- Module 1: Learn how using key principles throughout your cloud architecture can help you design and build a solid architectural foundation that you can continuously improve.
- Describe the pillars of the Azure Well-Architected Framework
- Identify key principles for creating a solid architectural foundation
- Module 2: Learn how to use the cost optimization pillar of the Microsoft Azure Well-Architected Framework to design a cloud-based architecture that is efficient, eliminates waste, and gives you full visibility into where your money is spent on cloud resources.
- Use monitoring and analytics to gain cost insights
- Maximize the efficiency of your cloud environment
- Provision resources that are optimized for cost
- Module 3: Learn how to design an Azure architecture that uses modern practices and gives you full visibility into what's happening in your environment.
- Apply modern practices to design, build, and orchestrate resources on Azure
- Gain operational insights by using monitoring and analytics
- Reduce effort and error by using automation
- Identify issues and improve quality in your application by using tests
- Module 4: Learn how to adjust your capacity based on workload and how to optimize network performance, storage, and database performance.
- Scale your capacity based on workload.
- Optimize network performance.
- Optimize storage and database performance.
- Improve application performance by identifying bottlenecks.
- Module 5: Learn how to recover from infrastructure and service failure, loss of data, and disasters by incorporating reliability into your architecture.
- Design a highly available application by leveraging Azure services
- Incorporate Azure disaster recovery capabilities into your architecture
- Protect your application from data loss or corruption
- Module 6: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
- Develop a defense-in-depth approach to securing your architecture
- Choose the technologies to secure your Azure infrastructure
- Develop a strategy for secure identity management
By the end of this module, you'll be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you'll be able to:
By the end of this module, you will be able to:
By the end of this module, you'll be able to: