starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Certifications
  2. >
  3. Become an Azure Expert

Become an Azure Expert

This certification course is targeted at experienced IT experts, the exam covers a variety of subjects and services, all of which are covered in this latest course updated as per Microsoft Exam Curriculum. It also includes practice test after completing the training courses
Scott Duffy
Anand Rao Nednur
Anand Rao NednurScott Duffy
Cloud | core | 47 hours 20 minutes

    Discussions

Overview

3.5KSTUDENTS*
96.8%RECOMMEND*

This journey includes:

  • 47+ hours of on-demand video
  • 22 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
This certification course is targeted at experienced IT experts, the exam covers a variety of subjects and services, all of which are covered in this latest course updated as per Microsoft Exam Curriculum. It also includes practice test after completing the training courses The program's framework consists of lectures covering 3 separate topics:
  1. AZ-104: Microsoft Azure Administrator - Certification Program - This course teaches the participants to prepare for AZ 104 Certification. We will dive into all aspects of Azure service offerings and work our way with simple tasks like creating virtual machines , storage accounts etc. We would also learn how to manage them using Powershell and Azure CLI.
  2. AZ-304: Microsoft Azure Architect Design - Certification Program - The AZ-304 exam is targeted at experienced IT experts, the exam covers a variety of subjects and services, all of which are covered in this latest course updated as per Microsoft Exam Curriculum. This course will lead you through a series of sections, modules, and demos to prepare you for taking, and ultimately passing, the Microsoft Azure AZ-304 exam.
  3. SC-900: Microsoft Security, Compliance and Identity Fundamentals - Certification Program - This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services. This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.
The program's framework consists of practice tests:
  1. AZ-300: Azure Architect Technologies Practice Tests
  2. AZ-500: Microsoft Azure Security Technologies Practice Tests
  3. AZ-900: Microsoft Azure Fundamentals Practice Tests
 

Skills You Will Gain

AZ-104
AZ-500
Azure
Microsoft Azure

Learning Outcomes (At the end of this program you will be able to)

  • Understand how to design solutions for the Microsoft Azure platform 
  • Understand the primary concepts in Azure in order to architect solutions for an organization 
  • Stay updated on the latest updates to Azure’s ever-changing platform 
  • Discover and consume enterprise data assets with Azure Catalog. 
  • Manage subscriptions, accounts, Azure policies, and Role-Based Access Control 
  • Configure and manage Azure virtual networks 
  • Configure and manage Traffic Management 
  • Manage and Secure identities with Azure Active Directory and users and groups 
  • Administer Azure using the Resource Manager, Azure portal, Cloud Shell, Azure PowerShell, CLI, and ARM templates. 
  • Configure virtual networks including planning, IP addressing, Azure DNS, Network Security Groups, and Azure Firewall. 
  • Configure intersite connectivity solutions like VNet Peering, virtual network gateways, and Site-to-Site VPN connections. 
  • Manage network traffic using network routing and service endpoints, Azure load balancer, and Azure Application Gateway. 
  • Implement, manage and secure Azure storage accounts, blob storage, and Azure files with File Sync. 
  • Administer Azure App Service, Azure Container Instances, and Kubernetes. 
  • Backup files, folders, and virtual machines. 
  • Monitor the Azure infrastructure with Azure Monitor, Azure alerts, Log Analytics, and Network Watcher. 
  • Describe the concepts of Information security, compliance, and identity as it relates to Azure and related Microsoft Products 
  • Describe the capabilities of Microsoft identity and access management solutions 

 

Who Should Attend

  • T Administrators 
  • Software Developers 
  • Cloud administrators 
  • Software Architects
  • IT professionals preparing for Microsoft’s Azure exams
  • participants who have knowledge of other cloud platforms like AWS or Google cloud and want to explore Azure cloud service offerings 
  • Participants looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. 

Curriculum

Experts

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
AZ-304: Microsoft Azure Architect Design – Certification Program

AZ-304: Microsoft Azure Architect Design – Certification Program

Part 2: AZ-304: Microsoft Azure Architect Design – Certification Program

Build Realistic and Complex / fault-tolerant Architectures easily on Microsoft Azure.

