AZ-104T00 Microsoft Azure Administrator


This course teaches IT professionals how to manage their Azure subscriptions, protect identities, manage infrastructure, configure virtual networks, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, deploy web applications and containers. , back up and share data, and monitor your solution.

Addressed to

  • This course is intended for Azure administrators. The Azure administrator deploys, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure administrator will provision, size, monitor, and tune resources as appropriate


28 hours


  • Face-to-face

  • Virtual live through digital platforms

  • on site

Related Courses

  • Course AZ-900T00-A: Microsoft Azure Fundamentals

  • AZ-204T00: Development of solutions for Microsoft Azure

It includes

  • 28 hours of training

  • Trained instructors

  • Participant manual in digital format

  • Proof of participation


Lesson 1: Identity

  • Azure Active Directory

  • Users and groups

Lab : Manage Azure Active Directory Identities

Lesson 2: Governance and Compliance

  • Subscriptions and accounts

  • Azure Policy

  • Role Based Access Control (RBAC)

Lab : Manage Subscriptions and RBAC

Lab : Manage governance through Azure policy

Lesson 3: Azure Administration

  • Azure Resource Manager

  • Azure administrator tools

  • ARM Templates

Lab : Manage Azure Resources Using ARM Templates

Lab : Manage Azure Resources Using Azure PowerShell (Optional)

Lab : Manage Azure Resources Using the Azure CLI (Optional)

Lab : Manage Azure resources using the Azure Portal

Lesson 4: Virtual Networks

  • virtual networks

  • network security groups

  • Azure Firewall

  • Azure DNS

Lab : Implement Virtual Networks

Lesson 5: Connectivity Between Sites

  • Virtual Network Peering

  • VPN gateway connections

  • ExpressRoute and Virtual WAN

Lab : Implement Connectivity Between Sites

Lesson 6: Network Traffic Management

  • Network routing and endpoints

  • Azure load balancer

  • Azure Application Gateway

Lab: Implement Traffic Management

Lesson 7: Azure Storage

  • storage accounts

  • blob storage

  • storage security

  • Azure Files and File Sync

  • Manage storage

Lab : Manage Azure Storage

Lesson 8: Azure Virtual Machines

  • Virtual machine planning

  • Creating Virtual Machines

  • Availability of the virtual machine

  • Virtual machine extensions

Lab : Manage Virtual Machines

Lesson 9: PaaS Compute Options

  • Azure App Service plans

  • Azure App Service

  • container services

  • Azure Kubernetes Service

You want more information about this curse? Contact us!

By sending this message you agree to our Privacy Notice


Renewable Energy

What is it?

We offer specialized services of photovoltaic solar energy that is obtained directly from solar radiation through a solar panel that in turn transforms it into electric power.

Who is it for?

All those companies, businesses and homes that want to reduce costs in their day to day and want to have a sustainability plan to support the environment as well as their economy.

Why us?

1.- Support from a team committed to the environment.
2.- GSB will provide you with the best solution according to your needs
3.- Control and monitoring as well as operation reports, maintenance of preventive and corrective equipment.


What is it?

We offer specialized services in Cyber ​​​​Security in real time with the best tools, alliances and technology for the protection of your information and operation.

Who is it for?

All those companies that use technology on a daily basis and wish to have the guarantee of a team with vast experience, knowledge, kindness, efficiency and speed.

Why us?

1.- We identify your needs and proceed to define the required actions, through the use of analysis tools such as: diagnostic interviews, concept tests, simulators and questionnaires.

2.- We have the best specialists in the market, which allows us to provide you with a service that guarantees your protection against threats.

3.- We implement processes that allow timely feedback, through which we manage to mitigate risks and protect the computer security of your company.