Curriculum
- 28 Sections
- 179 Lessons
- 25 Weeks
Expand all sectionsCollapse all sections
- Subscriptions7
- Azure Active Directory (Azure AD) objects8
- Governance4
- Role-based access control (RBAC)3
- Azure Active Directory (Azure AD) objects8
- Manage and Secure Storage12
- 5.0Configure network access to storage accounts
- 5.1Create and configure storage accounts
- 5.2Generate shared access signature (SAS) tokens
- 5.3Manage access keys
- 5.4Configure Azure AD authentication for a storage account
- 5.5Configure access to Azure Files
- 5.6Export from Azure job
- 5.7Import into Azure job
- 5.8Install and use Azure Storage Explorer
- 5.9Copy data by using AZCopy
- 5.10Implement Azure Storage replication
- 5.11Configure blob object replication
- Configure Azure files and Azure Blob Storage5
- Automate deployment of virtual machines (VMs) by using Azure Resource Manager templates5
- Configure VMs8
- Create and configure containers6
- Create and configure Azure App Service8
- Implement and manage virtual networking7
- 11.0Create and configure virtual networks, including peering
- 11.1Configure private and public IP addresses
- 11.2Configure user-defined network routes
- 11.3Implement subnets
- 11.4Configure endpoints on subnets
- 11.5Configure private endpoints
- 11.6Configure Azure DNS, including custom DNS settings and private or public DNS zones
- Secure access to virtual networks5
- Configure load balancing3
- Monitor and troubleshoot virtual networking5
- Integrate an on-premises network with an Azure virtual network3
- Monitor resources by using Azure Monitor5
- Implement backup and recovery6
- Implement cloud infrastructure monitoring7
- Design for cost optimization2
- Design a solution for logging and monitoring5
- 20.0Determine levels and storage locations for logs
- 20.1Plan for integration with monitoring tools including Azure Monitor and Azure Sentinel
- 20.2Recommend appropriate monitoring tool(s) for a solution
- 20.3Choose a mechanism for event routing and escalation
- 20.4Recommend a logging solution for compliance requirements
- Design a solution for backup and recovery7
- 21.0Recommend a recovery solution for Azure hybrid and on-premises workloads that meets
- 21.1Recovery objectives (RTO, RLO, RPO)
- 21.2Design and Azure Site Recovery solution
- 21.3Recommend a solution for recovery in different regions
- 21.4Recommend a solution for geo-redundancy of workloads
- 21.5Recommend a solution for Azure Backup management
- 21.6Design a solution for data archiving and retention
- Design for high availability5
- Design migrations6
- 23.0Assess and interpret on-premises servers, data, and applications for migration
- 23.1Recommend a solution for migrating applications and VMs
- 23.2Recommend a solution for migration of databases
- 23.3Determine migration scope, including redundant, related, trivial, and outdated data
- 23.4Recommend a solution for migrating data (Storage Migration Service, Azure Data Box,
- 23.5Azure File Sync-based migration to hybrid file server
- Design security for applications3
- Application Delivery - SDLC Automation22
- 25.0Understanding CI & CD
- 25.1Continuous Integration Goals
- 25.2Continuous delivery
- 25.3Continuous deployment goals
- 25.4Immutable infrastructure
- 25.5Azure DevOps
- 25.6Options for source code management
- 25.7Branching off master
- 25.8Creating a Build Spec YAML file
- 25.9Azure DevOps CI
- 25.10AppSpec file
- 25.11Azure DevOps webhook
- 25.12Deploying ARM template from pipeline.
- 25.13Testing Pyramid,Continuous Testing with IaCTesting Scenarios in a CI/CD Pipeline
- 25.14Best Practices for unit test
- 25.15Integration tests and unit tests
- 25.16Fault tolerance testing
- 25.17In-place deployments
- 25.18Blue-Green deployment
- 25.19Red-black deployment
- 25.20Immutable or disposal updates
- 25.21Application deployment strategies
- Agile and Jira5
- Linux9
- 27.0Introduction to the command line
- 27.1Managing physical storage
- 27.2Install and configure software components and services
- 27.3Monitor and manage running processes
- 27.4Manage and secure files and file systems
- 27.5Administer users and groups
- 27.6Review the system log files and journal for issues
- 27.7Troubleshoot problems and analyze systems with Red Hat Insights
- 27.8Remotely manage systems with SSH
Configure resource locks
Next