AZ-104: Microsoft Azure Administrator – Certification Program

AZ-104: Microsoft Azure Administrator – Certification Program

Part 1: AZ-104: Microsoft Azure Administrator – Certification Program

Learn and Prepare for Azure 104 certification - Learn it the right way + 2 Full Practice Tests

SC-900: Microsoft Security Compliance and Identity Fundamentals – Certification Program

SC-900: Microsoft Security Compliance and Identity Fundamentals – Certification Program

Part 3: SC-900: Microsoft Security Compliance and Identity Fundamentals – Certification Program

This course is a comprehensive overview of what effective business analysts really do - their strategies, techniques, tools and methods – all which apply to any process whether it’s a traditional large project, and Agile or DevOps project.

AZ-300 Architect Technologies Practice Tests

AZ-300 Architect Technologies Practice Tests

Part 4: AZ-300 Architect Technologies Practice Tests

This course is a set of three (3) realistic test banks that are perfect for you to practice to pass the AZ-300 Azure Architect exam.

1Welcome to the course!
2Part A
3Part B
4Part C
1Welcome to the course!
2Module 1: Introduction
3Module 2: Identity
4Module 3: Governance and Compliance
5Module 4: Azure Administration
6Module 5: Virtual Networking
7Module 6: Inter connectivity
8Module 7: Network Traffic Management
9Module 8: Azure Storage
10Module 9: Azure Virtual Machines
11Module 10: Serverless Computing
12Module 11: Data Protection
13Module 12: Monitoring
1Welcome to the course!
2Module 1: Course Introduction
3Module 2: Design Monitoring
4Module 3: Design Identity and Security
5Module 4: Design Data Storage
6Module 5: Design Business Continuity
7Module 6: Design Infrastructure
1Welcome to the course!
2Module 1: Describe the concepts of security, compliance and identity
3Module 2: Describe the capabilities of Microsoft identity and access
4Module 3: Describe the capabilities of Microsoft security solution
5Module 4: Describe the capabilities of Microsoft compliance solution

About this course: AZ-300 Architect Technologies Practice Tests

A message from Scott Duffy (Your instructor)

A message from Paul Siegel (Program Manager - Support)

Instructor bio - Scott Duffy

Some added benefits

About this course: Overview, Learning Outcomes, Who Should Enroll...

Practice Test B

About this course: Overview, Learning Outcomes, Who Should Enroll...

Practice Test C

About this course: Overview, Learning Outcomes, Who Should Enroll...

Anand Rao Nednur

Anand Rao Nednur

He is a distinguished expert in cloud computing and cybersecurity with a deep passion for advancing IT infrastructure and security solutions. With extensive experience in Active Directory, AWS, Azure, and Google Cloud Platform, he has led numerous projects that integrate complex cloud technologies and enhance security measures.

His background spans a diverse range of roles, from senior cloud architect to cybersecurity consultant, where he has designed and implemented scalable cloud solutions, conducted security assessments, and guided organizations through successful cloud migrations. His expertise includes managing and optimizing cloud environments, with a focus on Azure governance, monitoring, and compliance.

He has a proven track record in advising on cloud security frameworks, identity and access management, and developing automation scripts to streamline processes. His approach is rooted in practical, hands-on experience, ensuring that theoretical knowledge is grounded in real-world application and addresses the latest challenges in cloud and security domains.

Committed to sharing his knowledge and insights, he delivers comprehensive training programs and consulting services to equip professionals with the skills needed to excel in cloud environments and cybersecurity. Whether through hands-on labs, practical case studies, or strategic consultations, his goal is to empower individuals and organizations to navigate the complexities of modern IT landscapes effectively.

VIEW MY CHANNEL

Segment - 04 - Identity Introduction

Segment - 05 - AAD Features and Benefits

Segment - 06 - Azure AD vs ADDS

Segment - 07 - Azure Active Directory Lab Activity 1

Segment - 08 - Managing Azure AD with Powershell Lab Activity

Segment - 09 - All about Azure AD Groups

Segment - 10 - Managing Azure AD Groups with Powershell Lab Activity

Segment - 11 - What is Multi Factor Authentication

Segment - 12 - Multi Factor Authentication LAB Activity

Segment - 13 - Authentication methods

Segment - 14 - Types of Azure AD Users

Segment - 15 - Self Service

Segment - 16 - 5 Azure AD Editions

Segment - 17 - Azure AD Domain Join

Segment - 18 - Azure AD Connect

Segment - 19 - Azure AD connect Health

Segment - 20 - Azure AD B2B

Segment - 21 - Azure AD B2C

Segment - 22 - Monitoring azure AD

Scott Duffy

Scott Duffy

Scott Duffy is an accomplished technology educator and architect who has had the honor of teaching TOGAF and Microsoft Azure to a global audience of over 1.1 million students across nearly every country. His journey in the world of technology and education is fueled by a deep passion for continuous learning and a commitment to staying at the forefront of innovation.

