Microsoft Azure Architect Design – Exam AZ-301 – Early Access
This course is designed to help you develop the skills of an Azure Solution Architect and to pass the Microsoft Azure AZ-301 certification exam.
The AZ-301 exam is one of two exams required to achieve the expert level certification as an Azure Solutions Architect Expert.
Throughout this course, we cover all of the AZ-301 exam objectives. We ensure you gain experience designing and architecting Azure-based solutions. This course provides:Fundamental knowledge of solution architecture.Experience designing solutions for a range of scenarios.Familiarity with features and functionality of many Azure services.Knowledge on how to best deploy, migrate, and integrate Azure solutions.
We work with concepts, Azure services, and various scenarios to provide the skills you need, not solely to pass this exam, but also to become a great Azure solution architect.
Special Note: This course is being brought to you via Early Access. Check out the Introduction section for a video on how to be sure you get the most out of this preview of the course!
Interactive Diagram: https://interactive.linuxacademy.com/diagrams/AzureArchitectDesign.html
Welcome to the Course
Important Information About This Early Access Course!
Welcome to this Early Access course from Linux Academy. We will add content to this course over the coming weeks as we finish things up. However, we wanted our learners to get access to the material as early as possible. This video talks about a couple of things to keep in mind in case you use our Course Scheduler in your learning journey!
Welcome to this certification preparation course for the Microsoft Azure Architect Design (AZ-301) exam. To support you in your goal to become an Azure solution architect, this course provides you with skills and experience for designing, migrating, and managing solutions for a range of scenarios. The AZ-301 exam tests your ability to select tools, technologies, and techniques to implement Azure solutions. Starting with an introduction of solution architecture fundamentals, we progressively build knowledge, skills, and intamacy with a range of solutions and scenarios. Important Note: While this course is structured to cater to different skill levels, AZ-301 is an expert-level exam. It's expected learners have already successfully passed AZ-300 and are familiar with Azure concepts, technologies, and tools. Course Support: Reach out to me directly with any questions or concerns; my passion is helping you be successful with Azure. See the Course Support and Feedback lesson for the many ways to access support.
Course Support and Feedback
At Linux Academy, we are very passionate about providing everything needed to be successful on your learning journey. In this lesson, we provide a quick overview of the many tools available to access support, as well as provide feedback. If you experience any issues with the content, please contact me directly with the details. Course Support: Linux Academy Support: firstname.lastname@example.org James Lee: email@example.com Course Feedback: Enjoying the content? Please leave a thumbs-up! Have concerns or suggestions? Please contact me directly, or leave your comments with a thumbs-down and I will reach out to you to address your issue!
About the Training Architect
Using the Interactive Guide
The Interactive Guide is used throughout the AZ-300 course to help illustrate important concepts and call out key points. Use this interactive diagram while following along with lessons and as as a study guide by itself. Link: https://www.lucidchart.com/documents/view/ac476567-8168-4033-933b-c25d212220fe/1
Architecting Azure Solutions
Overview of Solution Architecture
Solution architecture can mean a range of things, depending on who we ask. In this lesson we discuss: What is solution architecture?What types of things do we do as a solution architect?Is there more to solution architecture than just design? It's important we come to appreciate that solution architecture is not just about the destination, but rather it also involves the journey. Please note: we will not be discussing the steps for creating a project schedule, or estimating the staffing resources required to deliver a solution (although this is an important element of solution architecture). Typically this would take place within phases 2, and 3, and again in phase 4.
Overview of Project Management and Execution
As a solution architect, it helps to be mindful of the important role which project management plays in the successful delivery of any solution. In this lesson we walk through a high-level overview of project management goals and responsibilities, as well as discuss two general methdologies: waterfall and agile. Through this lesson we demonstrate that: Project management provides an agreed and accepted framework for the delivery of solutions.It is common for needs to change through large and complex projects and we must consider these needs.Policies and tools can be used to ensure technologies are evaluated fairly and solutions are consistently tested. Be aware this is a very brief overview of project management and different methodologies do exist.
