Microsoft Azure Training

Discover our Microsoft Azure learning paths and certifications

Training Course AZ-900: Microsoft Azure Fundamentals

Overview:

This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools.

Audience Profile:

This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students on this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.

Certification:

This course prepares you for the AZ-900: Azure Fundamentals.

Course Objectives:

After completing this course, students will be able to:

  • Describe cloud concepts.
  • Describe Azure architecture and services.
  • Describe Azure management and governance.
  • Learn about the basics of cloud computing and Azure.
  • Learn about Azure architecture and core services.
  • Learn about some of the core management and governance tools in Azure.
Course Outline

  1. Describe cloud computing.
    o Define cloud computing.
    o Describe the shared responsibility model.
    o Define cloud models, including public, private, and hybrid.
    o Identify appropriate use cases for each cloud model.
    o Describe the consumption-based model.
    o Compare cloud pricing models.
  2. Describe the benefits of using cloud services.
    o Describe the benefits of high availability and scalability in the cloud.
    o Describe the benefits of reliability and predictability in the cloud.
    o Describe the benefits of security and governance in the cloud.
    o Describe the benefits of manageability in the cloud.
  3. Describe cloud service types.
    o Describe Infrastructure as a Service (IaaS).
    o Describe Platform as a Service (PaaS).
    o Describe Software as a Service (SaaS).
    o Identify appropriate use cases for each cloud service (IaaS, PaaS, SaaS)
  4. Describe the core architectural components of Azure.
    o Describe Azure regions, region pairs, and sovereign regions.
    o Describe Availability Zones.
    o Describe Azure datacenters.
    o Describe Azure resources and Resource Groups.
    o Describe subscriptions.
    o Describe management groups.
    o Describe the hierarchy of resource groups, subscriptions, and management groups.
  5. Describe Azure compute and networking services.
    o Compare compute types, including container instances, virtual machines, and functions.
    o Describe virtual machine (VM) options, including VMs, virtual machine scale sets, availability sets, Azure Virtual Desktop.
    o Describe resources required for virtual machines.
    o Describe application hosting options, including Azure Web Apps, containers, and virtual machines.
    o Describe virtual networking, including the purpose of Azure Virtual Networks, Azure virtual subnets, peering, Azure DNS, VPN Gateway, and ExpressRoute.
    o Define public and private endpoints.
  6. Describe Azure storage services.
    o Compare Azure storage services.
    o Describe storage tiers.
    o Describe redundancy options.
    o Describe storage account options and storage types.
    o Identify options for moving files, including AzCopy, Azure Storage Explorer, and Azure File Sync.
    o Describe migration options, including Azure Migrate and Azure Data Box.
  7. Describe Azure identity, access, and security.
    o Describe directory services in Azure, including Azure Active Directory (AD) and Azure AD DS.
    o Describe authentication methods in Azure, including single sign-on (SSO), multifactor. authentication (MFA), and passwordless.
    o Describe external identities and guest access in Azure.
    o Describe Azure AD Conditional Access.
    o Describe Azure Role Based Access Control (RBAC).
    o Describe the concept of Zero Trust.
    o Describe the purpose of the defense in depth model.
    o Describe the purpose of Microsoft Defender for Cloud.
  8. Describe cost management in Azure.
    o Describe factors that can affect costs in Azure.
    o Compare the Pricing calculator and Total Cost of Ownership (TCO) calculator.
    o Describe Azure Cost Management Tool.
    o Describe the purpose of tags.
  9. Describe features and tools in Azure for governance and compliance.
    o Describe the purpose of Azure Blueprints.
    o Describe the purpose of Azure Policy.
    o Describe the purpose of resource locks.
    o Describe the purpose of the Service Trust portal.
  10. Describe features and tools for managing and deploying Azure resources.
    o Describe Azure portal.
    o Describe Azure Cloud Shell, including Azure CLI and Azure PowerShell.
    o Describe the purpose of Azure Arc.
    o Describe Azure Resource Manager (ARM) and Azure ARM templates.
  11.  Describe monitoring tools in Azure.
    o Describe the purpose of Azure Advisor.
    o Describe Azure Service Health.
    o Describe Azure Monitor, including Azure Log Analytics, Azure Monitor Alerts, and Application Insights.