An avid reader, writer, and lifelong learner, Scott is dedicated to cutting through digital noise to identify the most transformative platforms and frameworks. This drive for clarity and relevance allows him to deliver practical, high-impact courses that resonate with learners and professionals alike.

Scott's professional background spans a variety of high-impact roles—from consulting for major media companies to leading complex technology projects. His expertise includes managing large-scale migrations, optimizing cloud infrastructures, and developing sophisticated web solutions. In each of these endeavors, he has consistently focused on delivering measurable results and exceeding client expectations.

As a Chief Architect, Scott has also mentored and led teams in crafting innovative technology solutions for a diverse client base. His leadership style emphasizes empowerment and excellence, helping others reach their full potential while contributing to forward-thinking solutions.

Outside of his professional work, Scott is deeply involved in personal experimentation and independent learning. Embracing the role of a "Chief Experimenter," he continuously explores emerging technologies and develops educational content that bridges theory and practice. His diverse experience and relentless curiosity provide a rich foundation for his teaching, making his courses both insightful and actionable.

VIEW MY CHANNEL

Practice Test A

Segment - 01 - Course Welcome

Segment - 02 - Az 104 Agenda

Segment - 03 - Disclaimer

Segment - 43 - Azure Portal

Segment - 44 - Azure Mobile APP

Segment - 45 - Azure Portal Demo

Segment - 46 - Azure Cloud Shell

Segment - 47 - Azure Cloud Shell Demo

Segment - 48 - Introduction to Powershell-I

Segment - 49 - Introduction to Powershell-II

Segment - 50 - What is a Powershell Modules

Segment - 51 - Azure Modules for Powershell

Segment - 52 - Manage Resource groups with PS

Segment - 53 - Azure RM vs AZ

Segment - 54 - Demo- Working with Azur CLI locally

Segment - 55 - Benefits of Resource Manager

Segment - 56 - Resource providers

Segment - 57 - Resource Providers - Lab Activity

Segment - 58 - Moving Resources

Segment - 59 - Resource Group demonstration

Segment - 60 - Advantages of ARM Templses

Segment - 61 - JSON Warm up

Segment - 62 - parameters and variables

Segment - 63 - Azure Resource manager templates

Segment - 64 - Understanding JSON

Segment - 65 - Demonstration Run templates with PS

Segment - 66 - Interacting with VM using Powershell

Segment - 67 - Cleaning up Resources With Powershell

Segment - 68 - ARM viz

Segment - 204 - Data Protection Agenda

Segment - 205 - Storage Account Replication Options

Segment - 206 - Local Redundant Storage

Segment - 207 - Zone Redundant Storage

Segment - 208 - GRS and RA-GRS

Segment - 209 - GZRS and RA-GZRS

Segment - 210 - Comparing Replication Strategies

Segment - 211 - Azure Backup

Segment - 212 - Recovery Services Vault Backup-I

Segment - 213 - Recovery Services Vault Backup-II

Segment - 214 - Recovery Services Vault Backup-III

Segment - 215 - Azure Site Recovery

Segment - 216 - Data Protection for Virtual Machines

Segment - 217 - Image Vs Snapshots

Segment - 218 - Azure Site Recovery Replication LAB

Segment - 92 - Inter Connectivity Introduction

Segment - 93 - Vnet peering

Segment - 94 - Benefits of Network Peering

Segment - 95 - Vnet Peering Labs

Segment - 96 - Gateway transit

Segment - 97 - Service Chaining

Segment - 98 - Virtual Network Gateway Lab

Segment - 99 - Virtual Network Gateway Lab-I

Segment - 100 - Virtual Network Gateway Lab-II

Segment - 101 - Express Route-I

Segment - 102 - Express Route-II

Segment - 103 - Express Route-III

Segment - 104 - Azure Connectivity Comparison

Segment - 105 - Inter Connectivity Conclusion

Segment - 03 - Introduction to Design for Cost Optimization

Segment - 04 - Azure Cost Calculator and Azure Cost Management

Segment - 05 - Minimize Compute Costs - I

Segment - 06 - Minimize Compute Costs - II

Segment - 07 - Minimize Identity Costs

Segment - 08 - Minimize network costs

Segment - 09 - Minimize Storage Costs

Segment - 10 - Module Review

Segment - 11 - What should be your monitoring strategy

Segment - 12 - What is Compliance and what should be the compliance strategy

Segment - 13 - Understand the Azure monitoring Service

Segment - 14 - Azure Application Insights

Segment - 15 - Azure Monitor - Use Cases

Segment - 16 - Achieving compliance with Azure Policy

Segment - 17 - Azure Sentinel

Segment - 18 - Azure Sentinel - Lab Activity

Segment - 122 - Azure Storage

Segment - 123 - Azure Storage Account

Segment - 124 - Standard and Premium Storage Accounts

Segment - 125 - Storage Types

Segment - 126 - Creating Storage Account Lab Activity

Segment - 127 - Create Storage Account with Powershell Lab Activity

Segment - 128 - Create Storage Account with CLI Lab Activity

Segment - 129 - Azure Storage Explorer Introduction

Segment - 130 - Azure Blob Containers

Segment - 131 - Storage Performance Tiers

Segment - 132 - Uploading Blobs

Segment - 133 - Blob Access Policies

Segment - 134 - Blob Storage Pricing

Segment - 135 - Blob Storage - Lab Activity

Segment - 136 - Azure Files

Segment - 137 - Files Vs Blobs

Segment - 138 - Create Azure File Share ( Lab Activity )

Segment - 139 - Creating File Share with Poweshell and Mouting on Linux ( Lab Activity )

Segment - 140 - Secure File Transfer

Segment - 141 - File Share Snaphots

Segment - 142 - File Share Snapshots Lab Activity

Segment - 143 - Storage Security

Segment - 144 - Authorization Options

Segment - 145 - Shared Access Signatures

Segment - 146 - Shared Access Signatures - Lab Activity

Segment - 147 - Storage Security Encryption

Segment - 148 - Customer Managed Keys

Segment - 149 - SAS Best Practices

Segment - 150 - Blob Public Access Level

Segment - 151 - Supported Operating Systems

Segment - 152 - What is not supported?