Fundamentals of Design
Introduction to Design Fundamentals
Why do we need to understand the fundamentals of design? When designing solutions for the cloud, it helps to have a guiding framework we can leverage to ensure we harness the full benefits of cloud. In this lesson, we briefly discuss how design patterns and principles help us achieve this and architect great solutions.
Design Principles - Scalability
In this lesson we discuss our first design principle: scalability. Designing a solution to be scalable helps us ensure resources can be increased or decreased to meet demand. We learn about the two main approaches to scaling: Vertical scaling: increase and decrease the size of a single resource to meet demand.Horizontal scaling: increase and decrease the number of instances available to meet demand. As we demonstrate throughout the course, scaling does more than help us address the performance needs of our solution. It also plays a role in the reliability of our solution.
Design Principles - Reliability
It's always important to ensure solutions we build have the ability to remain online through minor faults, and that we have a solution in place to recover from major disasters. That's what we refer to as reliability. In this lesson, we discuss two important reliability concepts: Availability: ensuring our solution remains online through minor faults and failures.Recoverability: ensuring we can restore both the service and data of our solution in the event of a major fault or outage.
Design Principles - Efficiency
When architecting solutions, it's critical to get the balance right. One of the key items we need to balance is cost. In this lesson, we consider both: Resource and utilization costs.Operational cost. How much do we pay to have our solution running in the cloud and how much do we pay to administer, deploy, develop, and operate the solution?
Design Principles - Security
With so many stories of security breaches in modern applications, it's no surprise security is one of our design principles. In this lesson, we discuss two important considerations of designing security within the cloud: Defense in Depth: a concept reminding us security must be designed across all areas of a solution.Shared Security: the notion that when we use cloud services, the cloud provider shares some responsibility for security.
In this lesson, we disuss two important concepts for architecting solutions in the cloud. We cover the use of Design Patterns which can help us find industry-accepted, best-practice solutions to common architecture problems. By itself, migrating to the cloud doesn't inherently provide access to all the benefits of the cloud. Solutions must be designed to leverage cloud benefits. We also discuss coupling, a concept from Service Oriented Architecture and many other design philosophies.
Determine Workload Requirements
Gather Information and Requirements
Introduction to Assessing Requirements
This lesson is an introduction to the Gather Information and Requirements section of the course. By completing this lesson you will: Gain an appreciation for the importance of assessing requirementsUnderstand the structure of upcoming content
Assessing Technical Requirements
One of the most important responsibilities of a solutions architect is understanding requirements. But if we want our solution to be successful, we must first define what success means. In this lesson we'll discuss what it means to gather information and technical requirements. After completing this lesson, you will: Appreciate the importance of performing a tecnical assessmentBecome more familiar with the types of technical questions we might ask In an upcoming scenario, we will put this assessment into practice, and see how technical requirements can influence design. Please bear in mind that at this stage in the course, you are not expected to know all the important technical questions to ask when designing a solution. As we progress through the course, you will become more familiar with the distinguishing properties and features of various technologies, from the perspective of the four design pillars. At this stage in the course, what is important is that you can see how technical requirements do influence solution architecture.
Assessing Non-technical Requirements
The non-technical requirements of a solution can be equally as important as the technical requirements of a solution. Non-technical requirements might include those that relate to people, policies, compliance, and so on. In this lesson we will discuss: Why non-technical requirements are importantSome example non-technical requirementsSome examples of influence that non-technical requirements can have on a solution
Scenario - Assessing Requirements
In this scenario, we will practice assessing both technical and non-technical requirements. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure, and have a range of requirements that must be met. This scenario includes a range of details, and our responsibility is to identify any important information which influences the design of a possible solution. This is the first of many scenarios where we will: Walk through information on current state and goalsPerform an assessment of the requirementsDiscuss a possible solution
Optimize Consumption Strategy
Introduction to Consumption Optimization
In this section introduction, we chat briefly about what consumption optimization is and what we will share more about in the upcoming lessons.
