-
Pillars of a great Azure architecture 6
54 min Module 7 Units
-
Introduction 02 minLecture1.1
-
Pillars of a great Azure Architecture 10 minLecture1.2
-
Design for security 10 minLecture1.3
-
Design for performance and scalability 10 minLecture1.4
-
Design for availability and recoverability 10 minLecture1.5
-
Design for efficiency and operations 10 minLecture1.6
-
Pillars of a great Azure architecture – Knowledge Check & Summary 10 questionsQuiz1.1
-
-
Design for security in Azure 7
54 min Module 7 Units
-
Introduction 02 minLecture2.1
-
Defense in depth 10 minLecture2.2
-
Identity management 10 minLecture2.3
-
Infrastructure protection 10 minLecture2.4
-
Encryption 10 minLecture2.5
-
Network security 10 minLecture2.6
-
Design for security in Azure – Knowledge Check & Summary 8 questionsQuiz2.1
-
-
Design for performance and scalability in Azure 6
48 min Module 6 Units
-
Introduction 02 minLecture3.1
-
Scaling up and scaling out 15 minLecture3.2
-
Optimize network performance 10 minLecture3.3
-
Optimize storage performance 09 minLecture3.4
-
Identify performance bottlenecks in you application 09 minLecture3.5
-
Design for performance and scalability in Azure – Knowledge Check & Summary 9 questionsQuiz3.1
-
-
Design for efficiency and operations in Azure 5
42 min Module 5 Units
-
Introduction 02 minLecture4.1
-
Maximize efficiency of cloud spend 15 minLecture4.2
-
Use monitoring and analytics to gain operational insights 08 minLecture4.3
-
Use automation to reduce effort and error 12 minLecture4.4
-
Design for efficiency and operation in Azure – Knowledge Check & Summary 6 questionsQuiz4.1
-
-
Design for availability and recoverability in Azure 5
59 min Module 5 Units
-
Introduction 01 minLecture5.1
-
Build a highly available architecture 20 minLecture5.2
-
Develop a disaster recovery strategy 20 minLecture5.3
-
Protect your data with backup and restore 15 minLecture5.4
-
Design for availability and recoverability in Azure – Knowledge Check & Summary 6 questionsQuiz5.1
-
This content is protected, please login and enroll course to view this content!
Prev
Identity management
Next
Encryption