Training Course AZ-104: Microsoft Azure Administrator

Overview:

This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.

Audience Profile:

This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate.

Certification:

This course prepares you for the AZ-104: Microsoft Azure Administrator.

Course Objectives:

After completing this course, students will be able to:

  • Configure Azure Active Directory.
  • Configure user and group accounts.
  • Configure subscriptions.
  • Configure Azure Policy.
  • Configure role-based access control.
  • Configure Azure resources with tools.
  • Use Azure Resource Manager.
  • Configure resources with Azure Resource Manager templates.
  • Configure virtual networks.
  • Configure network security groups.
  • Configure Azure DNS.
  • Configure Azure virtual network peering.
  • Configure network routing and endpoints.
  • Configure Azure Load Balancer.
  • Configure Azure Application Gateway.
  • Configure storage accounts.
  • Configure Azure Blob Storage.
  • Configure Azure Storage security.
  • Configure Azure Files and Azure File Sync.
  • Configure Azure Storage with tools.
  • Configure virtual machines.
  • Configure virtual machine availability.
  • Configure virtual machine extensions.
  • Configure Azure app service plans.
  • Configure Azure App Service.
  • Configure Azure Container Instances.
  • Configure Azure Kubernetes Service.
  • Configure file and folder backups.
  • Configure virtual machine backups.
  • Configure Azure Monitor.
  • Configure Azure alerts.
  • Configure Log Analytics.
  • Configure Azure Network Watcher.
Course Outline