Azure Purchasing Options
To get started using Azure, we first need to create a subscription. In this lesson, we take a look at the main purchase options for an Azure subscription. The purchase options we discuss include: Pay as you go (PAYG).Enterprise Agreement (EA).Dev/TestCloud Solution Provider (CSP) Additionally, we briefly discuss Microsoft support plans.
Azure Reservations are a special way you can pre-purchase a selection of Azure resources, to get discounts. In this lesson, we discuss Azure Reservations and learn: How Azure Reservations work.What types of resources we can purchase.The types of commitments (1 or 3 years) we must make.How to purchase reservations in the Azure Portal.
Another major influence on our Azure consumption is licensing. Within this lesson we discuss some important considerations for licensing within Azure. This includes: Azure Hybrid Use Benefit.Software Assurance and License Mobility considerations.Per-item licensing (such as with Azure Active Directory or Enterprise Mobility + Security).Marketplace licensing. To understand Azure Hybrid Use Benefit (also known as Azure Hybrid Benefit), it is recommended you review the following Microsoft article.
Azure Product Pricing
One of the more direct influences on consumption is that of the products and services we implement. In this lesson, we discuss product families, features, and examples of optimizing consumption for: ComputeIdentityNetworkStorage This is an overview of the types of ways our choices of service and product or SKU can influence costs.
Using Azure Advisor, we're able to get access to a range of proactive recommendations tailored specifically to our environment. In this lesson we focus specifically on the Azure Advisor recommendations which influence cost. Azure Advisor includes recommendations for: Resizing or shutting down underutilized instances.Deleting unprovisioned ExpressRoute circuits.Deleting or reconfiguring idle virtual network gateways.Azure Reservations for virtual machines.Deleting unassociated public IP addresses.Deleting Azure Data Factory pipelines that are failing.Using standard snapshots for managed disks. Specific information about these recommendations can be found at the following Microsoft article.
Azure Pricing Calculator
The Azure Pricing Calculator is a simple but significant tool in the belt of many Azure solution architects. In this lesson we take a look at some of the core features of the calculator, including some that are only available on logging in.
Azure Total Cost of Ownership Calculator
When evaluating a migration of on-premises workloads to Microsoft Azure, it helps to understand the total cost of each solution. Using the Azure Total Cost of Ownership (TCO) Calculator, we can estimate and compare these costs. In this lesson we: Discuss the purpose of the TCO Calculator.Walk through using the TCO Calculator.
Managing Azure Costs
Through Azure Cost Management, we get access to a range of tools that help us manage and analzye our expenditure within Azure. In this lesson we discuss: The purpose of Azure Cost Management.Features and functionalities available.Analytics capabilities, including a brief walkthrough.Budgeting capabilities, including a brief walkthrough.
Scenario - Optimizing Consumption
In this scenario, we practice assessing requirements and architecting a solution based on elements that can significantly influence costs. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure and has a range of requirements that must be met. This is the one of many scenarios where we will: Walk through information on current state and goals.Perform an assessment of the requirements.Discuss a possible solution. Please be aware that this is just one possible scenario and one possible solution.
Designing an Auditing and Monitoring Strategy
Introduction to Auditing and Monitoring
Welcome to the auditing and monitoring section of this course. In this video, we briefly walk through what to expect for this section.
Monitoring in Azure
The purpose of this lesson is to introduce the concept of solution monitoring and helps us see the difference between monitoring and audit or compliance. We consider how monitoring supports our ability to: Understand our solution (analytics and insights).Respond to events (scaling and alerts).Route monitoring information (integration/archive).
