0% found this document useful (0 votes)
56 views12 pages

Academia Microsoft CP

This course provides training to prepare for the AZ-800 exam on administering Windows Server hybrid core infrastructure. It covers topics like deploying and managing identity infrastructure with Active Directory, implementing hybrid technologies in Windows Server management, deploying Azure IaaS VMs, and implementing storage and file services.

Uploaded by

alienwarevenda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views12 pages

Academia Microsoft CP

This course provides training to prepare for the AZ-800 exam on administering Windows Server hybrid core infrastructure. It covers topics like deploying and managing identity infrastructure with Active Directory, implementing hybrid technologies in Windows Server management, deploying Azure IaaS VMs, and implementing storage and file services.

Uploaded by

alienwarevenda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

ACADEMIA MICROSOFT

Administering Windows Server Hybrid Core Infrastructure (AZ-800) – 36h

Objetivos:

 Configure and manage AD DS, Group Policy Objects, and how to implement hybrid identity
with Windows Server
 Prepare you for Exam AZ-800: Administering Windows Server Hybrid Core Infrastructure
 Administer Windows Server securely using the appropriate management tools
 Implement hybrid technologies in Windows Server management
 Deploy and configure Azure IaaS Virtual Machine workloads
 Implement and manage Windows Server virtual machines (VMs) and container workloads
using Windows Server Hyper-V
 Implement and manage networking services in Windows Server. Learn to deploy and manage
DHCP, secure DNS, and implement IP Address Management (IPAM) and Web Application
 Implement and manage Windows Server file servers and storage. Implement Storage Spaces,
data deduplication, and Windows Server Storage Replica
 Deploy Azure File Sync and configure Azure File services

Programa:

Deploy and manage identity infrastructure

 Introduction to AD DS
 Manage AD DS domain controllers and FSMO roles
 Implement Group Policy Objects
 Manage advanced features of AD DS
 Implement hybrid identity with Windows Server
 Deploy and manage Azure IaaS Active Directory domain controllers in Azure

Manage Windows Servers and workloads in a hybrid environment

 Perform Windows Server secure administration


 Describe Windows Server administration tools
 Perform post-installation configuration of Windows Server
 Just Enough Administration in Windows Server
 Administer and manage Windows Server IaaS Virtual Machine remotely
 Manage hybrid workloads with Azure Arc

Manage virtualization and containers in a hybrid environment

 Configure and manage Hyper-V


 Configure and manage Hyper-V virtual machines
 Secure Hyper-V workloads
 Run containers on Windows Server
 Orchestrate containers on Windows Server using Kubernetes
 Plan and deploy Windows Server IaaS Virtual Machines
 Customize Windows Server IaaS Virtual Machine images
 Automate the configuration of Windows Server IaaS Virtual Machines

Implement and operate an on-premises and hybrid networking infrastructure

 Deploy and manage DHCP


 Implement Windows Server DNS
 Implement IP Address Management
 Implement remote access
 Implement hybrid network infrastructure
 Implement DNS for Windows Server IaaS VMs
 Implement Windows Server IaaS VM IP addressing and routing

Configure storage and file services

 Manage Windows Server file servers


 Implement Storage Spaces and Storage Spaces Direct
 Implement Windows Server Data Deduplication
 Implement Windows Server iSCSI
 Implement Windows Server Storage Replica
 Implement a hybrid file server infrastructure

APE Exame AZ-800 – 3h

Configuring Windows Server Hybrid Advanced Services (AZ-801) - 36h

Objetivos:

 Determine if those resources have any security vulnerabilities, and remediate those potential
security vulnerabilities
 Prepare you for Exam AZ-801: Configuring Windows Server Hybrid Advanced Services
 Implement high availability Windows Server virtual machine (VM) workloads with Hyper-V
Replica, Windows Server Failover Clustering, and Windows Server File Server high
availability
 Implement Azure Site Recovery for in on-premises scenarios and to protect your Azure
infrastructure
 Migrate a workload running in Windows Server to an infrastructure as a service (IaaS) virtual
machine (VM) and to Windows Server by using Windows Server migration tools or the
Storage Migration Service
 Monitoring and troubleshooing tools, processes, and best practices to streamline app
performance and availabilty of your Windows Server environment and your Windows Server
IaaS VMs and hybrid instances

