Course 10105
Azure Administration - Azure Integration and Security Certification Exam AZ-101 Bundle
This Azure Certification Bundle Exam AZ-101 has the following courses in a four day week. See the course numbers listed below.
- DE 101011 AZ-101T01: Migrate Servers to Azure
- DE 101021 AZ-101T02: Implementing and Managing Application Services
- DE 101031 AZ-101T03: Implement Advanced Virtual Networking
- DE 10104 AZ-101T04: Secure Identities
This Azure Certification Exam AZ-101 Training Course AZ-101T01 actually teaches IT professionals how to discover, assess, plan and implement a migration of on-premises resources and infrastructure to Azure. Students will learn how to use Azure Migrate to perform the discovery and assessment phase that is critical to a successful migration. Students will also learn how to use Azure Site Recovery for performing the actual migration of workloads to Azure. The course focuses primarily on using ASR on a Hyper-V infrastructure to prepare and complete the migration process. In addition, students learn about other scenarios, such as migration of VMware vSphere Hypervisor virtual machines and System Center VMM Hyper-V machines.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
- Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
- Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
- Review migration strategies for VMWare and System Center VMM virtual machines.
Course Outline
Module 1: Managing Azure Active Directory
In this module, you will be introduced to Azure migration projects and specifically Azure Migrate. Azure Migrate will be your tool of choice for automated server discovery and workload sizing. You will step through the process of using Azure Migrate to create a project, create a collector, assess machine readiness, and estimate cost.
Lessons
- Overview of Cloud Migration
- Azure Migrate: The Process
After completing this module, students will be able to:
- Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
Module 2: Azure Site Recovery
In this module, you will be introduced to Azure Site Recovery (ASR). ASR will be your primary tool for migrating workloads to Azure. You will learn which scenarios are most appropriate for ASR and the features that the product provides. You will also learn how to use the ASR deployment planner to ensure your infrastructure is ready for migration. Lastly, you will walk through the process of implementing ASR on a Hyper-V infrastructure.
Lessons
- Overview of ASR
- Preparing the Infrastructure
- Completing the Migration Process
After completing this module, students will be able to:
- Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
Module 3: Additional Migration Scenarios
In this module, you will complete your study of Azure migration by looking at two different migration scenarios. In the first scenario you will see how to migrate VMware vSphere Hypervisor virtual machines to Azure using ASR. In the second video series we will migrate System Center VMM Hyper-V machines.
Lessons
- VMWare Migration
- System Center VMM Migration: Video Walkthrough
After completing this module, students will be able to:
- Review migration strategies for VMWare and System Center VMM virtual machines.
Learn about Microsoft 365 Compliance Management, including data retention and data loss prevention solutions in Microsoft 365, archiving and retention in Microsoft 365, implementing and managing data governance, and managing search and investigations.
Audience profile
This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths.
At course completion
After completing this course, students will be able to:
- Understand Data Governance in Microsoft 365, including: Archiving, Retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 Message Encryption, Data Loss Prevention
- Implement In-Place Records Management in SharePoint
- Implement archiving and retention in Exchange
- Create retention policies in the Security and Compliance Center
- Plan their security and compliance needs
- Build ethical walls in Exchange Online
- Create a DLP Policy from a built-in template
- Create a custom DLP policy
- Create a DLP policy to protect documents
- Implement policy tips
- Manage retention in email
- Troubleshoot data governance
- Implement information protection
- Implement Advanced Implementation Protection
- Understand Windows Information Protections
- Search for content in the Security and Compliance Center
- Audit log investigations
- Manage advanced eDiscovery
Course Outline
Module 1: Introduction to Data Governance in Microsoft 365
Lessons
- Introduction to Archiving in Microsoft 365
- Introduction to Retention in Microsoft 365
- Introduction to Information Rights Management
- Introduction to Secure Multipurpose Internet Mail Extension
- Introduction to Office 365 Message Encryption
- Introduction to Data Loss Prevention
Module 2: Archiving and Retention in Microsoft 365
Lessons
- In-Place Records Management in SharePoint
- Archiving and Retention in Exchange
- Retention Policies in the SCC
- Implementing Your Domain Services
Module 3: Implementing Data Governance in Microsoft 365 Intelligence
Lessons
- Planning Your Security and Compliance Needs
- Building Ethical Walls in Exchange Online
- Creating a Simple DLP Policy from a Built-in Template
- Creating a Custom DLP Policy
- Creating a DLP Policy to Protect Documents
- Working with Policy Tips
Module 4: Managing Data Governance in Microsoft 365
Lessons
- Managing Retention in Email
- Troubleshooting Data Governance
- Implementing Information Protection
- Implementing Advanced Information Protection
- Introduction to Windows Information Protection
Module 5: Managing Search and Investigations
Lessons - Searching for Content in the Security and Compliance Center - Auditing Log Investigations - Managing Advanced eDiscovery
Module 6: Hands-On Lab
Lab : Setting Up your Lab Environment
- Exercise 1: Initialize Compliance in Your Organization
Lab : Archiving and Retention in Microsoft 365
- Exercise 1: Configure Retention Tags and Policies
- Exercise 2: Configure AIP and WIP
Lab : Implementing Data Governance
- Exercise 1: Testing DLP Policies
- Exercise 2: Using Azure Information Protection
- Exercise 3: Using Windows Information Protection
Lab : Verify Your Data Governance Policies
- Exercise 1: Investigate your Microsoft 365 Data
This course introduces you to the world of Microsoft 365 device management - from establishing Microsoft Intune, to enrolling devices to Intune, to monitoring the devices, to controlling what users can do from the enrolled devices by using conditional access policies. If you are already managing devices by using a traditional device management tool such as Configuration Manager, you will be interested to know how you can seamlessly move to modern management, in which devices are managed by Intune, and how you can benefit from new device management capabilities, such as compliance, conditional access, and Windows Autopilot to deploy new devices from the cloud.
Audience profile
This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths.
At course completion
After completing this course, students will be able to:
- Plan for Co-management
- Prepare your Windows 10 devices for Co-management
- Transition from Configuration Manager to Intune
- Configure Microsoft Store for Business
- Plan for Mobile Application Management
- Plan your Windows 10 deployment strategy
- Plan your Windows 10 subscription activation strategy
- Resolve Windows 10 upgrade errors
- Implement Windows 10 Analytics
- Deploy Mobile Device Management
- Manage devices with Mobile Device Management
- Enroll devices to Mobile Device Management
- Manage device compliance
Course Outline
Module 1: Planning for Device Management
Lessons
- Introduction to Co-management
- Preparing Your Windows 10 Devices for Co-management
- Transitioning from Configuration Manager to Intune
- Introduction Microsoft Store for Business
- Planning for Mobile Application Management
Module 2: Planning Your Windows 10 Deployment Strategy
Lessons
- Windows 10 Deployment Scenarios
- Planning Your Windows 10 Subscription Activation Strategy
- Resolving Windows 10 Upgrade Errors
- Introduction to Windows Analytics
Module 3: Implementing Mobile Device Management
Lessons
- Planning Mobile Device Management
- Deploying Mobile Device Management
- Enrolling Devices to MDM
- Managing Device Compliance
Module 4: Hands-On Lab
Lab : Working with Microsoft Store for Business
- Exercise 1: Provisioning and managing the Microsoft Store for Business
- Exercise 2: Using the Microsoft Store for Business
Lab : Managing Devices by using Intune
- Exercise 1: Obtain Intune and enable device management
- Exercise 2: Configure Azure AD for Intune
- Exercise 3: Create Intune policies
- Exercise 4: Enroll a Windows 10 device
- Exercise 5: Manage and monitor a device in Intune
This Azure Certification Exam AZ-101 Training Course AZ-101T04 teaches IT Professionals to understand the challenges that organizations face in keeping modern IT environments secure, as the more distributed environments that are part of a cloud-first or hybrid world have rapidly created new security challenges for IT. The course focuses on three key areas in the defense against attackers who target security vulnerabilities, resulting particularly from credential theft and compromised identities: Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and Azure Active Directory Privileged Identity Management (PIM). Students learn to implement two-step verification to secure the sign-in process, as well has how to use advanced features like trusted IPs and Fraud Alerts with MFA to customize their identity access strategy. Using Privileged Identity Management, students learn how to apply just the right amount of access rights for just the right amount of time to the various administrative roles as well as to resources.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
- Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
- Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
- User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Course Outline
Module 1: Introduction to Identity Protection in Azure
In this module, you’ll learn about Role-Based Access Control as the foundation to organizing and managing an organization’s administrative access based on the principle of least privilege. You will also review Azure Active Directory concepts, as well as gaining insight into the threat landscape and security risks that are exposed to IT organizations through breach of privileged access.
Lessons
- Role-Based Access Control
- Azure Active Directory (Refresher)
- Protecting Privileged Access in the Environment
After completing this module, students will be able to:
- Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
Module 2: Using Multi-Factor Authentication for Secure Access
In this module, you’ll learn about securing the sign-in process through Multi-Factor Authentication (MFA). You’ll learn how MFA works and the differences in implementation between on-premises and cloud scenarios. You’ll also learn about using conditional access policies to provide more fine-grained control over apps and resources in your environment.
Lessons
- Introducing Multi-Factor Authentication
- Implementing MFA
After completing this module, students will be able to:
- Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
Module 3: Azure AD Privileged Identity Management
In this module, you’ll learn how to use Azure Privileged Identity Management (PIM) to enable just-in-time administration and control the number of users who can perform privileged operations. You’ll also learn about the different directory roles available as well as newer functionality that includes PIM being expanded to role assignments at the resource level.
Lessons
- Getting Started with PIM
- PIM Security Wizard
- PIM for Directory Roles
- PIM for Role Resources
After completing this module, students will be able to:
- User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
*NOTE: if an average rating and rating count are shown on this page, they are based on all reviews associated with Dynamics Edge that are shown on the review page, and are not restricted to reviews only for the particular course offered on this page.