title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Designing Microsoft Azure Infrastructure Solutions (AZ-305T00)
Course Description
Overview
This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles.Objectives
- Prepare your landing zone for migration.
- Evaluate the readiness of your workload and plan for the migrated state.
- Deploy assets and remediate problems.
- Release your deployed workloads to production.
- Compare compute types, including container instances, virtual machines, and functions
- Describe virtual machine (VM) options, including VMs, Virtual Machine Scale Sets, availability sets, Azure Virtual Desktop
- Describe resources required for virtual machines
- Describe application hosting options, including Azure Web Apps, containers, and virtual machines
- Describe virtual networking, including the purpose of Azure Virtual Networks, Azure virtual subnets, peering, Azure DNS, VPN Gateway, and ExpressRoute
Audience
- Azure compute technologies such as VMs, containers and serverless solutions
- Azure virtual networking to include load balancers
- Azure Storage technologies (unstructured and databases)
- General application design concepts such as messaging and high availability
Prerequisites
-
Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure Active Directory; Azure compute technologies such as VMs, containers and serverless solutions; Azure virtual networking to include load balancers; Azure Storage technologies (unstructured and databases); General application design concepts such as messaging and high availability.
Topics
- Introduction
- What is Microsoft Azure
- Get started with Azure accounts
- Exercise - Explore the Learn sandbox
- Describe Azure physical infrastructure
- Describe Azure management infrastructure
- Exercise - Create an Azure resource
- Introduction
- Describe Azure virtual machines
- Exercise - Create an Azure virtual machine
- Describe Azure virtual desktop
- Describe Azure containers
- Describe Azure functions
- Describe application hosting options
- Describe Azure virtual networking
- Exercise - Configure network access
- Describe Azure virtual private networks
- Describe Azure ExpressRoute
- Describe Azure DNS
- Knowledge check
- Introduction
- Describe Azure storage accounts
- Describe Azure storage redundancy
- Describe Azure storage services
- Exercise - Create a storage blob
- Identify Azure data migration options
- Identify Azure file movement options
- Knowledge check
- Introduction
- Describe Azure directory services
- Describe Azure authentication methods
- Describe Azure external identities
- Describe Azure conditional access
- Describe Azure role-based access control
- Describe Zero Trust model
- Describe defense-in-depth
- Describe Microsoft Defender for Cloud
- Introduction
- Overview
- Define strategy
- Plan
- Ready
- Adopt
- Govern and manage
- Knowledge check
- Introduction
- Azure Well-Architected Framework pillars
- Cost optimization
- Operational excellence
- Performance efficiency
- Reliability
- Security
- Summary
- Introduction
- Design for governance
- Design for management groups
- Design for subscriptions
- Design for resource groups
- Design for resource tags
- Design for Azure Policy
- Design for role-based access control (RBAC)
- Design for Azure landing zones
- Knowledge check
- Introduction
- Design for identity and access management (IAM)
- Design for Microsoft Entra ID
- Design for Microsoft Entra business-to-business (B2B)
- Design for Azure Active Directory B2C (business-to-customer)
- Design for conditional access
- Design for identity protection
- Design for access reviews
- Design service principals for applications
- Design managed identities
- Design for Azure Key Vault
- Knowledge check
- Introduction
- Design for Azure Monitor data sources
- Design for Azure Monitor Logs (Log Analytics) workspaces
- Design for Azure Workbooks and Azure insights
- Design for Azure Data Explorer
- Knowledge check
- Introduction
- Describe recovery time objective and recovery point objective
- Explore high availability and disaster recovery options
- Describe Azure high availability and disaster recovery features for Azure Virtual Machines
- Describe high availability and disaster recovery options for PaaS deployments
- Explore an IaaS high availability and disaster recovery solution
- Describe hybrid solutions
- Knowledge check
- Introduction
- Design for backup and recovery
- Design for Azure Backup
- Design for Azure blob backup and recovery
- Design for Azure files backup and recovery
- Design for Azure virtual machine backup and recovery
- Design for Azure SQL backup and recovery
- Design for Azure Site Recovery
- Knowledge check
- Introduction
- Design for data storage
- Design for Azure storage accounts
- Design for data redundancy
- Design for Azure Blob Storage
- Design for Azure Files
- Design for Azure managed disks
- Design for storage security
- Knowledge check
- Introduction
- Design for Azure SQL Database
- Design for Azure SQL Managed Instance
- Design for SQL Server on Azure Virtual Machines