Segment - 153 - What is Azure Compute

Segment - 154 - Virtual Machine-I LAB

Segment - 155 - Virtual machine-II LAB

Segment - 156 - Virtual Machine-III LAB

Segment - 157 - Virtual Machine-IV Lab

Segment - 158 - Virtual Machine-V LAB

Segment - 159 - Virtual Machine-VI Lab

Segment - 160 - Creating VM with Powershell

Segment - 161 - Managing Linux Instances

Segment - 162 - Maintenance and Downtime

Segment - 163 - Availability Sets

Segment - 164 - Fault Domain and Update Domain

Segment - 165 - Custom Script Extensions

Segment - 166 - CSE LAB

Segment - 69 - Azure Network Introduction

Segment - 70 - Purpose of Virtual Networks

Segment - 71 - Virtual Networks Lab

Segment - 72 - Creating Virtual Network with PS Lab Activity

Segment - 73 - What are Subnets

Segment - 74 - Multiple NICs - Lab Activity

Segment - 75 - IP Addressing

Segment - 76 - Private IP Addresses

Segment - 77 - Public IP address

Segment - 78 - Manage IP Address Lab Activity

Segment - 79 - Azure Service Endpoints

Segment - 80 - Why use Service Endpoints

Segment - 81 - Service Endpoints Demo

Segment - 82 - Services that support Service Endpoint

Segment - 83 - Domain and custom Domains

Segment - 84 - Azure DNS

Segment - 85 - DNS Delegation

Segment - 86 - private zone Scenario-I

Segment - 87 - private zone Scenario-II

Segment - 88 - Private DNS Demo

Segment - 89 - What are NSG's

Segment - 90 - Scope of NSG

Segment - 91 - NSG Demo

Segment - 23 - Management Groups

Segment - 24 - Create a Management Group

Segment - 25 - Azure Subscriptions

Segment - 26 - How Do you get a subscription

Segment - 27 - Azure Subscription Usage

Segment - 28 - Subscription User Types

Segment - 29 - Resource Limits

Segment - 30 - Resource Tags

Segment - 31 - Pricing Calculator

Segment - 32 - Billing Alerts

Segment - 33 - Reservations

Segment - 34 - RBAC Concepts

Segment - 35 - RBAC ROLES

Segment - 36 - Azure AD Roles and Permissions

Segment - 37 - Role Definitions

Segment - 38 - RBAC Definitions - Powershell

Segment - 39 - Azure AD Users and Powershell

Segment - 40 - Azure Policy

Segment - 41 - Azure Policy - Lab Activity

Segment - 42 - Azure Policy Walk Through and LAB Activity

Segment - 167 - Introduction

Segment - 168 - App Service Plan

Segment - 169 - App Service Plan Pricing Tiers

Segment - 170 - App Service Plan Scaling

Segment - 171 - Auto scaling Features Lab

Segment - 172 - Auto Scale Considerations

Segment - 173 - Creating a Web App

Segment - 174 - Azure App service Features

Segment - 175 - Azure Web App Deployment Options

Segment - 176 - Azure App Deployment Slots

Segment - 177 - Authentication and Authorization

Segment - 178 - Web App Custom Domains

Segment - 179 - App Services - Backup and Restore

Segment - 180 - What are Containers?

Segment - 181 - Containers VS Virtual Machines

Segment - 182 - Containerization Benefits

Segment - 183 - What is Container Orchestration?

Segment - 184 - Azure Container Instances Lab Activity-I

Segment - 185 - Azure Container Instances Lab Activity-II

Segment - 186 - Azure Container Instances Deploy with CLI Lab-III

Segment - 187 - Build Custom Apps and Azure Container Registry LAB Activity

Segment - 188 - Azure Container Groups

Segment - 189 - What is Docker

Segment - 190 - Docker Terminologies

Segment - 191 - Azure Kubernetes Services

Segment - 192 - Azure Kubernetes Services Features

Segment - 193 - AKS Nodes and Clusters

Segment - 194 - AKS Networking Services

Segment - 195 - AKS - Volumes

Segment - 196 - AKS Security

Segment - 197 - AKS and Azure AD Introduction

Segment - 198 - Kubernetes Service Accounts

Segment - 199 - AKS and Azure AD Roles and ClusterRoles

Segment - 200 - Kubernetes LAB Activity-I

Segment - 201 - Kubernetes LAB Activity-II

Segment - 202 - Kubernetes LAB Activity-III

Segment - 203 - Kubernetes Architecture

Segment - 103 - Module 4 introduction

Segment - 104 - Common Compliance Needs

Segment - 105 - Common Compliance Regulations

Segment - 106 - Compliance Center

Segment - 107 - What is Compliance Manager

Segment - 108 - What are Controls

Segment - 109 - What are Assessments

Segment - 110 - Understand Compliance Score

Segment - 111 - Chapter Summary

Segment - 112 - The Information Protection and Governance Capabilities of Microsoft 365