Programa:
Secure Windows Server on-premises and hybrid infrastructures

 Secure Windows Server user accounts


 Windows Server update management
 Secure Windows Server DNS
 Implement Windows Server IaaS VM network security
 Audit the security of Windows Server IaaS Virtual Machines
 Manage Azure updates
 Create and implement application allowlists with adaptive application control
 Configure BitLocker disk encryption for Windows IaaS Virtual Machines
 Implement change tracking and file integrity monitoring for Windows IaaS VMs
 Heading Windows Server

Implement Windows Server high availability

 Introduction to Cluster Shared Volumes


 Implement Windows Server failover clustering
 Implement high availability of Windows Server VMs
 Implement Windows Server File Server high availability
 Implement scale and high availability with Windows Server VM

Implement disaster recovery in Windows Server on-premises and hybrid environments

 Implement Hyper-V Replica


 Protect your on-premises infrastructure from disasters with Azure Site Recovery
 Implement hybrid backup and recovery with Windows Server IaaS
 Protect your Azure infrastructure with Azure Site Recovery
 Protect your virtual machines by using Azure Backup

Migrate servers and workloads in on-premises and hybrid environments

 Active Directory Domain Services migration


 Migrate file server workloads using Storage Migration Service
 Migrate Windows Server roles
 Migrate on-premises Windows Server instances to Azure IaaS virtual machines
 Upgrade and migrate Windows Server IaaS virtual machines

Monitor and troubleshoot Windows Server environments

 Monitor Windows Server performance


 Manage and monitor Windows Server event logs
 Implement Windows Server auditing and diagnostics
 Troubleshoot Active Directory
 Monitor Windows Server IaaS Virtual Machines and hybrid instances
 Monitor the health of your Azure virtual machine by using Azure Metrics Explorer and metric
alerts
 Monitor performance of virtual machines by using Azure Monitor VM Insights
 Troubleshoot on-premises and hybrid networking
 Troubleshoot Windows Server Virtual Machines in Azure

APE Exame AZ-801 – 3h


Azure Infrastructure and Deployment (AZ-104) – 36h

Objetivos:

 Prepare for Exam AZ-104: Microsoft Azure Administrator


 Manage Azure Active Directory objects, role-based access control (RBAC), subscriptions, and
governance in Azure
 Manage storage accounts, data in Azure Storage, and Azure File and Blob storage
 Deploy and configure virtual machines, containers, and Web Apps in Azure
 Configure and manage Azure network capabilities like connectivity services, application
protection, application delivery, and network monitoring services
 Monitor resources by using Azure Monitor and implement backup and recover in Azure

Programa:

Prerequisites for Azure administrators

 Configure Azure resources with tools


 Use Azure Resource Manager
 Configure resources with Azure Resource Manager templates
 Automate Azure tasks using scripts with PowerShell
 Control Azure services with the CLI
 Deploy Azure infrastructure by using JSON ARM templates

Manage identities and governance in Azure

 Configure Azure Active Directory


 Configure user and group accounts
 Configure subscriptions
 Configure Azure Policy
 Configure role-based access control
 Create Azure users and groups in Azure Active Directory
 Secure your Azure resources with Azure role-based access control (Azure RBAC)
 Allow users to reset their password with Azure Active Directory self-service password reset

Implement and manage storage in Azure

 Configure storage accounts


 Configure Azure Blob Storage
 Configure Azure Storage security
 Configure Azure Files and Azure File Sync
 Configure Azure Storage with tools
 Create an Azure Storage account
 Control access to Azure Storage with shared access signatures
 Upload, download, and manage data with Azure Storage Explorer

Deploy and manage Azure compute resources


 Configure virtual machines
 Configure virtual machine availability
 Configure virtual machine extensions
 Configure Azure App Service plans
 Configure Azure App Service
 Configure Azure Container Instances
 Configure Azure Kubernetes Service
 Manage virtual machines with the Azure CLI
 Create a Windows virtual machine in Azure
 Host a web application with Azure App Service
 Protect your virtual machine settings with Azure Automation State Configuration

Configure and manage virtual networks for Azure administrators

 Configure virtual networks


 Configure network security groups
 Configure Azure Firewall
 Configure Azure DNS
 Configure virtual network peering
 Configure network routing and endpoints
 Configure Azure Load Balancer
 Configure Azure Application Gateway
 Design an IP addressing schema for your Azure deployment
 Distribute your services across Azure virtual networks and integrate them by using virtual
network peering
 Host your domain on Azure DNS
 Manage and control traffic flow in your Azure deployment with routes
 Improve application scalability and resiliency by using Azure Load Balancer

Monitor and back up Azure resources

 Configure file and folder backups


 Configure virtual machine backups
 Configure Azure Monitor
 Configure Azure alerts
 Configure Log Analytics
 Configure Network Watcher
 Improve incident response with alerting on Azure
 Analyze your Azure infrastructure by using Azure Monitor logs
 Monitor performance of virtual machines by using Azure Monitor VM Insights

APE Exame AZ-104 – 3h

Microsoft Identity and Access Administrator (SC-300) – 36h

Objetivos:
 Create and manage your initial Azure Active Directory (Azure AD) implementation and
configure the users, groups, and external identities you will use to run your solution
 Implement and administer your access management using Azure AD. Use MFA, Conditional
Access, and identity protection to manager your identity solution
 Explore how applications can and should be added to your identity and access solution with
application registration in Azure AD
 Design and implement identity governance for your identity solution using entitlement, access
reviews, privileged access, and monitoring your Azure Active Directory (Azure AD)

Programa:

 Implement an identity management solution


 Implement an authentication and access management solution
 Implement access management for Apps
 Plan and implement an identity governance strategy

Implement an identity management solution

 Implement initial configuration of Azure Active Directory


 Create, configure, and manage identities
 Implement and manage external identities
 Implement and manage hybrid identity

Implement an authentication and access management solution

 Secure Azure Active Directory users with Multi-Factor Authentication


 Manage user authentication
 Plan, implement, and administer Conditional Access
 Manage Azure AD Identity Protection
 Implement access management for Azure resources

Implement access management for Apps

 Plan and design the integration of enterprise apps for SSO


 Implement and monitor the integration of enterprise apps for SSO
 Implement app registration

Plan and implement an identity governance strategy

 Plan and implement entitlement management


 Plan, implement, and manage access review
 Plan and implement privileged access
 Monitor and maintain Azure Active Directory

Microsoft 365 Administrator Essentials (MS-102) – 36h

Objectivos:
 Configure your Microsoft 365 experience
 Manage users, contacts, and licenses in Microsoft 365
 Manage groups in Microsoft 365
 Add a custom domain in Microsoft 365
 Configure client connectivity to Microsoft 365
 Configure administrative roles in Microsoft 365
 Manage tenant health and services in Microsoft 365
 Deploy Microsoft 365 Apps for enterprise
 Analyze your Microsoft 365 workplace data using Microsoft Viva Insights
 Explore identity synchronization
 Prepare for identity synchronization to Microsoft 365
 Implement directory synchronization tools
 Manage synchronized identities
 Manage secure user access in Microsoft 365
 Examine threat vectors and data breaches
 Explore the Zero Trust security model
 Explore security solutions in Microsoft 365 Defender
 Examine Microsoft Secure Score
 Examine Privileged Identity Management
 Examine Azure Identity Protection
 Examine Exchange Online Protection
 Examine Microsoft Defender for Office 365
 Manage Safe Attachments
 Manage Safe Links
 Explore threat intelligence in Microsoft 365 Defender
 Implement app protection by using Microsoft Defender for Cloud Apps
 Implement endpoint protection by using Microsoft Defender for Endpoint
 Implement threat protection by using Microsoft Defender for Office 365

Programa:

Configure your Microsoft 365 experience

 Configure your Microsoft 365 experience


 Manage your tenant subscriptions in Microsoft 365
 Integrate Microsoft 365 with customer engagement apps
 Complete your tenant configuration in Microsoft 365

