AZ-303T00 Microsoft Azure Solutions Architect – Technologies

Description

This course teaches solution architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure. This course describes how decisions in each thesis area affect an overall solution.

Addressed to

  • This course is intended for IT professionals with experience designing and implementing solutions running on Microsoft Azure. They should have extensive knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure solution architects use the Azure portal, and as they become more adept they use the command line interface. Candidates should have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes.

Duration

35 hours

Modalities

  • Face-to-face

  • Virtual live through digital platforms

  • on site

Related Courses

  • Course AZ-900T00-A: Microsoft Azure Fundamentals

  • AZ-104T00—Microsoft Azure Administrator

It includes

  • 35 hours of training

  • Trained instructors

  • Participant manual in digital format

  • Proof of participation

Temary


Lesson 1: Implement Azure Active Directory

  • Azure Active Directory Overview

  • Users and groups

  • Domains and custom domains

  • Azure AD identity protection

  • Implement conditional access

  • Set up fraud alerts for MFA

  • Implement bypass options

  • Configure guest users in Azure AD

  • Configure trusted IP addresses

  • Manage multiple directories

Lesson 2: Implement and manage hybrid identities

  • Install and configure Azure AD Connect

  • Set up password synchronization and password writeback

  • Configure Azure AD Connect Health

Lesson 3: Implement Virtual Networks

  • Virtual network peering

  • Implement virtual network peering

Lesson 4: Deploy Virtual Machines for Windows and Linux

  • Select the size of the virtual machine

  • Configure high availability

  • Deploy Azure Dedicated Hosts

  • Implement and configure sets of scales

  • Configure Azure Disk Encryption

Lesson 5: Implement Load Balancing and Network Security

  • Deploy Azure Load Balancer

  • Deploy an application gateway

  • Understanding Web Application Firewall

  • Deploy Azure Firewall

  • Deploy Azure Front Door

  • Azure Traffic Manager deployment

  • Implement network security groups and application security groups

  • Deploy Azure Bastion

Lab : Implementing Highly Available Azure IaaS Compute Architecture

  • Describe the characteristics of highly available Azure virtual machines that reside in the same availability set.

  • Describe the characteristics of highly available Azure virtual machines that reside in different Availability Zones.

  • Describe autoscaling features of Azure VM Scale Sets

  • Describe the manual scaling features of Azure VM Scale Sets

Lesson 6: Implement storage accounts

  • storage accounts

  • blob storage

  • storage security

  • Manage storage

  • Access blobs and queues using AAD

Lab : Deploy and configure Azure Storage file and blob services

  • Implement Azure Storage blob authorization by leveraging shared access signatures

  • Implement Azure Storage blob authorization by leveraging Azure Active Directory

  • Implement Azure Storage file share authorization by leveraging access keys

  • Configure Azure Storage virtual networks and firewalls

Lesson 7: Implement NoSQL Databases

  • Set up storage account tables

  • Select the right CosmosDB APIs

Lesson 8: Deploy Azure SQL Databases

  • Configure Azure SQL Database settings

  • Deploy Azure SQL Database Managed Instances

  • High availability SQL database and Azure

Lesson 9: Automate Deployment and Resource Configuration

  • Azure Resource Manager templates

  • Save a template for a virtual machine

  • Evaluate the location of new resources

  • Configure a virtual hard disk template

  • Deploy from a template

  • Create and run an automation runbook

Lesson 10: Implement and manage Azure governance

  • Create management groups, subscriptions, and resource groups

  • Role Based Access Control (RBAC) Overview

  • Role-based access control (RBAC) roles

  • Azure AD Access Reviews

  • Deploy and configure an Azure policy

  • Azure Blueprints

Lab : Deploy and configure Azure Storage file and blob services

  • Implement Azure Storage blob authorization by leveraging shared access signatures

  • Implement Azure Storage blob authorization by leveraging Azure Active Directory

  • Implement Azure Storage file share authorization by leveraging access keys

Lab : Manage Azure Role-Based Access Control

  • Define a custom RBAC role

  • Assign a custom RBAC role

Lesson 11: Manage Application Security

  • Azure Key Vault

  • Azure Managed Identity

Lesson 12: Manage workloads in Azure

  • Migrate workloads with Azure Migrate

  • VMware: Agentless Migration

  • VMware – Agent Based Migration

  • Deploy Azure Backup

  • Azure Site Recovery to Azure

  • Implement Azure update management

Lab : Protect Hyper-V virtual machines using Azure Site Recovery

  • Configure Azure Site Recovery

  • Perform failover test

  • Perform a planned failover

  • Perform an unplanned failover

Lesson 13: Implement Container-Based Applications

  • Azure container instances

  • Configure the Azure Kubernetes service

Lesson 14: Implement an Application Infrastructure

  • Create and configure Azure App Service

  • Create an App Service web app for containers

  • Create and configure an app service plan

  • Configure networking for an application service

  • Create and manage deployment slots

  • Deploy logic apps

  • Deploy Azure Functions

Lab : Configuring a Message-Based Integration Architecture

  • Configure and validate an Azure Function App Storage blob trigger

  • Configure and validate an Azure Event Grid subscription-based queue messaging

Lab : Deploy an Azure App Service web app with a staging slot

  • Implement the blue/green deployment pattern by using Azure App Service web app deployment slots

  • A/B test using Azure App Service web app deployment slots

Lesson 15: Implement Cloud Infrastructure Monitoring

  • Azure infrastructure security monitoring

  • Azure Monitor

  • Azure workbooks

  • Azure Alerts

  • Log Analysis

  • network watcher

  • Azure service health

  • Monitor Azure costs

  • Azure App Insights

  • Unified monitoring in Azure

You want more information about this curse? Contact us!

By sending this message you agree to our Privacy Notice

Intranet

Renewable Energy

What is it?

We offer specialized services of photovoltaic solar energy that is obtained directly from solar radiation through a solar panel that in turn transforms it into electric power.

Who is it for?

All those companies, businesses and homes that want to reduce costs in their day to day and want to have a sustainability plan to support the environment as well as their economy.

Why us?

1.- Support from a team committed to the environment.
2.- GSB will provide you with the best solution according to your needs
3.- Control and monitoring as well as operation reports, maintenance of preventive and corrective equipment.

Cybersecurity

What is it?

We offer specialized services in Cyber ​​​​Security in real time with the best tools, alliances and technology for the protection of your information and operation.

Who is it for?

All those companies that use technology on a daily basis and wish to have the guarantee of a team with vast experience, knowledge, kindness, efficiency and speed.

Why us?

1.- We identify your needs and proceed to define the required actions, through the use of analysis tools such as: diagnostic interviews, concept tests, simulators and questionnaires.

2.- We have the best specialists in the market, which allows us to provide you with a service that guarantees your protection against threats.

3.- We implement processes that allow timely feedback, through which we manage to mitigate risks and protect the computer security of your company.