AZ-700T00 Designing and Implementing Microsoft Azure Networking Solutions

This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. Students cover the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring.

Description

At the end of this course, you will possess the skills needed to: Design, implement and manage hybrid network connections Design and implement core Azure networking infrastructure Design and implement routing and load balancing in Azure Secure and monitor networks Design and implement private access to Azure Services

Prerequisites

Successful Azure Network Engineers start this role with experience in enterprise networking, on-premises or cloud infrastructure and network security. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of software defined networking. Understanding hybrid network connectivity methods, such as VPN. Understanding resilience and disaster recovery, including high availability and restore operations.

View / Download Course Details

Similar events

The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco® Certified Network Associate (CCNA®) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification.

More Information

This course helps you prepare for the Cisco CCNP Data Center and CCIE Data Center certifications. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center.

More Information

The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You'll also learn to understand and implement security principles and automation and programmability within an enterprise network.

More Information

CompTIA A+ Certification Training helps launch your IT career by validating your ability to support enterprise IT systems and understand modern technologies. It prepares you for the Core 1 and Core 2 exams while teaching essential skills to install, configure, and optimize PC hardware and operating systems.

More Information

CompTIA Cloud Essentials+ is the only internationally recognized, vendor-neutral certification utilizing key business principles and fundamental cloud concepts that validate data-driven cloud recommendations. It stands alone in this field by demonstrating that all necessary staff members not just the IT specialists understand how to increase efficiency, manage costs, and reduce security risks for organizations whenever tasked with making current cloud technology decisions.

More Information

This course covers in depth the skills and abilities needed to operate in the cloud, validating that candidates have the technical experience needed to deploy, secure, and automate environments regardless of the vendor solution.

More Information

CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring. This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

More Information

This course teaches you the knowledge and skills required to transform business requirements in support of data-driven decisions by mining data, manipulating data, applying basic statistical methods, and analyzing complex data sets while adhering to governance and quality standards throughout the entire data lifecycle. In addition, this course will help prepare candidates to take the CompTIA Data+ certification exam.

More Information

This vendor-neutral course presents a unified standard of skills for the successful management and securing of data assets. It covers what database administrators need to deploy, manage, and maintain systems, as well as securing those systems and data assets. This course prepares you to take the DataSys+ (DS0-001) exam.

More Information

CompTIA Linux+ validates the skills administrators need to secure the enterprise, power the cloud and keep systems running. The new certification ensures that IT professionals, software developers, cybersecurity engineers and penetration testers have these necessary skills to support today's tech systems. This course will prepare you to take the Linux+ Certification Exam (XK0-005).

More Information

Earning CompTIA's Network+ certification increases your value in the marketplace by providing proof of your knowledge, skills, and ability to manage, maintain, troubleshoot, install, operate, and configure a basic network infrastructure in a vendor-neutral format.

More Information

This course explores waterfall and agile methodologies of project management, giving the learner the knowledge and skills required to manage the project life cycle, coordinate small-to-medium-sized projects, establish a communication plan, manage resources and stakeholders, maintain project documentation and artifacts, and support the completion of larger projects within an information technology (IT) environment.

More Information

This course maps to the CompTIA Security+ certification exam (SK0-701) and establishes the core knowledge required of any cybersecurity role, as well as providing a springboard to intermediate-level cybersecurity jobs. This course emphasizes both the practical and hands-on ability to identify and address security threats, attacks and vulnerabilities.

More Information

This course builds on existing professional experience with personal computer hardware support to present the next tier of skills & concepts students will use on the job when administering any type of network server. This course covers server hardware installation and management, server administration, security and disaster recovery and troubleshooting. This course also prepares you to take the CompTIA Server+ examination (Exam SK0-005).

More Information

Chief Information Security Officer or CCISO, is an executive title in the industry, just like CIO or CEO. This is the highest-level executive charged with information security. The Chief Information Security Officer program does not focus solely on technical knowledge but on the application of information security principles from an executive management point of view.

More Information

EC-Council's CCT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs.

More Information

Learn ethical hacking with the revolutionary CEH v13—a game-changer for aspiring ethical hackers. With 20 cutting-edge modules, you’ll gain the core skills needed to dominate the cybersecurity landscape. CEH isn’t just keeping pace—it’s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you’re always ahead of the curve.

More Information

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE).

More Information

EC-Council's Certified Threat Intelligence Analyst (CTIA) v2 training course is designed to provide cybersecurity professionals with the knowledge and skills to collect, analyze, and interpret threat intelligence to help organizations make informed, strategic decisions and proactively defend against cyber threats.

More Information

Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches.

More Information

This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers.

More Information

This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.

More Information

This course shows experienced Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments.

More Information

This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.

More Information

This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication and identity, networks, high availability, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles.

More Information

This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms.

More Information

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

More Information

This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment.

More Information

This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor.

More Information

This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools.

More Information

Gain the necessary knowledge about how to use Azure services to develop, train, and deploy, machine learning solutions. The course starts with an overview of Azure services that support data science. From there, it focuses on using Azure's premier data science service, Azure Machine Learning service, to automate the data science pipeline. This course is focused on Azure and does not teach the student how to do data science. It is assumed students already know that.

More Information

This course teaches developers how to create application using the SQL API and SDKs for Azure Cosmos DB. Students will learn how to write efficient queries, create indexing policies, manage and provisioned resources, and perform common operations with the SDKs.