Audit and Compliance in Azure
Audit and compliance is predominantly focused on people, processes, and non-technical requirements of a solution. For example, consider the industry our solution is intended for. Do we have any obligations we must meet, such as financial, health, or government? Or perhaps our organization has a range of requirements our solution must adhere to (e.g. resources can only be based in America). In this lesson, we discuss the concept of auditing and complying with requirements. We consider legal or industry requirements and organizational requirements. This lesson provides an understanding of the importance of audit and compliance. In the upcoming lessons, we discuss technologies and tools that helps us in this endeavour. Related and helpful links: Azure ComplianceAzure Regions - Refer to the featured regionsAzure Australia Central - An example of a featured region; certified in Australia for use with data classified as PROTECTED
Azure Monitoring Solutions - Part 1
As a solution architect it's important that we're aware of the different capabilities available for monitoring Azure based solutions. In this lesson, we walk through a high-level overview of the important features of Azure Monitor, including: Activity Log: for auditing subscription level events.Metrics: for analyzing resource metrics.Logs (also known as Log Analytics): for gathering and analyzing diagnostic information.Service Health: for viewing health information about Azure services.Alerts: for responding to various events.Insights: for gaining a deeper understanding of specific products and resources. This lesson is not focused on implementation and configuration, and is instead aimed at providing an overview of the capability of Azure Monitor features. In part 2 of this lesson, we take a look at specific Azure Monitor insights capabilities, as well as products used to enable integration. Related and helpful links: Azure Monitor terminology changes
Azure Monitoring Solutions - Part 2
In part 2 of our lesson on Azure monitoring solutions, we discuss the various features and products available within Azure Monitor. Within this lesson, we cover: Application InsightsNetwork Insights (also known as Network Watcher)Services used to help with integration. This is a high-level overview of when to use each of these services or products. In the next lesson we consider how these products can be used for important monitoring scenarios.
Important Monitoring Scenarios
In this lesson, we take a look at how the various monitoring solutions we've discussed so far can be put together to perform a range of important tasks. Specifically, we cover: Storing and routing monitoring information.Escalating events and alerts.Integrating with other solutions.
Organizing Azure Resources
To help manage our environment from billing, operational, and monitoring perspectives, our environment should be well organized. In this lesson we discuss two main ways for organizing our environment, including: Azure resource hierarchy.Tagging. These two tools can help us better manage billing, automation, and administration.
Microsoft provides the Azure Policy solution to help manage various compliance requirements. In this lesson we discuss: How Azure Policy helps with compliance.Examples of Azure Policy in use.The key components of Azure Policy. We show that Azure Policy is a versatile and powerful tool for helping enforce controls across your Azure environment.
Microsoft Service Trust Portal
When you architect solutions to leverage Microsoft's cloud services, it's important you ensure that you adhere with any compliance regulations. In this lesson we discuss: The Microsoft Service Trust Portal's role in compliance.How to access documentation on Microsoft's compliance with various regulations.The Compliance Manager's role in helping your organization achieve compliance.
Scenario - Auditing and Monitoring
In this scenario, we practice assessing requirements and architecting a solution based on elements that can influence auditing, monitoring, and operations. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure and has a range of requirements we must meet. This is the one of many scenarios where we will: Walk through information on the current state and goals.Perform an assessment of the requirements.Discuss a possible solution. Please be aware this is just one possible scenario and one possible solution.
Design for Identity and Security
Design for Identity Management
Introduction to Design for Identity Management
Welcome to the Identity and Security section of the course. This brief lesson provides an introduction and helps explain what to expect with this section of the course.
This lesson provides a high-level overview of identity management. What is it and why does it matter? In this lesson, we discuss: Key features of an identity management solution.The traditional model of security.The new identity-centric model of security.Key terms and concepts.
In this lesson, we consider some of the main access control models. We discuss the following: Mandatory access controlDiscretionary access controlRole-based access controlRule-based access controlAttribute-based access controlHistory-based access control As we complete further lessons, we will showcase a range of technologies that support some of these models.
Azure Active Directory (AD)
This lesson provides an introduction to Azure Active Directory (Azure AD). In this lesson we will: Discuss some of the main features.Consider important identity objects.Perform some basic tasks in the Azure Portal. This lesson provides an overview of Azure AD's place within identity-centric security architecture. In upcoming lessons we will build on this knowledge and look at many different capabilities.
Azure AD Business-to-Business (B2B)
Azure Active Directory Business-to-Business (Azure AD B2B) is a feature of Azure AD which helps organizations share their resources with external organizations. In this lesson, we discuss: Key features of Azure AD B2B.How to configure Azure AD B2B.Capabilities for direct identity federation.The types of access guest accounts can have. This lesson grants provides an appreciation for how Azure AD B2B simplifies the collaboration and federation of identity providers. It allows guest users to be granted access similar to normal users: application access, Azure AD and Azure management access, and more.