Segment - 113 - Know Your Data, Protect Your Data, and Govern Your Data

Segment - 114 - Data Classification Capabilities of Compliance Center

Segment - 115 - Content Explorer and Activity Explorer

Segment - 116 - Sensitivity Labels

Segment - 117 - Label Policies

Segment - 118 - Data Loss Prevention

Segment - 119 - Data Loss Prevention on Endpoints and Teams

Segment - 120 - Retention Polices and Retention Labels

Segment - 121 - Records Management

Segment - 122 - Chapter Summary

Segment - 123 - The Insider Risk Capabilities in Microsoft - Introduction

Segment - 124 - Insider Risk Management Workflow

Segment - 125 - Insider Risk Management Workflow

Segment - 126 - Communication Compliance

Segment - 127 - Information Barriers in Microsoft Teams

Segment - 128 - Privileged Access Management

Segment - 129 - Customer Lockbox

Segment - 130 - Lesson Summary

Segment - 131 - eDiscovery Capabilities of Microsoft M365 - Introduction

Segment - 132 - The Purpose of eDiscovery

Segment - 133 - The Capabilities of the Content Search

Segment - 134 - The Core eDiscovery Workflow

Segment - 135 - The Advanced eDiscovery workflow

Segment - 136 - Lesson Summary

Segment - 137 - The Audit Capabilities of Microsoft 365- Introduction

Segment - 138 - The Core Audit Capabilities of M365

Segment - 139 - What are the Advance Auditing Capabilities

Segment - 140 - High Bandwidth for O365 APi Activities

Segment - 141 - Lesson Summary

Segment - 142 - Describe the Resource Governance Capabilities- Introduction

Segment - 143 - Resource Manager - Locks

Segment - 144 - What is Azure Blueprints

Segment - 145 - What is Azure Policy

Segment - 146 - Difference between Azure Policy and RBAC

Segment - 147 - Cloud Adoption Framework

Segment - 106 - System Routes

Segment - 107 - User Defined Routes

Segment - 108 - What is Load Balancer-I

Segment - 109 - What is Load Balancer-II

Segment - 110 - Public Load Balancer

Segment - 111 - Internal Load Balancer

Segment - 112 - Load Balancer SKU_s

Segment - 113 - Load Balancer Lab Part 1

Segment - 114 - Load Balancer Lab Part 2

Segment - 115 - Load Balancer Lab Part 3

Segment - 116 - Azure Traffic Manager

Segment - 117 - Priority Routing

Segment - 118 - Performance Routing

Segment - 119 - Geographic Routing

Segment - 120 - Weighted Routing

Segment - 121 - Traffic manager profiles Lab Activity

Segment - 94 - Introduction to Site recovery

Segment - 95 - Principles of Disaster Recovery and Business Continuity

Segment - 96 - Azure Site Recovery : Replication

Segment - 97 - Azure Site Recovery : Backup

Segment - 98 - Design for Archival - Introduction

Segment - 99 - Design for Archival - Fundamentals of Archival

Segment - 100 - Design for Archival - Azure Storage Account & Using Account Tiers

Segment - 101 - High Availability - Introduction

Segment - 102 - Concepts of High Availability

Segment - 103 - High Availability for Azure Data Centers

Segment - 104 - High Availability for Azure Storage

Segment - 105 - High Availability for Connectivity

Segment - 01 - Course Introduction

Segment - 02 - Security Concepts and Methodologies - Introduction

Segment - 03 - Zero Trust Guidelines

Segment - 04 - Zero Trust Six Foundational Pillars

Segment - 05 - Shared Responsibility Model

Segment - 06 - Defense in Depth Edited

Segment - 07 - The CIA Triad Edited

Segment - 08 - Describe Common Threats

Segment - 09 - Describe Encryption , hashing and Signing - I

Segment - 10 - Describe Encryption , hashing and Signing - II

Segment - 11 - Conclusion

Segment - 12 - Microsoft security and compliance principles - Introduction

Segment - 13 - Microsoft Privacy Principles

Segment - 14 - What is Service Trust Portal?

Segment - 15 - Azure Compliance Documentation

Segment - 16 - Chapter Summary

Segment - 19 - Design Identity and Security - Module Introduction

Segment - 20 - Introduction to Identities

Segment - 21 - What is an Access controls .