More Information

This course covers methods and practices for performing advanced data analytics at scale. Students will build on existing analytics experience and will learn to implement and manage a data analytics environment, query and transform data, implement and manage data models, and explore and visualize data. In this course, students will use Azure Purview, Azure Synapse Analytics, and Power BI to build analytics solutions.

More Information

This course is designed to build your foundational skills in data engineering on Microsoft Fabric, focusing on the Lakehouse concept. This course will explore the powerful capabilities of Apache Spark for distributed data processing and the essential techniques for efficient data management, versioning, and reliability by working with Delta Lake tables. This course will also explore data ingestion and orchestration using Dataflows Gen2 and Data Factory pipelines. This course includes a combination of lectures and hands-on exercises that will prepare you to work with lakehouses in Microsoft Fabric. This course may earn a Credly badge.

More Information

This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

More Information

Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role.

More Information

This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.

More Information

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

More Information

Oracle 19C Database Administration I (Oracle DBA I) is a comprehensive, hands-on course provides concrete information on the design of an Oracle Database instance and database, allowing you to manage your database investment. In this class, you will learn how to create database storage structures that align with your requirements and business models. You will also learn how to create users and administer databases as well as harden the databases to meet your business requirements. This is the foundational course for learning about Oracle Database and it does not assume prior knowledge or Oracle technologies, however you should have incoming experience working with SQL, and be comfortable with Linux and working from the command line. This training is NOT Official Oracle University training.

More Information

Geared for participants experienced with Oracle 19c DBA essentials Oracle 19c Database Administration II (Oracle DBA II) expands their understanding of Oracle database administration. Throughout the course students will explore coverage of Multitenant (CDB/PDB), database tuning, SQL tuning, and backup and recovery: the skills needed to keep a database running reliably and efficiently. The current release of the database is used for exercises and demonstrations, and the content back-ported as necessary for previous releases.

More Information

Geared for DBAs and other technical support staff, Oracle Database 19c Backup and Recovery is a hands-on course that allows you to develop appropriate backup and recovery procedures to address their business model and requirements. Throughout the course you'll explore how to implement basic backup and recovery procedures, move data between databases and files, and employ basic monitoring procedures.

More Information

This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment.

More Information

The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud. This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users.

More Information

Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team.

More Information

The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.

More Information

Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace.

More Information

The DevSecOps Practitioner course is intended as a follow-on to the DevSecOps Foundation course. The course builds on previous understanding to dive into the technical implementation. The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing DevSecOps practices to their organizational structure, building better pipelines in distributed systems, and having a common technological language. This course positions learners to successfully complete the DevSecOps Practitioner certification exam.

More Information

In this course, students will define cloud computing technology and describe its impact on IT scenario.

More Information

Network Defense Essentials (NDE) is a security program covering the fundamental concepts of network security.

More Information

The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco CCNP Security and CCIE Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more.

More Information

This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

More Information

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, and more.

More Information

Network Defense Essentials covers the fundamental concepts of information security and network defence. This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity.

More Information

Upon completing Python for Security Professionals certification training, an individual can acquire skills such as understanding Python language fundamentals, developing Python scripts for automation of tasks, performing network security analysis, implementing cybersecurity strategies and creating detection algorithms using Python. In addition, they would acquire knowledge on how Python is used for penetration testing, system analysis, and ethical hacking.

More Information

The Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense training shows you how to deploy and configure Cisco Secure Firewall Threat Defense system and its features as a data center network firewall or as an Internet Edge firewall with Virtual Private Network (VPN) support.

More Information

E|CIHv3 is the most desirable program according to the top incident handling professionals globally. EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.

More Information

As the technology changes so do the threats. It is critical that you have the necessary training to meet your cyber security objectives. We spend lots of time and effort to secure our data. We need to ensure that employees understand the importance of keeping things secure. Our classes enable you to apply the knowledge you've learned as soon as you return to the office and or home.

More Information

In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.

More Information

The SC-401T00: Information Security Administrator course equips students with essential skills to manage security, compliance, and identity solutions in Microsoft 365, preparing them for a vital role in organizational data protection.

More Information

The CompTIA Tech+ course is designed to equip learners with essential IT skills for a successful career in technology support. The course is designed using a learning progression model that optimizes both information acquisition and skill development related to product learning objectives and job requirements.

More Information

The SecurityX course, formerly known as CompTIA Advanced Security Practitioner (CASP+), is an advanced-level certification program designed to equip cybersecurity professionals with the essential skills and knowledge needed to secure complex enterprise environments.

More Information

CompTIA DataX is designed for experienced professionals aiming to validate their expertise in the evolving field of data science. This course equips learners with the knowledge and skills needed to pass the CompTIA DataX certification exam, focusing on expert-level data science tools, concepts, and processes.

More Information

CloudNetX confirms the skills of seasoned Network Architects to design and integrate secure, scalable solutions in hybrid cloud environments.

More Information

The SC-5008: Configure and Govern Entitlement with Microsoft Entra ID course focuses on enabling students to use Microsoft Entra Identity Governance features for effective access management. Students will gain expertise in managing entitlements, access reviews, log monitoring, and privileged identity management.

More Information

CompTIA A+ Cyber teaches you how to secure devices and home networks, use tools to protect networks of all sizes, and manage both Linux and Windows systems.

More Information