Azure AD Business-to-Consumer (B2C)
When architecting solutions for modern applications, Azure Active Directory Business-to-Consumer (Azure AD B2C) is a great product to consider. A developer creating a new application requiring identity can use Azure AD B2C to get identity management capabilities similar to Azure AD. Azure AD B2C also allows for identity providers like Facebook and Google, so we can provide end-users with the ability to log in using their existing identities. In this lesson, we: Discuss the purpose of Azure AD B2C.Consider important features and functionality.Walk through the creation of a new B2C tenant.
Azure AD Domain Services (DS)
Azure AD Domain Services (DS) is a product which offers functionality similar to on-premises Microsoft Active Directory. With Azure AD DS provides many of the traditional features similar to Active Directory, but wihtout managing the underlying infrastructure. This is automatically managed. Within this lesson we discuss: Scenarios where Azure AD DS is useful.Features and limitations of Azure AD DS.Architecture and synchronization. We also review the configuration and functionality of Azure AD DS through the Azure Portal using some test resources. Please note: While a managed domain includes some configurable options, the changes that can be made are farily limited. We cannot modify group memberships.We cannot modify user attributes.We do not have Domain Administrator or Enterprise Administrator privileges. It is possible to edit DNS and Group Policy.
Azure Access Control
Securing access to our Azure resources is an important part of architecting secure solutions. Within this lesson we consider three main ways for securing our Azure resources: Azure role-based access control (RBAC)Azure resource locksAzure AD roles As part of our discussion on RBAC, we also discuss and configure some management groups within the Azure Portal. Management groups are a useful way for implementing RBAC, policies (discussed earlier), and even some forms of monitoring, across multiple subscriptions. This lesson provides an overview of when and where we would use these types of access control.
Enterprise Access Management
A critical task in architecting identity-centric solutions is providing centralized access to enterprise applications for our users. In this lesson we do the following: Discuss secure and centralized access to applications.Configure an enterprise application within Azure AD.Walk through the end-user experience within the MyApps portal. This lesson serves as a foundation for future lessons, where we add features such as single sign-on, user-provisioning, and self-service.
Self-service functionality helps us improve end-user experience and minimize the IT administrative overhead of our solutions. Within this lesson, we cover: Self-service group management.Self-service application management.Self-service password reset (SSPR).
Scenario - Identity Management
In this scenario, we practice assessing requirements and architecting a solution based on elements that can influence identity management. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure and has a range of requirements we must meet. This is the one of many scenarios where we will: Walk through information on the current state and goals.Perform an assessment of the requirements.Discuss a possible solution. Please be aware this is just one possible scenario and one possible solution.
Design for Authentication and Authorization
Introduction to Authentication and Authorization
Welcome to the "Authentication and Authorization" section of the course. This brief lesson provides an introduction and helps explain what you can expect within this section of the course.
Authentication and Authorization Protocols: Part 1
In this lesson, we will discuss concepts relating to authentication and authorization. You will learn: What authentication isWhat authorization isImportant protocols, including OAuth and OpenID Connect In part two of this lesson, we will create an application and see a high-level overview of how to leverage the Microsoft Azure AD platform for identity.
Authentication and Authorization Protocols: Part 2
To help illustrate how applications can leverage Azure AD identity, we will perform a limited configuration of an application within Azure AD. In this lesson, we will: Register an application with Azure ADUse a quick-start application to test the registrationRun the app locally using Visual StudioWalk through the process of login and redirections
Identity delegation is an important concept when architecting modern cloud-based applications. Within this lesson, we will discuss: What identity delegation isWhat the flow of information looks likeHow identity delegation works within Azure AD At the end of this lesson, we will summarize a number of important concepts and topics discussed throughout this lesson, as well as the previous (two-part) lesson on authentication and authorization.