Manage users, contacts, and licenses in Microsoft 365

 Determine the user identity model for your organization


 Create user accounts in Microsoft 365
 Manage user account settings in Microsoft 365
 Manage user licenses in Microsoft 365
 Recover deleted user accounts in Microsoft 365
 Perform bulk user maintenance in Azure Active Directory
 Create and manage guest users
 Create and manage contacts

Manage groups in Microsoft 36


 Examine groups in Microsoft 365
 Create and manage groups in Microsoft 365
 Create groups in Exchange Online and SharePoint Online

Add a custom domain in Microsoft 365

 Plan a custom domain for your Microsoft 365 deployment


 Plan the DNS zones for a custom domain
 Plan the DNS record requirements for a custom domain
 Create a custom domain in Microsoft 365

Configure client connectivity to Microsoft 365

 Examine how automatic client configuration works


 Explore the DNS records required for client configuration
 Configure Outlook clients
 Troubleshoot client connectivity

Configure administrative roles in Microsoft 365

 Explore the Microsoft 365 permission model


 Explore the Microsoft 365 admin roles
 Assign admin roles to users in Microsoft 365
 Delegate admin roles to partners
 Manage permissions using administrative units in Azure Active Directory
 Elevate privileges using Azure AD Privileged Identity Management

Manage tenant health and services in Microsoft 365

 Monitor the health of your Microsoft 365 services


 Monitor tenant health using Microsoft 365 Adoption Score
 Monitor tenant health using Microsoft 365 usage analytics
 Develop an incident response plan
 Request assistance from Microsoft

Deploy Microsoft 365 Apps for enterprise

 Explore Microsoft 365 Apps for enterprise functionality


 Explore your app compatibility by using the Readiness Toolkit
 Complete a self-service installation of Microsoft 365 Apps for enterprise
 Deploy Microsoft 365 Apps for enterprise with Microsoft Endpoint Configuration Manager
 Deploy Microsoft 365 Apps for enterprise from the cloud
 Deploy Microsoft 365 Apps for enterprise from a local source
 Manage updates to Microsoft 365 Apps for enterprise
 Explore the update channels for Microsoft 365 Apps for enterprise
 Manage your cloud apps using the Microsoft 365 Apps admin center

Analyze your Microsoft 365 workplace data using Microsoft Viva Insights

 Examine the analytical features of Microsoft Viva Insights


 Create custom analysis with Microsoft Viva Insights
 Configure Microsoft Viva Insights
 Examine Microsoft 365 data sources used in Microsoft Viva Insights
 Prepare organizational data in Microsoft Viva Insights

Explore identity synchronization

 Examine authentication options in Microsoft 365


 Examine provisioning options in Microsoft 365
 Explore directory synchronization
 Explore Azure AD Connect

Prepare for identity synchronization to Microsoft 365

 Plan your Azure Active Directory deployment


 Prepare for directory synchronization
 Choose your directory synchronization tool
 Plan for directory synchronization using Azure AD Connect
 Plan for directory synchronization using Azure AD Connect Cloud Sync

Implement directory synchronization tools

 Configure Azure AD Connect prerequisites


 Configure Azure AD Connect
 Monitor synchronization services using Azure AD Connect Health
 Configure Azure AD Connect Cloud Sync prerequisites
 Configure Azure AD Connect Cloud Sync

Manage synchronized identities

 Manage users with directory synchronization


 Manage groups with directory synchronization
 Use Azure AD Connect Sync Security Groups to help maintain directory synchronization
 Configure object filters for directory synchronization
 Troubleshoot directory synchronization

Manage secure user access in Microsoft 365

 Manage user passwords


 Enable pass-through authentication
 Enable multi-factor authentication
 Explore self-service password management
 Implement Azure AD Smart Lockout
 Implement entitlement packages in Azure AD Identity Governance
 Implement conditional access policies
 Create and run an access review
 Investigate authentication issues using sign-in logs

Examine threat vectors and data breaches

 Explore today’s work and threat landscape


 Examine how phishing retrieves sensitive information
 Examine how spoofing deceives users and compromises data security
 Compare spam and malware
 Examine how an account breach compromises a user account
 Examine elevation of privilege attacks
 Examine how data exfiltration moves data out of your tenant
 Examine how attackers delete data from your tenant
 Examine how data spillage exposes data outside your tenant
 Examine other types of attacks

