are no longer needed
Design a solution for backup and disaster recovery
-
Recovery Time Objective [RTO], Recovery Level Objective [RLO], Recovery Point Objective [RPO]
-
Backup and recovery solutions using a Recovery Services Vault
-
Backup policies for Recovery Time Objectives [RTO] & Recovery Point Object [RPO]
-
Implementing Azure backup for storage and compute resources
-
Viewing reporting data involving Azure backup and recovery
Design for high availability
-
Using availability zones as a high availability solution in Azure
-
Design concepts for Azure Site Recovery
-
Azure Site Recovery networking
-
Understanding recovery plans
-
Implementing a high availability solution for VM compute resources
-
Testing a failover high availability solution for VM compute resources
-
Creating a second storage account for storage high availability
-
Replicating data storage to provide high availability
Design a compute solution
-
Understanding Windows 365 and Azure Virtual Desktop as a computer based solution
-
Host pool architectures with Azure Virtual Desktop compute solutions
-
Understanding the container-based compute solution in Azure
-
Implementing a container-based compute solution in Azure
-
Using container groups to help manage multiple container-based computer solutions
-
Using Azure Kubernetes Service (AKS) compute solutions
-
Azure Kubernetes Service scaling
Design an application architecture
-
Recommend Azure messaging and event-driven architecture options
-
Installing Microsoft Visual Studio for application development
-
Setting up Azure DevOps for application development and management
-
Creating a DevOps project and assigning tasks
-
Using Visual Studios to upload an application project to Azure DevOps
-
Creating a pipeline for a DevOps application
-
Committing application changes through the pipeline with Visual Studios
-
Introduction to deploying a DevOps application to an App Service
-
Understanding App Service Plans for deploying web applications
-
App Service Plan deployment in Azure
-
Implementing App Service plan scaling
-
Creating an App Service deployment
-
Network configuration within App Services
-
App Service deployment configuration management settings
-
Utilizing custom domain names with an Azure App Service
-
Performing backups for an App Service deployment
-
API Management and integration in Azure
Design migrations
-
Visualizing migration solutions for storage, VMs, and databases to Azure
-
Using import and export jobs for data migrations
-
Migrating data with storage explorer and azcopy
-
Setup a SQL Server to migrate data from
-
Setup an Azure SQL Database as our migration destination
-
Adding a table of data to migrate
-
Installing Azure Data Studio and the Azure SQL Migration plugin needed for migration
-
Migrating SQL data from a source SQL service to a destination SQL service
-
Clearing resources before moving on
Design network solutions
-
Plan and implement network segmentation and address spaces
-
Creating VNets based on network architecture workload requirements
-
Providing a connectivity solution with peering
-
Planning subnets for Azure resource connectivity workload requirements
-
Implementing subnet delegation for supporting various Azure resource workloads
-
Using prefixes with public IP addresses in Azure network architecture
-
Recommending when its appropriate to use public IP address prefixes
-
Planning a custom public IP address prefix (bring your own IP) solution in Azure
-
Allocating an address from a public IP address prefix to support workload requirements
-
Associating an address from a public IP address prefix to an Azure resource
-
Understanding how NSGs and ASGs help optimize network security in Azure
-
How an Azure Firewall can help optimize network security
-
Deploy an Azure Firewall and route table to optimize network security
-
Cleaning up existing networking resources
-
Understanding usages for Azure load balancing solutions
-
Use cases for Azure load balancers
-
Setting up a load balancing solution for VMs to host web applications
-
Verifying health probes for proper load balancing traffic routing
-
1Welcome to the course!Vídeo Aula
-
2Understanding the Microsoft EnvironmentVídeo Aula
-
3Having a Solid Foundation of Active Directory DomainsVídeo Aula
-
4Having a Solid Foundation of RAS, DMZ, and VirtualizationVídeo Aula
-
5Having a Solid Foundation of the Microsoft Cloud ServicesVídeo Aula
-
6DO NOT SKIP: Azure AD is being renamedVídeo Aula
-
7Order of concepts covered in the courseVídeo Aula
-
8Questions for John ChristopherVídeo Aula
-
9Certificate of CompletionVídeo Aula
-
15Starting content for AZ-305Vídeo Aula
-