  1. Configure Azure Active Directory.
    o Define Azure AD concepts, including identities, accounts, and tenants.
    o Describe Azure AD features to support different configurations.
    o Understand differences between Azure AD and Active Directory Domain Services (AD DS).
    o Choose between supported editions of Azure AD.
    o Implement the Azure AD join feature.
    o Use the Azure AD self-service password reset feature.
  2. Configure user and group accounts.
    o Configure users accounts and user account properties.
    o Create new user accounts.
    o Import bulk user accounts with a template.
    o Configure group accounts and assignment types.
  3. Configure subscriptions.
    o Determine the correct region to locate Azure services.
    o Review features and use cases for Azure subscriptions.
    o Obtain an Azure subscription.
    o Understand billing and features for different Azure subscriptions.
    o Use Microsoft Cost Management for cost analysis.
    o Discover when to use Azure resource tagging.
    o Identify ways to reduce costs.
  4. Configure Azure Policy.
    o Create management groups to target policies and spending budgets.
    o Implement Azure Policy with policy and initiative definitions.
    o Scope Azure policies and determine compliance.
  5. Configure role-based access control.
    o Identify features and use cases for role-based access control.
    o List and create role definitions.
    o Create role assignments.
    o Identify differences between Azure RBAC and Azure Active Directory roles.
    o Manage access to subscriptions with RBAC.
    o Review built-in Azure RBAC roles.
  6. Configure Azure resources with tools.
    o Manage resources with the Azure portal.
    o Manage resources with Azure Cloud Shell.
    o Manage resources with Azure PowerShell.
    o Manage resources with Azure CLI.
  7. Use Azure Resource Manager.
    o Identify the features and usage cases for Azure Resource Manager.
    o Describe each Azure Resource Manager component and its usage.
    o Organize your Azure resources with resource groups.
    o Apply Azure Resource Manager locks.
    o Move Azure resources between groups, subscriptions, and regions.
    o Remove resources and resource groups.
    o Apply and track resource limits.
  8. Configure resources with Azure Resource Manager templates.
    o List the advantages of Azure templates.
    o Identify the Azure template schema components.
    o Specify Azure template parameters.
    o Locate and use Azure Quickstart Templates.
  9. Configure virtual networks.
    o Describe Azure virtual network features and components.
    o Identify features and usage cases for subnets and subnetting.
    o Identify usage cases for private and public IP addresses.
    o Create and determine which resources require public IP addresses.
    o Create and determine which resources require private IP addresses.
    o Create virtual networks.
  10. Configure network security groups.
    o Determine when to use network security groups.
    o Implement network security group rules.
    o Evaluate network security group effective rules.
    o Examine advantages of application security groups.
  11. Configure Azure DNS.
    o Identify features and usage cases for domains, custom domains, and private zones.
    o Verify custom domain names using DNS records.
    o Implement DNS zones, DNS delegation, and DNS record sets.
  12. Configure Azure virtual network peering.
    o Identify usage cases and product features of Azure virtual network peering.
    o Configure your network to implement Azure VPN Gateway for transit connectivity.
    o Extend peering by using a hub and spoke network with user-defined routes and service chaining.
  13. Configure network routing and endpoints.
    o Implement system routes and user-defined routes.
    o Configure a custom route.
    o Implement service endpoints.
    o Identify features and usage cases for private links and endpoint services.
  14. Configure Azure Load Balancer.
    o Identify features and usage cases for Azure load balancer.
    o Implement public and internal Azure load balancers.
    o Compare features of load balancer SKUs and configuration differences.
    o Configure back-end pools, load-balancing rules, session persistence, and health probes.
  15. Configure Azure Application Gateway.
    o Identify features and usage cases for Azure Application Gateway.
    o Implement Azure Application Gateway, including selecting a routing method.
    o Configure gateway components, such as listeners, health probes, and routing rules.
  16. Configure storage accounts.
    o Identify features and usage cases for Azure storage accounts.