Segment - 22 - Azure AD on LightBoard

Segment - 23 - Azure Active Directory - Introduction

Segment - 24 - Authentication and Authorization

Segment - 25 - Authentication authorization and protocols

Segment - 26 - Options Available in Azure AD authentication

Segment - 27 - Single SIgn On

Segment - 28 - SSO Lab Activity

Segment - 29 - All About MFA in Azure

Segment - 30 - OpenID and OAUTH2 - Lab Activity

Segment - 31 - Conditional Access - Lab Activity

Segment - 32 - Azure AD Connect

Segment - 33 - Azure AD connect Health

Segment - 34 - Monitoring Azure AD

Segment - 35 - Self Service

Segment - 36 - Azure AD B2B

Segment - 37 - Azure AD B2C

Segment - 38 - Choosing the right authentication method

Segment - 39 - Design Authorization - Introduction

Segment - 40 - Azure Management Groups

Segment - 41 - Azure Subscriptions

Segment - 42 - Azure Subscription Usage

Segment - 43 - RBAC Concepts

Segment - 44 - RBAC ROLES

Segment - 45 - Azure AD Roles and Permissions

Segment - 46 - Role Definitions

Segment - 47 - Role Definitions - Powershell

Segment - 48 - RBAC Hierarchical Structure

Segment - 49 - Access Reviews Feature

Segment - 50 - Security and Risk Management for Identities

Segment - 51 - Azure AD Identity Protection

Segment - 52 - Monitoring in PIM and Azure AD identity protection

Segment - 53 - Privileged Identity Management (PIM)