16Designing log routing based on the appropriate level of loggingVídeo Aula
-
17Using the appropriate level of metric logging in Azure monitorVídeo Aula
-
18Log routing using a log analytics workspaceVídeo Aula
-
19Setting up an alert strategy in Azure monitorVídeo Aula
-
20Using insights in Azure monitorVídeo Aula
-
21Using the Azure Advisor for strengthening your environmentVídeo Aula
-
22Implementing a solution for DDoS protectionVídeo Aula
-
23SIMULATIONS: Create an alert for examlabpracticejc that monitors transactionsTexto
-
24DONT SKIP: Redoing simulations in the courseVídeo Aula
-
25Authorization in the Microsoft cloud service environmentVídeo Aula
-
26Clarifying role-based access control (RBAC) in AzureVídeo Aula
-
27Implementing a solution for role-based access control in AzureVídeo Aula
-
28Creating custom role-based access control (RBAC) roles in AzureVídeo Aula
-
29Managing resource permissions with role-based access control (RBAC) in AzureVídeo Aula
-
30Role-based access control concepts with Privileged Identity Management (PIM)Vídeo Aula
-
31Using PIM to manage role-based access control in AzureVídeo Aula
-
32Identity management for guests using access reviews in AzureVídeo Aula
-
33SIMULATION: Assign Adam Young the Helpdesk Administrator...Texto
-
34Organizational and hierarchical structure for Azure resources with scopesVídeo Aula
-
35Identity management by utilizing access management groupsVídeo Aula
-
36Organizational management with administrative unitsVídeo Aula
-
37Utilizing defender for cloud to strengthen administrative governanceVídeo Aula
-
38Using Microsoft Defender for Cloud to locate vulnerabilities in AzureVídeo Aula
-
39SIMULATION: Create an admin unit called New York.Texto
-
40Identity and application access with zero trust conceptsVídeo Aula
-
41Azure Key Vault access controlVídeo Aula
-
42Generating Azure Key Vault keys, secrets & certificates for use with app & moreVídeo Aula
-
43Key rotation with Azure Key VaultsVídeo Aula
-
44Visualizing application access registration concepts with Azure ADVídeo Aula
-
45Configuring an application registration with Azure AD, part of Microsoft EntraVídeo Aula
-
46Using an Azure app proxy for allowing application access through AzureVídeo Aula
-
47Exploring the configuration of an Azure application proxyVídeo Aula
-
48Removing un-needed resources before starting the next lessonVídeo Aula
-
49SIMULATION: Create an Azure Key Vault. Generate a 2048 bit keyTexto
-
50SIMULATION: Use Azure AD App Registrations to setup an app called App2.Texto
-
51Understanding the role storage accounts play as a storage solutionVídeo Aula
-
52Adding a storage account for use in AzureVídeo Aula
-
53Configuring network access to storage accountsVídeo Aula
-
54Configuring a storage account for Azure AD authenticationVídeo Aula
-
55Working with access keys on a storage accountVídeo Aula
-
56Using shared access signature (SAS) tokens in regards to storage accountsVídeo Aula
-
57Implementing stored access policiesVídeo Aula
-
58Understanding the use of storage redundancy in AzureVídeo Aula
-
59Implementing storage redundancy in AzureVídeo Aula
-
60Performing object replicationVídeo Aula
-
61Managing Azure file shares and storage tiersVídeo Aula
-
62Working with Blob storage managementVídeo Aula
-
63Blob lifecycle management with Azure storageVídeo Aula
-
64Understanding relational databasesVídeo Aula
-
65Understanding database service tier sizingVídeo Aula
-
66Visualizing solutions for database scalabilityVídeo Aula
-
67SIMULATION: Create a storage account that uses LRS. Then create a blob containerTexto
-
68SIMULATION: Open "mystorageelp" & create a lifecycle to 30 cool, 180 archive.Texto
-
69Creating an Azure VM with SQL as a relational data storage solutionVídeo Aula
-
70Assigning a Public Azure DNS name to your Azure SQL VMVídeo Aula
-
71Using SSMS (SQL Server Management Studio) to connect to an Azure SQL VM solutionVídeo Aula
-
72Removing the un-needed SQL resourcesVídeo Aula
-
73Providing a solution for relational data using the Azure SQL databases resourceVídeo Aula
-
74Managing client connections with the SQL firewall settingsVídeo Aula
-
75Implementing database auditingVídeo Aula
-
76SIMULATION: Edit your SQL Server firewall settings to allow 68.76.92.12.Texto
-
77Relational, semi-structured, and non-relational data storage solutions in AzureVídeo Aula
-
78Configuring a solution for data authenticationVídeo Aula
-
79Utilizing Azure SQL dynamic maskingVídeo Aula
-
80Implementing database encryptionVídeo Aula
-
81Removing existing objectsVídeo Aula
-
82Enabling Microsoft Defender for SQLVídeo Aula
-
83SIMULATION: Enable Microsoft Defender for Servers and Microsoft Defender for SQLTexto
