- 28 Sections
- 179 Lessons
- 25 Weeks
Expand all sectionsCollapse all sections
- Subscriptions7
- Azure Active Directory (Azure AD) objects8
- Governance4
- Role-based access control (RBAC)3
- Azure Active Directory (Azure AD) objects8
- Manage and Secure Storage12
- 6.1Configure network access to storage accounts
- 6.2Create and configure storage accounts
- 6.3Generate shared access signature (SAS) tokens
- 6.4Manage access keys
- 6.5Configure Azure AD authentication for a storage account
- 6.6Configure access to Azure Files
- 6.7Export from Azure job
- 6.8Import into Azure job
- 6.9Install and use Azure Storage Explorer
- 6.10Copy data by using AZCopy
- 6.11Implement Azure Storage replication
- 6.12Configure blob object replication
- Configure Azure files and Azure Blob Storage5
- Automate deployment of virtual machines (VMs) by using Azure Resource Manager templates5
- Configure VMs8
- Create and configure containers6
- Create and configure Azure App Service8
- Implement and manage virtual networking7
- 12.1Create and configure virtual networks, including peering
- 12.2Configure private and public IP addresses
- 12.3Configure user-defined network routes
- 12.4Implement subnets
- 12.5Configure endpoints on subnets
- 12.6Configure private endpoints
- 12.7Configure Azure DNS, including custom DNS settings and private or public DNS zones
- Secure access to virtual networks5
- Configure load balancing3
- Monitor and troubleshoot virtual networking5
- Integrate an on-premises network with an Azure virtual network3
- Monitor resources by using Azure Monitor5
- Implement backup and recovery6
- Implement cloud infrastructure monitoring7
- Design for cost optimization2
- Design a solution for logging and monitoring5
- 21.1Determine levels and storage locations for logs
- 21.2Plan for integration with monitoring tools including Azure Monitor and Azure Sentinel
- 21.3Recommend appropriate monitoring tool(s) for a solution
- 21.4Choose a mechanism for event routing and escalation
- 21.5Recommend a logging solution for compliance requirements
- Design a solution for backup and recovery7
- 22.1Recommend a recovery solution for Azure hybrid and on-premises workloads that meets
- 22.2Recovery objectives (RTO, RLO, RPO)
- 22.3Design and Azure Site Recovery solution
- 22.4Recommend a solution for recovery in different regions
- 22.5Recommend a solution for geo-redundancy of workloads
- 22.6Recommend a solution for Azure Backup management
- 22.7Design a solution for data archiving and retention
- Design for high availability5
- Design migrations6
- 24.1Assess and interpret on-premises servers, data, and applications for migration
- 24.2Recommend a solution for migrating applications and VMs
- 24.3Recommend a solution for migration of databases
- 24.4Determine migration scope, including redundant, related, trivial, and outdated data
- 24.5Recommend a solution for migrating data (Storage Migration Service, Azure Data Box,
- 24.6Azure File Sync-based migration to hybrid file server
- Design security for applications3
- Application Delivery - SDLC Automation22
- 26.1Understanding CI & CD
- 26.2Continuous Integration Goals
- 26.3Continuous delivery
- 26.4Continuous deployment goals
- 26.5Immutable infrastructure
- 26.6Azure DevOps
- 26.7Options for source code management
- 26.8Branching off master
- 26.9Creating a Build Spec YAML file
- 26.10Azure DevOps CI
- 26.11AppSpec file
- 26.12Azure DevOps webhook
- 26.13Deploying ARM template from pipeline.
- 26.14Testing Pyramid,Continuous Testing with IaCTesting Scenarios in a CI/CD Pipeline
- 26.15Best Practices for unit test
- 26.16Integration tests and unit tests
- 26.17Fault tolerance testing
- 26.18In-place deployments
- 26.19Blue-Green deployment
- 26.20Red-black deployment
- 26.21Immutable or disposal updates
- 26.22Application deployment strategies
- Agile and Jira5
- Linux9
- 28.1Introduction to the command line
- 28.2Managing physical storage
- 28.3Install and configure software components and services
- 28.4Monitor and manage running processes
- 28.5Manage and secure files and file systems
- 28.6Administer users and groups
- 28.7Review the system log files and journal for issues
- 28.8Troubleshoot problems and analyze systems with Red Hat Insights
- 28.9Remotely manage systems with SSH
Troubleshoot problems and analyze systems with Red Hat Insights
Prev