Segment - 54 - Azure AD password protection

Segment - 55 - Azure AD Licensing

Segment - 56 - Just In Time - JIT

Segment - 57 - Organizing Resource

Segment - 58 - Meeting Compliance with Azure Policy

Segment - 59 - Azure BluePrints

Segment - 60 - Azure key vault

Segment - 61 - Azure AD Managed Identities

Segment - 219 - Azure Monitoring Service Introduction

Segment - 220 - Key Capabilities

Segment - 221 - Monitoring Data Platform

Segment - 222 - Log Data

Segment - 223 - Data Types

Segment - 224 - Azure Advisor

Segment - 225 - Azure Advisor Lab Activity

Segment - 226 - Activity Log Lab

Segment - 227 - Event Categories

Segment - 228 - Azure Alerts

Segment - 229 - Log Analytics

Segment - 230 - Log Analytics Lab Activity

Segment - 231 - Network Watcher Introduction

Segment - 232 - Network Watcher Connection Monitor Lab

Segment - 233 - Network Watcher Topology Demo

Segment - 234 - Network Watcher IP Flow Verify

Segment - 235 - Network Watcher Next Hop

Segment - 236 - Network Watcher Connection Troubleshoot

Segment - 01 - Course Welcome

Segment - 02 - Course Introduction

Segment - 62 - Storage Fundamentals

Segment - 63 - Azure File Shares

Segment - 64 - Azure Store Simple

Segment - 65 - Data Management Introduction

Segment - 66 - Building Azure SQL Database- I

Segment - 67 - Building Azure SQL Database- II

Segment - 68 - CosmosDB

Segment - 69 - SQL DatawareHouse

Segment - 70 - Azure Synapse Analytics

Segment - 71 - Azure Data Lake Storage

Segment - 72 - Data Flow Introduction

Segment - 73 - Azure data flow fundamentals

Segment - 74 - Azure Data Factory

Segment - 75 - Azure Data Bricks

Segment - 76 - Azure Storage

Segment - 77 - Azure Storage account

Segment - 78 - Standard and premium storage accounts

Segment - 79 - Storage types

Segment - 80 - Creating Storage Account - Lab Activity

Segment - 81 - Create storage account - PS - LAB

Segment - 82 - Azure storage explorer

Segment - 83 - Azure Blob Containers

Segment - 84 - Storage performance tiers

Segment - 85 - Uploading Blobs

Segment - 86 - Blob Access Policies

Segment - 87 - Files VS Blobs

Segment - 88 - Storage security

Segment - 89 - Authorization options

Segment - 90 - Shared Access signatures

Segment - 91 - Shared Access signatures - Lab Activity

Segment - 92 - SAS Best Practices

Segment - 93 - Blob Public Level access

Segment - 106 - Deployment Migration and Integration Introduction

Segment - 107 - Deployment Strategies

Segment - 108 - Azure Resource Manager Templates

Segment - 109 - Azure Automation

Segment - 110 - Fundamentals of Data protection

Segment - 111 - Azure SQL Data protection

Segment - 112 - Azure SQL Data Network Security

Segment - 113 - Data protection for Azure data warehouse

Segment - 114 - Data protection for Cosmos DB

Segment - 115 - Migration Introduction

Segment - 116 - Migration Fundamentals

Segment - 117 - Azure Import Export Service

Segment - 17 - Describe identity concepts - Introduction

Segment - 18 - Common identity attacks

Segment - 19 - Identity As a Security perimeter

Segment - 20 - Four pillars of identity

Segment - 21 - Modern authentication and the role of the identity

Segment - 22 - SSO and the Concept of Federation

Segment - 23 - The concept of directory services and Active Directory

Segment - 24 - Describe the basic services and identity types - Introduction

Segment - 25 - Describe Azure Active Directory

Segment - 26 - Azure AD Editions

Segment - 27 - Describe the Azure AD Identity Types

Segment - 28 - Difference Between System and User Assigned Managed Identity

