AZ-304T00 Microsoft Azure Solutions Architect – Design


This course teaches solution architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution.

Addressed to

  • This course is intended for IT professionals with experience designing and implementing solutions running on Microsoft Azure. They should have extensive knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure solution architects use the Azure portal, and as they become more adept they use the command line interface. Candidates should have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes.


28 hours


  • Face-to-face

  • Virtual live through digital platforms

  • on site

Related Courses

  • Course AZ-900T00-A: Microsoft Azure Fundamentals

  • AZ-303T00-A: Microsoft Azure Architecture Technologies

It includes

  • 35 hours of training

  • Trained instructors

  • Participant manual in digital format

  • Proof of participation


Lesson 1: Design an IT Solution

  • Recommend a solution for compute provisioning

  • Determine the right computing technologies

  • Recommend a container solution

  • Recommend a solution to automate IT management

Lab : Deploy Containers to Azure

  • Deploy containers running on Azure virtual machines

  • Deploy containers to Azure Container Instances

  • Deploy containers to Azure Kubernetes Service (AKS) clusters

Lesson 2: Design a Network Solution

  • Recommend a solution for network addressing and name resolution

  • Recommend a solution for network provisioning

  • Recommend a solution for network security

  • Recommend a solution for iInternete connectivity and local networks

  • Recommend a solution to automate network management

  • Recommend a solution for load balancing and traffic routing

Lesson 3: Design for Migration

  • Assess and on-premises servers and applications for migration

  • Recommend a solution for migrating applications and virtual machines

  • Recommend a solution for database migration

Lesson 4: Design Authentication and Authorization

  • Tips for identity and access management

  • Recommend a solution for multi-factor authentication

  • Five steps to secure identity infrastructure

  • Recommend a solution for single sign-on (SSO)

  • Recommend a solution for a hybrid identity

  • Recommend a solution for B2B integration

  • Recommend a hierarchical structure for management groups

Lab : Manage Azure AD Authentication and Authorization

  • Deploy an Azure virtual machine that hosts an AD DS domain controller

  • Create and configure an Azure AD tenant

  • Integrate an AD DS forest with an Azure AD tenant

Lesson 5: Design Governance

  • Recommend a solution for using Azure Policy

  • Recommend a solution for using Azure Blueprint

Lesson 6: Design a Database Solution

  • Select a suitable data platform based on requirements

  • Azure Data Storage overview

  • Recommend database service tier size

  • Dynamically scale Azure SQL Database and Azure SQL Managed Instances

  • Recommend a solution to encrypt data at rest, transmission and in use

Lesson 7: Select a suitable storage account

  • Understanding storage tiers

  • Recommend a storage access solution

  • Recommend storage management tools

Lesson 8: Design Data Integration

  • Recommend a data flow

  • Recommend a solution for data integration

Lesson 9: Design a Logging and Monitoring Solution

  • Azure monitoring services

  • Azure Monitor

Lesson 10: Design a Solution for Backup and Recovery

  • Recommend a recovery solution for on-premises and hybrid workloads

  • Azure site recovery design and solution

  • Recommend a solution for recovery in different regions

  • Recommend a solution for Azure backup management

  • Design a solution for data storage and retention

Lesson 11: Design for High Availability

  • Recommend a solution for application and workload redundancy

  • Recommend a solution for autoscaling

  • Identify resources that require high availability

  • Identify types of storage for high availability

  • Recommend a solution for geographic redundancy of workloads

Lesson 12: Design for Cost Optimization

  • lessons

  • Recommend solutions for cost management

  • Recommended viewpoints to minimize costs

Lesson 13: Designing an Application Architecture

  • Recommend a microservices architecture

  • Recommend an orchestration solution for application deployment

  • Recommend a solution for API integration

Lab : Implement Azure Logic Apps integration with Azure Event Grid

  • Integrate Azure Logic Apps with Event Grid

  • Trigger Logic Apps to run in response to an event that represents a change to a resource within a

Lesson 14: Security Design for Applications

  • Security for applications and services

  • Recommend a solution with Key Vault

  • Recommend solutions with Azure AD managed identities

You want more information about this curse? Contact us!

By sending this message you agree to our Privacy Notice


Renewable Energy

What is it?

We offer specialized services of photovoltaic solar energy that is obtained directly from solar radiation through a solar panel that in turn transforms it into electric power.

Who is it for?

All those companies, businesses and homes that want to reduce costs in their day to day and want to have a sustainability plan to support the environment as well as their economy.

Why us?

1.- Support from a team committed to the environment.
2.- GSB will provide you with the best solution according to your needs
3.- Control and monitoring as well as operation reports, maintenance of preventive and corrective equipment.


What is it?

We offer specialized services in Cyber ​​​​Security in real time with the best tools, alliances and technology for the protection of your information and operation.

Who is it for?

All those companies that use technology on a daily basis and wish to have the guarantee of a team with vast experience, knowledge, kindness, efficiency and speed.

Why us?

1.- We identify your needs and proceed to define the required actions, through the use of analysis tools such as: diagnostic interviews, concept tests, simulators and questionnaires.

2.- We have the best specialists in the market, which allows us to provide you with a service that guarantees your protection against threats.

3.- We implement processes that allow timely feedback, through which we manage to mitigate risks and protect the computer security of your company.