API Management and API Keys
In this quick lesson, we will briefly discuss the API Management product and some of the security features and policies available. In this lesson, we will discuss: The purpose of the API Management productUsing API keys (subscriptions) for securityAn overview of some of the other security features Please be aware: This lesson is not intended as a comprehensive overview of the API Management product — the main focus is API keys in contrast to OAuth.
Azure AD Authentication Methods
This lesson provides a summary of the main ways in which we can authenticate against an Azure AD tenant. In this lesson, we will discuss important considerations for: Cloud-only authenticationAzure AD Connect with Password Hash Sync (PHS)Azure AD Connect with Pass-through Authentication (PTA)Azure AD Connect with Active Directory Federation Services (ADFS) Helpful Links: Microsoft - Choose the right hybrid authentication option
When architecting identity-centric solutions, one of the most important things we must configure is single sign-on (SSO). In this lesson we discuss: What single sign-on is.What user provisioning is.An overview of SSO configuration within the Azure Portal.
Multi-factor Authentication (MFA)
"One simple action you can take to prevent 99.9 percent of attacks on your accounts" -- Melanie Maynes Senior Product Marketing Manager, Microsoft Security Multi-factor authentication (MFA) is an important tool we can leverage as solution architects to help secure identity. As the configuration of MFA is covered in AZ-300, this lesson is primarily a refresher on important things to consider as a solution architect. This lesson covers the following. A recap of MFA.Licensing considerations for using MFA.Methods for enabling MFA.
Managed Service Identities
Through managed services identities (MSI), also known as managed identities, we can assign Azure resources with an actual identity within Azure AD. Managed identities can help us to more securely manage programmatic access between Azure resources. In this lesson we walk through a refresh of some of the concepts already discussed within AZ-300, and more specifically focus on: The assignment of identities to Azure resources.The resources that can be authenticated against.
Key Vault is a powerful tool which helps protect secret information in a very secure way. Where the AZ-300 lesson on Key Vault is more focused on configuration, this lesson focuses more on the following. The primary use cases for Key Vault.Compliance certification of Key Vault.Access control at the data layer.
Scenario - Authentication and Authorization
In this scenario, we practice assessing requirements and architecting a solution based on elements that can influence authentication and authorization. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure and has a range of requirements we must meet. This is the one of many scenarios where we will: Walk through information on the current state and goals.Perform an assessment of the requirements.Discuss a possible solution. Please be aware this is just one possible scenario and one possible solution.
Design for Risk Prevention for Identity
Introduction to Risk Prevention for Identity
Welcome to the "Risk Prevention for Identity" section of the course. This brief lesson provides an introduction and helps explain what to can expect within this section.
Identity Security and Risk Management
Within this lesson we discuss what exactly identity security and risk management is. The specific topics we cover are as follows: An approach to identity security and risk management.Common identity risks.Strategies to control identity risks. Links mentioned in this lesson: Multi-factor authentication and identity risks
Azure AD Identity Protection
Azure AD Identity Protection helps identify and respond to a range of risks specific to identity. This lesson covers the following: The purpose of Azure AD Identity Protection.Risks mitigated (including real-time and offline).Licensing requirements. This lesson includes a discussion of some of the policies within the Azure Portal. For more in-depth configuration advice, be sure to check out the related lesson in the AZ-300 course.
Azure AD Conditional Access
As we've discussed, access control is an important element of architecting secure solutions. With Azure AD Conditional Access, we can configure access control that takes different circumstances into account to be both dynamic and flexible. In this refresher, we discuss the following: The purpose of Conditional Access.Key elements of Conditional Access policies.Important licensing considerations. For more information on the configuration of Conditional Access, refer to the AZ-300 lessons.
Azure AD Privileged Identity Management
Azure AD Privileged Identity Management (PIM) is a very powerful tool that improves our ability to mitigate against many of the risks we discussed earlier. In this lesson, we discuss: The purpose of PIM.Key features of PIM.The configuration of PIM at a high level.The end-user experience of PIM.
Azure AD Password Protection
This is a high-level introduction to two important features of Azure AD Password Protection. In this lesson we discuss: Banned passwords.Smart lockout. These tools help us protect against the risk of our credentials being compromised.