Segment - 29 - Describe the Types External Identities

Segment - 30 - Describe the Concept of Hybrid Identities

Segment - 31 - Describe the Authentication Capabilities of Azure - Introduction

Segment - 32 - Describe the Different Authentication Methods

Segment - 33 - Security Defaults and MFA

Segment - 34 - MFA in Azure AD - Part 1

Segment - 35 - MFA in Azure AD - Part 2

Segment - 36 - Windows Hello

Segment - 37 - Why is Windows Hello Safer than a Password

Segment - 38 - Self-Service Password Reset in Azure AD

Segment - 39 - Password Protection and Management Capabilities of Azure AD

Segment - 40 - Protecting Against Password Spray

Segment - 41 - Hybrid security

Segment - 42 - Describe the access management Capabilities of Azure AD

Segment - 43 - Conditional access in Azure AD

Segment - 44 - Conditional access in Azure AD - II

Segment - 45 - Conditional access in Azure AD - III

Segment - 46 - Azure AD Roles Custom Roles

Segment - 47 - Chapter Summary

Segment - 48 - Describe the identity protection and governance capabilities of Azure AD

Segment - 49 - What is Identity Governance?

Segment - 50 - What is Identity lifecycle?

Segment - 51 - Access Lifecycle-edited

Segment - 52 - Privileged access lifecycle

Segment - 53 - What is Entitlement management?

Segment - 54 - Azure AD access reviews

Segment - 55 - Azure AD terms of use

Segment - 56 - Capabilities of Privileged identity Management

Segment - 57 - Introduction

Segment - 58 - Network security groups

Segment - 59 - Inbound and outbound security rules

Segment - 60 - What is DDOS?

Segment - 61 - Azure DDOS protection plans and pricing

Segment - 62 - Azure Firewall

Segment - 63 - Azure Bastion Host

Segment - 64 - Web Application Firewall

Segment - 65 - Azure Encryption

Segment - 66 - Azure Key vault

Segment - 67 - Lesson Summary

Segment - 68 - Cloud Security Posture management

Segment - 69 - Azure Security Center

Segment - 70 - Azure Security Center - Features

Segment - 71 - Azure Security Center - Security Score

Segment - 72 - Azure Defender

Segment - 73 - Azure Security Benchmark

Segment - 74 - Azure Security Center - Pricing Tiers

Segment - 75 - Lesson Summary

Segment - 76 - Describe the Security Capabilities of Azure Sentinel - Introduction

Segment - 77 - Define the concepts of SIEM, SOAR, XDR

Segment - 78 - Azure Sentinel

Segment - 79 - Azure Sentinel Features

Segment - 80 - Azure Sentinel - Pricing

Segment - 81 - Lesson Summary

Segment - 82 - Describe the threat protection capabilities of - Introduction

Segment - 83 - Microsoft 365 Defender services - Introduction

Segment - 84 - Microsoft Defender for Identity

Segment - 85 - Microsoft Defender for O365

Segment - 86 - Microsoft Defender for Endpoint

Segment - 87 - What is CASB

Segment - 88 - The Cloud App Security framework

Segment - 89 - Microsoft Cloud App Security architecture

Segment - 90 - O365 Cloud App security And Azure AD Cloud App Discovery

Segment - 91 - Chapter Summary

Segment - 92 - Security Management Capabilities of M365 - Introduction

Segment - 93 - Microsoft 365 Security Center - Introduction

Segment - 94 - How to use Microsoft Secure Score

Segment - 95 - Differences between the Azure and Microsoft Secure Score

Segment - 96 - Managing Incidents

Segment - 97 - Chapter Summary

Segment - 98 - Describe Endpoint Security with Microsoft Intune - Introduction

Segment - 99 - What is Intune

Segment - 100 - MDM and MAM

Segment - 101 - Endpoint Security with Intune

Segment - 102 - Chapter Summary