    o Select between different types of Azure Storage and storage accounts.
    o Select a storage replication strategy.
    o Configure network access to storage accounts.
    o Secure storage endpoints.
  17. Configure Azure Blob Storage.
    o Identify features and usage cases for Azure Blob Storage.
    o Configure Blob Storage and Blob access tiers.
    o Configure Blob lifecycle management rules.
    o Configure Blob object replication.
    o Upload and price Blob Storage.
  18. Configure Azure Storage security.
    o Configure a shared access signature (SAS), including the uniform resource identifier (URI) and SAS parameters.
    o Configure Azure Storage encryption.
    o Implement customer-managed keys.
    o Recommend opportunities to improve Azure Storage security.
  19. Configure Azure Files and Azure File Sync.
    o Identify storage for file shares and blob data.
    o Configure Azure Files shares and file share snapshots.
    o Identify features and usage cases of Azure File Sync.
    o Identify Azure File Sync components and configuration steps.
  20. Configure Azure Storage with tools.
    o Configure and use Azure Storage Explorer.
    o Configure the Azure Import/Export service.
    o Use the WAImportExport tool with the Azure Import/Export service.
    o Configure and use AZCopy.
  21. Configure virtual machines.
    o Create a virtual machine planning checklist.
    o Determine virtual machine locations and pricing models.
    o Determine the correct virtual machine size.
    o Configure virtual machine storage.
  22. Configure virtual machine availability.
    o Implement availability sets and availability zones.
    o Implement update and fault domains.
    o Implement Virtual Machine Scale Sets.
    o Autoscale virtual machines.
  23. Configure virtual machine extensions.
    o Identify features and usage cases for virtual machine extensions.
    o Identify features and usage cases for custom script extensions.
    o Identify features and usage cases for desired state configuration.
  24. Configure Azure app service plans.
    o Identify features and usage cases of the Azure App Service.
    o Select an appropriate Azure App Service plan pricing tier.
    o Scale the App Service Plan.
    o Scale out the App Service Plan.
  25. Configure Azure App Services.
    o Identify features and usage cases for the Azure App Service.
    o Create an app with Azure App Service.
    o Configure deployment settings, specifically deployment slots.
    o Secure your Azure App Service app.
    o Configure custom domain names.
    o Backup and restore your Azure App Service app.
    o Configure Azure Application Insights.
  26. Configure Azure Container Instances.
    o Identify when to use containers versus virtual machines.
    o Identify the features and usage cases of Azure Container Instances.
    o Implement Azure Container Groups.
  27. Configure Azure Kubernetes Service.
    o Identify Azure Kubernetes Service (AKS) components including pods, clusters, and nodes.
    o Configure network connections for AKS.
    o Configure storage options for AKS.
    o Implement security options for AKS.
    o Scale AKS including adding Azure Container Instances.
  28. Configure file and folder backups.
    o Identify features and usage cases for Azure Backup.
    o Configure Azure Recovery Services Vault backup options.
    o Implement on-premises file and folder backup.
    o Configure the Microsoft Azure Recovery Services (MARS) agent for Azure Backup.
  29. Configure virtual machine backups.
    o Identify features and usage cases for different Azure backup methods.
    o Configure virtual machine snapshots and backup options.
    o Implement virtual machine backup and restore, including soft delete.
    o Compare the Azure Backup agent to the Azure Backup Server.
    o Perform site-to-site recovery by using Azure Site Recovery.
  30. Configure Azure Monitor.
    o Identify the features and usage cases for Azure Monitor.
    o Configure and interpret metrics and logs.
    o Identify the Azure Monitor components and data types.
    o Configure the Azure Monitor Activity Log.
  31. Configure Azure alerts.
    o Identify Azure Monitor alerts, including alert types and alert states.
    o Configure Azure Monitor alerts.
    o Create alert rules and action groups.
  32. Configure Log Analytics.
    o Identify the features and usage cases for Log Analytics.
    o Create a Log Analytics workspace.
    o Structure a Log Analytics query and review results.
  33. Configure Azure Network Watcher.
    o Identify the features and usage cases for Azure Network Watcher.
    o Configure diagnostic capabilities like IP Flow Verify, Next Hop, and Network Topology.