Azure AD Licensing
We've discussed a range of different Azure AD features so far, and as a solution architect, it's important to understand what features are free and which require a license. This lesson provides a high-level overview of some of the important considerations for Azure AD licensing. It's recommended to review the Azure AD licenses and the interactive diagram page to understand which licenses are required for the features we've already discussed. Please review the Microsoft Azure AD licensing page.
Scenario - Identity Risk Prevention
In this scenario, we practice assessing requirements and architecting a solution based on elements that can influence identity risk prevention. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure and has a range of requirements we must meet. This is the one of many scenarios where we will: Walk through information on the current state and goals.Perform an assessment of the requirements.Discuss a possible solution. Please be aware this is just one possible scenario and one possible solution.
Monitoring for Identity and Security
Introduction to Monitoring Identity and Security
Welcome to the "Monitoring Identity and Security" section of the course. This brief lesson provides an introduction and helps explain what to expect within this section of the course.
Azure AD Monitoring - Part 1
With identity being so central to modern solutions, it's important that we consider monitoring for Azure AD and related products. Within part one of this lesson, we cover the following. Azure AD security reports.Azure AD activity reports.Azure AD monitoring with Azure Monitor. In part two, we continue by discussing monitoring approaches for some of the additional Azure AD products.
Azure AD Monitoring - Part 2
This is the second part of our lesson on monitoring Azure AD. Withing this lesson, we cover the following. Azure AD Identity Protection monitoring and alerts.Azure AD PIM monitoring and alerts.Access reviews (within Azure AD PIM and Azure AD).
Azure AD Connect Health
With hybrid identity being quite common and important for enterprises migrating to Azure, it helps to understand options for monitoring Azure AD Connect infrastructure. In this lesson we discuss the following. Azure AD Connect Health.Agent installation requirements.Monitoring functionality available within the portal.
Scenario - Monitoring Identity
In this scenario, we practice assessing requirements and architecting a solution based on elements that can influence identity monitoring. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure and has a range of requirements we must meet. This is the one of many scenarios where we will: Walk through information on the current state and goals.Perform an assessment of the requirements.Discuss a possible solution. Please be aware this is just one possible scenario and one possible solution.
Design a Data Platform Solution
Design a Data Management Strategy
Introduction to Data Management
Welcome to the "Data Management" section of the course. This brief lesson provides an introduction and helps explain what to expect within this section of the course.
Data Platform Fundamentals
Before we get started discussing the various data management solutions, it helps to be familiar with a range of data management concepts. This lesson provides an overview of a range of data management concepts which we need to understand as a solution architect. In this lesson we will discuss: Relational and non-relational databasesData warehouseData lakes Through this lesson you will learn more about important concepts such as transaction processing, analytics, structured and unstructured data, and so on. This lesson serves as a foundation for the remaining lessons in this section of the course.
Azure SQL - Introduction
Azure SQL is one of Microsoft's primary relational database management systems (RDBMS). To support various workloads, Azure SQL provides a range of functionality, and supports several deployment options. Within this lesson, we will discuss: Deployment options, and when to use eachPricing (including DTU and vCore)Scalability and performanceImportant considerations This lesson acts as a foundation for later lessons on Azure SQL, and provides an overview of various features and capabilities.
Cosmos DB - Introduction
Cosmos DB is a non-relational database built for planet-scale applications. In this lesson we will discuss: Cosmos DB purpose and use cases,Pricing influences,Performance and scalability (including consistency models),Important considerations. We will use this lesson as a foundation for further lessons in this section of the course. Helpful links: Cosmos DB billing explained
Azure SQL Data Warehouse - Introduction
Data warehouses are a valuable tool in any enterprise looking to gain insights from data they already have stored across multiple data platforms. Azure SQL Data Warehouse provides access to a highly scalable, and capable fully managed data warehouse solution. Within this lesson we will discuss: The purpose of Azure SQL Data Warehouse (DW),Pricing,Scalability, andImportant considerations
Azure Data Lake Storage - Introduction
With the influx of big data, before we can analyze and gain insights from this huge variety and volume of data, we need somewhere to store it. In this lesson we'll discuss: Azure Data Lake Storage's role in big data storage,Pricing and scalability, andImportant considerations. Azure Data Lake Storage (ADLS) is different from Azure Data Lake Analytics, which is one possible tool that can be used to analyze big data.
