Course Description:
This instructor led, online training course will provide students with the knowledge and skills to translate business requirements into secure, scalable, and reliable solutions. We will also discuss design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration.
Exam Number: AZ-304
Course Outline
*Outline is subject to change*
Recommend Solutions for Cost Management
Recommended Viewpoints for Minimizing Costs
Azure Monitoring Services
Azure Monitor
Recommend a Solution for Multi-Factor Authentication
Recommend a Solution for Single-Sign On (SSO)
Five Steps for Securing Identity Infrastructure
Recommend a Solution for a Hybrid Identity
Recommend a Solution for B2B Integration
Infrastructure Protection
Recommend a Hierarchical Structure for Management Groups, Subscriptions and Resource Groups
Recommend a Solution for using Azure Policy
Recommend a Solution for using Azure Blueprint
Recommend a Solution using KeyVault
Recommend a Solution using Azure AD Managed Identities
Select an Appropriate Data Platform Based on Requirements
Overview of Azure Data Storage
Recommend Database Service Tier Sizing
Dynamically Scale Azure SQL Database and Azure SQL Managed Instances
Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use
Recommend a Data Flow
Recommend a Solution for Data Integration
Understanding Storage Tiers
Recommend a Storage Access Solution
Recommend Storage Management Tools
Recommend a Recovery Solution for Hybrid and On-Premises Workloads
Design and Azure Site Recovery Solution
Recommend a Solution for Recovery in Different Regions
Recommend a Solution for Azure Backup Management
Design a Solution for Data Archiving and Retention
Recommend a Solution for Application and Workload Redundancy
Recommend a Solution for Autoscaling
Identify Resources that Require High Availability
Identify Storage Tpes for High Availability
Recommend a Solution for Geo-Redundancy of Workloads
Recommend a Solution for Compute Provisioning
Determine Appropriate Compute Technologies
Recommend a Solution for Containers
Recommend a Solution for Automating Compute Management
Recommend a Solution for Network Addressing and Name Resolution
Recommend a Solution for Network Provisioning
Recommend a Solution for Network Security
Recommend a Solution for iInternete Connectivity and On-Premises Networks,
Recommend a Solution for Automating Network Management
Recommend a Solution for Load Balancing and Rraffic Routing
Recommend a Microservices Architecture
Recommend an Orchestration Solution for Deployment of Applications
Recommend a Solution for API Integration
Assess and On-Premises Servers and Applications for Migration
Recommend a Solution for Migrating Applications and VMs
Recommend a Solution for Migration of Databases
Skills Learned
Recommend solutions to minimize costs
Recommend a solution for Conditional Access, including multi-factor authentication
Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect
Recommend a solution for using Azure Policy
Recommend a solution that includes KeyVault
Recommend a solution that includes Azure AD Managed Identities
Recommend a storage access solution
Design and Azure Site Recovery solution
Recommend a solution for autoscaling
Recommend a solution for containers
Recommend a solution for network security
Recommend a solution for migrating applications and VMs
Recommend a solution for migration of databases
Who Should Attend This Course
The primary audience for this course is IT Professionals who design and implement solutions running on Microsoft Azure.
Prerequisites
None but we recommend students have attended the AZ-303 course and also recommend:
Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks.
Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
Understanding of resilience and disaster recovery, including backup and restore operations.
Inclusions
- Accessible 24x7x365 both from your PC and Mobile Device
- Enjoy job placement assistance for the first 12 months after course completion.
- This course is eligible for CCS Learning Academy’s Learn and Earn Program: get a tuition fee refund of up to 50% if you are placed in a job through CCS Global Tech’s Placement Division*
- Government and Private pricing available.*
*For more details call:Â 858-208-4141Â or email:Â training@ccslearningacademy.com; sales@ccslearningacademy.com
NOTE:Â These are our Partner Delivered eLearning.