Training Course AZ-305: Designing Microsoft Azure Infrastructure Solutions

Overview:

This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles.

Audience Profile:

Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions.

Certification:

This course prepares you for the AZ-305: Designing Microsoft Azure Infrastructure Solutions.

Course Objectives:

After completing this course, students will be able to:

  • Design governance.
  • Design an Azure compute solution.
  • Design a data storage solution for non-relational data.
  • Design a data storage solution for relational data.
  • Design data integration.
  • Design an application architecture.
  • Design authentication and authorization solutions.
  • Design a solution to log and monitor Azure resources.
  • Design network solutions.
  • Design a solution for backup and disaster recovery.
  • Design migrations.
  • Build great solutions with the Microsoft Azure Well-Architected Framework.
  • Accelerate cloud adoption with the Microsoft Cloud Adoption Framework for Azure.
  • Configure virtual machine extensions.
  • Configure Azure app service plans.
  • Configure Azure App Service.
  • Configure Azure Container Instances.
  • Configure Azure Kubernetes Service.
  • Configure file and folder backups.
  • Configure virtual machine backups.
  • Configure Azure Monitor.
  • Configure Azure alerts.
  • Configure Log Analytics.
  • Configure Azure Network Watcher.
Course Outline

  1. Design governance.
    o Design for governance.
    o Design for management groups.
    o Design for Azure subscriptions.
    o Design for resource groups.
    o Design for resource tagging.
    o Design for Azure policy.
    o Design for Azure role-based access control.
    o Design for Azure Blueprints.
  2. Design an Azure compute solution.
    o Choose an Azure compute service.
    o Design for Azure Virtual Machines solutions.
    o Design for Azure Batch solutions.
    o Design for Azure App Service solutions.
    o Design for Azure Container Instances solutions.
    o Design for Azure Kubernetes Service solutions.
    o Design for Azure Functions solutions.
    o Design for Azure Logic Apps solutions.
  3. Design a data storage solution for non-relational data.
    o Design for data storage.
    o Design for Azure storage accounts.
    o Design for Azure blob storage.
    o Design for data redundancy.
    o Design for Azure files.
    o Design an Azure disk solution.
    o Design for storage security.
  4. Design a data storage solution for relational data.
    o Design for Azure SQL Database.
    o Design for Azure SQL Managed Instance.
    o Design for SQL Server on Azure Virtual Machines.
    o Recommend a solution for database scalability.
    o Recommend a solution for database availability.
    o Design protection for data at rest, data in transmission, and data in use.
    o Design for Azure SQL Edge.
    o Design for Azure Cosmos DB.
    o Design for Azure Table Storage
  5. Design data integration.
    o Design a data integration solution with Azure Data Factory.
    o Design a data integration solution with Azure Data Lake.
    o Design a data integration and analytics solution with Azure Databricks.
    o Design a data integration and analytics solution with Azure Synapse Analytics.
    o Design strategies for hot, warm, and cold data paths.
    o Design an Azure Stream Analytics solution for data analysis.
  6. Design an application architecture.
    o Describe message and event scenarios.
    o Design a messaging solution.
    o Design an Azure Event Hubs messaging solution.
    o Design an event-driven solution.
    o Design an automated app deployment solution.
    o Design API integration.
    o Design an application configuration management solution.
    o Design a caching solution.
  7. Design authentication and authorization solutions.
    o Design for identity and access management.
    o Design for Azure Active Directory.
    o Design for Azure Active Directory business-to-business (B2B).
    o Design for Azure Active Directory B2C (business-to-customer).
    o Design for conditional access.
    o Design for identity protection.
    o Design for access reviews.
    o Design for managed identities.
    o Design for service principals for applications.
    o Design for Azure Key Vault.
  8. Design a solution to log and monitor Azure resources.
    o Design for Azure Monitor data sources
    o Design for Azure Monitor Logs (Log Analytics) workspaces
    o Design for Azure Workbooks and Azure insights
    o Design for Azure Data Explorer.
  9. Design network solutions.
    o Recommend a network architecture solution based on workload requirements
    o Design for on-premises connectivity to Azure Virtual Network
    o Design for Azure network connectivity services
    o Design for application delivery services
    o Design for application protection services.
  10. Design a solution for backup and disaster recovery.
    o Design for backup and recovery.
    o Design for Azure Backup.
    o Design for Azure blob backup and recovery.
    o Design for Azure Files backup and recovery.
    o Design for Azure virtual machine backup and recovery.
    o Design for Azure SQL backup and recovery.
    o Design for Azure Site Recovery.
  11. Design migrations.
    o Evaluate migration with the Microsoft Cloud Adoption Framework for Azure
    o Describe the Azure Migration and Modernization Program (Azure Migration Framework)
    o Assess your on-premises workloads
    o Select a migration tool
    o Migrate your databases
    o Select an online storage migration tool
    o Migrate offline data.
  12. Build great solutions with the Microsoft Azure Well-Architected Framework.
    o You want to build great things on Azure, but you’re not sure exactly what that means. Using key principles throughout your architecture, regardless of technology choice, can help you design, build, and continuously improve your architecture.
  13. Accelerate cloud adoption with the Microsoft Cloud Adoption Framework for Azure.
    o Do you need a clear path forward for your cloud journey? This learning path includes best practice guidance to help you create a cloud strategy, define a cloud adoption plan, prepare your cloud environment with proper governance, and implement cloud operations in alignment with your organizational needs. Cloud architects and IT professionals will learn and engage with the proven best practices, tools, and documentation in the Cloud Adoption Framework for Azure to build the technical knowledge needed to help your organization successfully adopt the cloud and meet business goals.

Training Course AZ-500: Microsoft Azure Security Technologies

Overview:

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

Audience Profile:

This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization’s data.

Certification:

This course prepares you for the AZ-500: Microsoft Azure Security Technologies.

Course Objectives:

After completing this course, students will be able to:
  • Secure Azure solutions with Azure Active Directory.
  • Implement Hybrid identity.
  • Deploy Azure AD identity protection.
  • Configure Azure AD privileged identity management.
  • Design an enterprise governance strategy.
  • Implement perimeter security.
  • Configure network security.
  • Configure and manage host security.
  • Enable Containers security.
  • Deploy and secure Azure Key Vault.
  • Configure application security features.
  • Implement storage security.
  • Configure and manage SQL database security.
  • Configure and manage Azure Monitor.
  • Enable and manage Microsoft Defender for Cloud.
  • Configure and monitor Microsoft Sentinel.
Course Outline

