AZ-204T00 Developing Solutions for Microsoft Azure


This course teaches developers how to build end-to-end solutions on Microsoft Azure. Students will learn to implement Azure compute solutions, create Azure functions, deploy and manage web applications, develop solutions using Azure storage, implement authentication and authorization, and secure their solutions using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure and third-party services, and include message and event-driven models in their solutions. The course also covers monitoring, troubleshooting, and optimization of Azure solutions.

Addressed to

  • Students in this course are interested in Azure development or passing the Microsoft Azure Developer Associate certification exam.


35 hours


  • Face-to-face

  • Virtual live through digital platforms

  • on site

Related Courses

  • Course AZ-900T00-A: Microsoft Azure Fundamentals

  • AZ-104T00—Microsoft Azure Administrator

It includes

  • 35 hours of training

  • Trained instructors

  • Participant manual in digital format

  • Proof of participation


Lesson 1: Create Azure App Service web apps

  • Explore Azure App Service

  • Configure web app settings

  • Scale apps in Azure App Service

  • Explore Azure App Service deployment slots

Lesson 2: Implement Azure Functions

  • Explore Azure features

  • Develop Azure Functions

  • Implement Durable Features

Lesson 3: Develop Solutions That Use Blob Storage

  • Explore Azure Blob Storage

  • Manage the lifecycle of Azure Blob storage

  • Work with Azure Blob Storage

Lesson 4: Develop solutions that use Azure Cosmos DB

  • Explore Azure Cosmos DB

  • Implement partitions in Azure Cosmos DB

  • Work with Azure Cosmos DB

Lesson 5: Implement infrastructure-as-a-service solutions

  • Provision virtual machines in Azure

  • Create and deploy Azure Resource Manager templates

  • Manage container images in Azure Container Registry

  • Run container images on Azure Container Instances

Lesson 6: Implement User Authentication and Authorization

  • Explore the Microsoft identity platform

  • Implement authentication using the Microsoft Authentication Library

  • Implement shared access signatures

  • Explore Microsoft Graph

Lesson 7: Implement Secure Cloud Solutions

  • Deploy Azure Key Vault

  • Implement managed identities

  • Deploy Azure app configuration

Lesson 8: Implement API Management

  • Explore API management

Lesson 9: Develop Event-Based Solutions

  • Explore Azure Event Grid

  • Explore Azure Event Hubs

Lesson 10: Develop Message-Based Solutions

  • Discover Azure message queues

Lesson 11: Instrument Solutions to Support Monitoring and Logging

  • Monitor application performance

Lesson 12: Integrate Caching and Content Delivery Within Solutions

  • Develop for Azure Cache for Redis

  • Develop for CDN storage

You want more information about this curse? Contact us!

By sending this message you agree to our Privacy Notice


Renewable Energy

What is it?

We offer specialized services of photovoltaic solar energy that is obtained directly from solar radiation through a solar panel that in turn transforms it into electric power.

Who is it for?

All those companies, businesses and homes that want to reduce costs in their day to day and want to have a sustainability plan to support the environment as well as their economy.

Why us?

1.- Support from a team committed to the environment.
2.- GSB will provide you with the best solution according to your needs
3.- Control and monitoring as well as operation reports, maintenance of preventive and corrective equipment.


What is it?

We offer specialized services in Cyber ​​​​Security in real time with the best tools, alliances and technology for the protection of your information and operation.

Who is it for?

All those companies that use technology on a daily basis and wish to have the guarantee of a team with vast experience, knowledge, kindness, efficiency and speed.

Why us?

1.- We identify your needs and proceed to define the required actions, through the use of analysis tools such as: diagnostic interviews, concept tests, simulators and questionnaires.

2.- We have the best specialists in the market, which allows us to provide you with a service that guarantees your protection against threats.

3.- We implement processes that allow timely feedback, through which we manage to mitigate risks and protect the computer security of your company.