Explore the Zero Trust security model

 Examine the principles and components of the Zero Trust model


 Plan for a Zero Trust security model in your organization
 Examine Microsoft’s strategy for Zero Trust networking
 Adopt a Zero Trust approach

Explore security solutions in Microsoft 365 Defender

 Enhance your email security using Exchange Online Protection and Microsoft Defender for
Office 365
 Protect your organization’s identities using Microsoft Defender for Identity
 Protect your enterprise network against advanced threats using Microsoft Defender for
Endpoint
 Protect against cyber attacks using Microsoft 365 Threat Intelligence
 Provide insight into suspicious activity using Microsoft Cloud App Security
 Review the security reports in Microsoft 365 Defender

Examine Microsoft Secure Score

 Explore Microsoft Secure Score


 Assess your security posture with Microsoft Secure Score
 Improve your secure score
 Track your Microsoft Secure Score history and meet your goals

Examine Privileged Identity Management

 Explore Privileged Identity Management in Azure AD


 Configure Privileged Identity Management
 Audit Privileged Identity Management
 Explore Microsoft Identity Manager
 Control privileged admin tasks using Privileged Access Management

Examine Azure Identity Protection

 Explore Azure Identity Protection


 Enable the default protection policies in Azure Identity Protection
 Explore the vulnerabilities and risk events detected by Azure Identity Protection
 Plan your identity investigation

Examine Exchange Online Protection

 Examine the anti-malware pipeline


 Detect messages with spam or malware using Zero-hour auto purge
 Explore anti-spoofing protection provided by Exchange Online Protection
 Explore other anti-spoofing protection
 Examine outbound spam filtering

Examine Microsoft Defender for Office 365

 Climb the security ladder from EOP to Microsoft Defender for Office 365
 Expand EOP protections by using Safe Attachments and Safe Links
 Manage spoofed intelligence
 Configure outbound spam filtering policies
 Unblock users from sending email

Manage Safe Attachments

 Protect users from malicious attachments by using Safe Attachments


 Create Safe Attachment policies using Microsoft Defender for Office 365
 Create Safe Attachments policies using PowerShell
 Modify an existing Safe Attachments policy
 Create a transport rule to bypass a Safe Attachments policy
 Examine the end-user experience with Safe Attachments

Manage Safe Links

 Protect users from malicious URLs by using Safe Links


 Create Safe Links policies using Microsoft 365 Defender
 Create Safe Links policies using PowerShell
 Modify an existing Safe Links policy
 Create a transport rule to bypass a Safe Links policy
 Examine the end-user experience with Safe Links

Explore threat intelligence in Microsoft 365 Defender

 Explore Microsoft Intelligent Security Graph


 Explore alert policies in Microsoft 365
 Run automated investigations and responses
 Explore threat hunting with Microsoft Threat Protection
 Explore advanced threat hunting in Microsoft 365 Defender
 Explore threat analytics in Microsoft 365
 Identify threat issues using Microsoft Defender reports

Implement app protection by using Microsoft Defender for Cloud Apps

 Explore Microsoft Defender Cloud Apps


 Deploy Microsoft Defender for Cloud Apps
 Configure file policies in Microsoft Defender for Cloud Apps
 Manage and respond to alerts in Microsoft Defender for Cloud Apps
 Configure Cloud Discovery in Microsoft Defender for Cloud Apps
 Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps

Implement endpoint protection by using Microsoft Defender for Endpoint

 Explore Microsoft Defender for Endpoint


 Configure Microsoft Defender for Endpoint in Microsoft Intune
 Onboard devices in Microsoft Defender for Endpoint
 Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management
 Manage device discovery and vulnerability assessment
 Reduce your threat and vulnerability exposure

Implement threat protection by using Microsoft Defender for Office 365

 Explore the Microsoft Defender for Office 365 protection stack


 Investigate security attacks by using Threat Explorer
 Identify cybersecurity issues by using Threat Trackers
 Prepare for attacks with Attack simulation training

You might also like