  1. Secure Azure solutions with Azure Active Directory.
    o Configure Azure AD and Azure AD Domain Services for security.
    o Create users and groups that enable secure usage of your tenant.
    o Use MFA to protect user’s identities.
    o Configure passwordless security options.
  2. Implement Hybrid identity.
    o Deploy Azure AD Connect
    o Pick and configure that best authentication option for your security needs
    o Configure password writeback.
  3. Deploy Azure AD identity protection.
    o Deploy and configure Identity Protection.
    o Configure MFA for users, groups, and applications.
    o Create Conditional Access policies to ensure your security.
    o Create and follow an access review process.
  4. Configure Azure AD privileged identity management.
    o Describe Zero Trust and how it impacts security.
    o Configure and deploy roles using Privileged Identity Management (PIM).
    o Evaluate the usefulness of each PIM setting as it relates to your security goals.
  5. Design an enterprise governance strategy.
    o Explain the shared responsibility model and how it impacts your security configuration.
    o Create Azure policies to protect your solutions.
    o Configure and deploy access to services using RBAC.
  6. Implement perimeter security.
    o Define defense in depth.
    o Protect your environment from denial-of-service attacks.
    o Secure your solutions using firewalls and VPNs.
    o Explore your end-to-end perimeter security configuration based on your security posture.
  7. Configure network security.
    o Deploy and configure network security groups to protect your Azure solutions.
    o Configure and lockdown service endpoints and private links.
    o Secure your applications with Application Gateway, Web App Firewall, and Front Door.
    o Configure ExpressRoute to help protect your network traffic.
  8. Configure and manage host security.
    o Configure and deploy Endpoint Protection.
    o Deploy a privileged access strategy for devices and privileged workstations.
    o Secure your virtual machines and access to them.
    o Deploy Windows Defender.
    o Practice layered security by reviewing and implementing Security Center and Security Benchmarks.
  9. Enable Containers security.
    o Define the available security tools for containers in Azure.
    o Configure security settings for containers and Kubernetes services.
    o Lock down network, storage, and identity resources connected to your containers.
    o Deploy RBAC to control access to containers.
  10. Deploy and secure Azure Key Vault.
    o Define what a key vault is and how it protects certificates and secrets.
    o Deploy and configure Azure Key Vault.
    o Secure access and administration of your key vault.
    o Store keys and secrets in your key vault.
    o Explore key security considers like key rotation and backup / recovery.
  11. Configure application security features.
    o Register an application in Azure using app registration.
    o Select and configure which Azure AD users can access each application.
    o Configure and deploy web app certificates.
  12. Implement storage security.
    o Define data sovereignty and how that is achieved in Azure.
    o Configure Azure Storage access in a secure and managed way.
    o Encrypt your data while it is at rest and in transit.
    o Apply rules for data retention.
  13. Configure and manage SQL database security.
    o Configure which users and applications have access to your SQL databases.
    o Block access to your servers using firewalls.
    o Discover, classify, and audit the use of your data.
    o Encrypt and protect your data while is it stored in the database.
  14. Configure and manage Azure Monitor.
    o Configure and monitor Azure Monitor.
    o Define metrics and logs you want to track for your Azure applications.
    o Connect data sources to and configure Log Analytics.
    o Create and monitor alerts associated with your solutions security.
  15. Enable and manage Microsoft Defender for Cloud.
    o Define the most common types of cyber-attacks.
    o Configure Azure Security Center based on your security posture.
    o Review Secure Score and raise it.
    o Lock down your solutions using Security Center and Defender.
    o Enable Just-in-Time access and other security features.
  16. Configure and monitor Microsoft Sentinel.
    o Explain what Azure Sentinel is and how it is used.
    o Deploy Azure Sentinel.
    o Connect data to Azure Sentinel, like Azure Logs, Azure AD, and others.
    o Track incidents using workbooks, playbooks, and hunting techniques.

Discover our Trainings and certifications

Learn new skills to boost your productivity and enable your organization to accomplish more with our Trainings and Certifications.

THINK

Grow your expertise and advance your career