Scenario - Data Management
In this scenario, we practice assessing requirements and architecting a solution based on elements that can influence data management. This is a scenario based on a fictitious company called The Pupper Club (TPC). TPC is looking to move to Azure and has a range of requirements we must meet. This is the one of many scenarios where we will: Walk through information on the current state and goals.Perform an assessment of the requirements.Discuss a possible solution. Please be aware this is just one possible scenario and one possible solution.
Design and Document Data Flows
Upcoming Lesson: Introduction to Data Flows
Upcoming Lesson: Data Flow Fundamentals
Upcoming Lesson: Azure Data Factory
Upcoming Lesson: Azure Databricks
Upcoming Lesson: Scenario - Data Flows
Design a Data Protection Strategy
Upcoming Lesson: Introduction to Data Protection
Upcoming Lesson: Data Protection Fundamentals
Upcoming Lesson: Data Security
Upcoming Lesson: Azure SQL Database - Data Protection
Upcoming Lesson: Azure SQL Data Warehouse - Data Protection
Upcoming Lesson: Azure Cosmos DB - Data Protection
Upcoming Lesson: Scenario - Data Protection
Data Platform Monitoring
Upcoming Lesson: Introduction to Data Platform Monitoring
Upcoming Lesson: Monitoring Data Platforms
Design a Business Continuity Strategy
Design a Site Recovery Strategy
Upcoming Lesson: Introduction to Site Recovery
Upcoming Lesson: Site Recovery Concepts and Terms
Upcoming Lesson: Azure Backup
Upcoming Lesson: Azure Site Recovery
Design for High Availability
Upcoming Lesson: Introduction to High Availability
Upcoming Lesson: High Availability in Azure
Design a Data Archiving Strategy
Upcoming Lesson: Introduction to Data Archiving
Upcoming Lesson: Azure Blob Storage Archiving
Deployment, Migration, and Integration
Upcoming Lesson: Introduction to Deployment Design
Upcoming Lesson: Compute Architecture
Upcoming Lesson: Data Architecture
Upcoming Lesson: Messaging Architecture
Upcoming Lesson: Introduction to Migration Design
Upcoming Lesson: Migration Planning and Principles
Upcoming Lesson: Azure Database Migration Service
Upcoming Lesson: Azure Cosmos DB Data Migration
Upcoming Lesson: Azure Site Recovery Migrations
Design an API Integration Strategy
Upcoming Lesson: Introduction to API Integration
Upcoming Lesson: Azure API Management
Design for Infrastructure
Design a Storage Strategy
Upcoming Lesson: Introduction to Storage Infrastructure Design
Upcoming Lesson: StorSimple
Upcoming Lesson: Managed and Unmanaged Disks
Upcoming Lesson: Blob Storage
Upcoming Lesson: Azure Files
Upcoming Lesson: Azure File Sync
Design a Compute Strategy
Upcoming Lesson: Introduction to Compute Infrastructure Design
Upcoming Lesson: Azure Compute Services
Upcoming Lesson: High Performance Compute
Design a Networking Strategy
Upcoming Lesson: Introduction to Network Infrastructure Design
Upcoming Lesson: Virtual Networks
Upcoming Lesson: Hybrid Networking
Upcoming Lesson: Accelerated Networking
Upcoming Lesson: Application Gateway
Upcoming Lesson: Load Balancer
Design a Monitoring Strategy for Infrastructure
Upcoming Lesson: Introduction to Infrastructure Monitoring
Upcoming Lesson: Infrastructure Monitoring and Metrics
Upcoming Lesson: Infrastructure Monitoring Alerts and Notification
Upcoming Lesson: What's Next?
Upcoming Lesson: About the Exam