- Recommend a solution for database scalability
- Recommend a solution for database availability
- Design security for data at rest, data in motion, and data in use
- Design for Azure SQL Edge
- Design for Azure Cosmos DB and Table Storage
- Knowledge check
- Introduction
- Design a data integration solution with Azure Data Factory
- Design a data integration solution with Azure Data Lake
- Design a data integration and analytic solution with Azure Databricks
- Design a data integration and analytic solution with Azure Synapse Analytics
- Design strategies for hot, warm, and cold data paths
- Design an Azure Stream Analytics solution for data analysis
- Knowledge check
- Introduction
- Choose an Azure compute service
- Design for Azure Virtual Machines solutions
- Design for Azure Batch solutions
- Design for Azure App Service solutions
- Design for Azure Container Instances solutions
- Design for Azure Kubernetes Service solutions
- Design for Azure Functions solutions
- Design for Azure Logic Apps solutions
- Knowledge check
- Introduction
- Describe message and event scenarios
- Design a messaging solution
- Design an Azure Event Hubs messaging solution
- Design an event-driven solution
- Design a caching solution
- Design API integration
- Design an automated app deployment solution
- Design an app configuration management solution
- Knowledge check
- Introduction
- Recommend a network architecture solution based on workload requirements
- Design patterns for Azure network connectivity services
- Design outbound connectivity and routing
- Design for on-premises connectivity to Azure Virtual Network
- Choose an application delivery service
- Design for application delivery services
- Design for application protection services
- Knowledge check
- Introduction
- Evaluate migration with the Cloud Adoption Framework
- Describe the Azure migration framework
- Assess your on-premises workloads
- Select a migration tool
- Migrate your structured data in databases
- Select an online storage migration tool for unstructured data
- Migrate offline data
- Knowledge check
- Introduction
- Azure Well-Architected Framework pillars
- Cost optimization
- Operational excellence
- Performance efficiency
- Reliability
- Security
- Summary
- Introduction
- Develop cost-management discipline
- Design with a cost-efficiency mindset
- Design for usage optimization
- Design for rate optimization
- Monitor and optimize over time
- Introduction
- Embrace DevOps culture
- Establish development standards
- Evolve operations with observability
- Deploy with confidence
- Automate for efficiency
- Adopt safe deployment practices
- Introduction
- Negotiate realistic performance targets
- Design to meet capacity requirements
- Achieve and sustain performance
- Improve efficiency through optimization
- Introduction
- Design for business requirements
- Design for resilience
- Design for recovery
- Design for operations
- Keep it simple
- Introduction
- Plan your security readiness
- Design to protect confidentiality
- Design to protect integrity
- Design to protect availability
- Sustain and evolve your security posture
- Summary
- Introduction
- Customer narrative
- Common blockers
- Knowledge check
- Introduction
- Customer narrative
- Capture strategic motivation
- Define objectives and key results
- Evaluate financial considerations
- Understand technical considerations
- Create a business case
- Knowledge check
- Introduction
- Customer narrative
- Exercise - Deploy your first cloud adoption plan
- Exercise - Assess your digital estate
- Exercise - Customize your cloud adoption plan
- Introduction
- Customer narrative
- Common operating models
- Design areas for Azure landing zones
- Design principles for Azure landing zones
- Journey to the target architecture
- Choose an Azure landing zone option
- Deploy the Azure landing zone accelerator
- Enhance your landing zone
- Introduction
- Prepare for your migration
- Assess your workload
- Deploy your assets
- Release your workload
- Knowledge check
- Introduction
- Customer narrative
- Govern methodology
- Assess cloud governance risks
- Document cloud governance policies
- Enforce cloud governance policies
- Monitor cloud governance
- Introduction
- Establish business commitments
- Deploy an operations baseline
- Protect and recover
- Enhance an operations baseline
- Manage platform and workload specialization
- Knowledge check
- Introduction
- Follow the innovation lifecycle
- Azure technologies for the build process
- Infuse your applications with AI
- Azure technologies for measuring business impact
- Azure technologies for the learn process
- Knowledge check
- Introduction
- Customer narrative
- Methodology
- Security roles and responsibilities
- Simplify compliance and security
- Simplify security implementation
- Security tools and policies
- Summary
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Please refer to the full terms and conditions here.
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.
STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.