- Cloud Introduction
- Characteristics and consideration of cloud
- Cloud model and Cloud services
- Azure Geography
- Availability Zone and Availability set
- Azure account creation and free trial
- Subscriptions and billing
- resource group concept
- lock and unlock on resources
- Azure VM management
- static ip assignment
- public ip
- Disk management
- os disk swiping
- Disk snapshot and restore
- Spot VM instances
- Subnetting and CIDR in Cloud
- Virtual network in Azure
- VNet and Subnet management
- Azure DNS- Private DNS Zone
- Azure vnet peering
- private and service endpoints
- Hub Spoke model of Azure Vnet
- Cloud storage concept
- Azure Storage Account
- Azure file
- Snapshot and restore
- Azure blob
- Versioning and data protection
- Snapshot
- Static web hosting
- Azure firewall
- Network security group
- NSG with VM and with subnet
- NSG inbound and outbout rules management
- Azure resource management using CLI
- Introduction to json and ARM
- Azure resource management using ARM template
- Azure VM image creation
- Virtual machine scaleset
- Private and public load balancer
- NAT rules
- Load balancing rules
- Azure application gateway
- WAF ( web application firewall )
- Routing rules
- Web App-service
- Hosting application code with web app service
- Git based deployment
- Deployment slot
- Azure Database (mysql)
- Connecting and managing Azure database from local machine.
- hosting webapp php and connecting to DB
- What is kubernetes
- Containers and VM
- Creating AKS instance
- Deploying hello world container app
- Exposing app with load balancer service
- Security patching and upgradation of AKS
- Azure monitoring (insight)
- VM and resource monitoring
- Dashboard understanding
- Azure logging ( log aalytics workspace )
- Indexing resources log
- Customizing log options
- Log sink
- Migration of on premise vmware infrastructure to azure
- Migration of local disk to azure as vm
- Microsoft Entra ID
- Concept of tenent
- Authentication (users, guest users & groups)
- Authorization (roles and policies)
- Role assignments
- Service principal
- OIDC token creation
- Application authentication.