Microsoft Certified: Azure Solutions Architect Expert Training AZ-305 kolkata

Azure Architect
AZ-305 Certification

Microsoft Certified: Azure Solutions Architect Expert Training AZ-305

Azure Architect Certification :: Duration : 4 Months
Physical Classroom | Instructor Led Online :: WeekEnd | Evening | Regular Class Available

 Course Introduction AZ-305 Training

The Microsoft Certified: Azure Solutions Architect Expert certification will be earned by completing the following requirements:
Earn the Microsoft Certified: Azure Administrator Associate certification and pass Exam AZ-305 or
Pass Exam AZ-303 (before it retires on March 31, 2022) and Exam AZ-305 Through the aid of practical applications and demos, you will enhance your skills in designing resilient, scalable infrastructure and platform solutions capable of generating value throughout the solution life cycle.

 Key Benefits

The best benefits you get with AEM Kolkata:

 AEM Students are working globally ..

RedHat | TCS | Wipro | CTS | Accenture | Deloitte | Amazon | PWC | Ericsson and many more.....

 This course is for

  • Network Administrators
  • System Administrators
  • Project Managers
  • Consultants
  • Anyone interested in learning Azure Cloud Architecting

AZ-305 Training Details:

Section 1: Analyze resource utilization and consumption
  • configure diagnostic settings on resources
  • create baseline for resources
  • create and test alerts
  • analyze alerts across subscription
  • analyze metrics across subscription
  • analyze alerts across subscription
  • create action groups
  • monitor for unused resources
  • monitor spend
  • report on spend
  • utilize Log Search query functions
  • view alerts in Azure Monitor logs
  • visualize diagnostics data using Azure Monitor Workbooks
  • configure network access to the storage account
  • create and configure storage account
  • generate shared access signature
  • Attaching Volumes (EBS ) with EC2 instances
  • Taking Snapshot of data volumes
  • implement Azure AD authentication for storage
  • Migration of Instances
  • install and use Azure Storage Explorer
  • Lost Key Management for EC2 instances
  • Backup and Restore of EC2
  • manage access keys
  • monitor activity log by using Azure Monitor logs
  • implement Azure storage replication
  • implement Azure storage account failover
  • configure high availability
  • configure monitoring
  • configure networking/li>
  • configure storage
  • configure virtual machine size
  • implement dedicated hosts
  • deploy and configure scale sets
  • modify Azure Resource Manager template
  • configure location of new VMs
  • configure VHD template
  • deploy from template
  • save a deployment as an Azure Resource Manager template
  • deploy Windows and Linux VMs
  • create and configure Vnet peering
  • create and configure Vnet to Vnet connections
  • verify virtual network connectivity
  • create virtual network gateway
  • configure private IP addressing
  • configure public IP addresses
  • create and configure network routes
  • create and configure network interface
  • create and configure subnets
  • create and configure virtual network
  • create and configure Network Security Groups and Application Security Groups
  • add custom domains
  • configure Azure AD Identity Protection
  • configure Azure AD Join
  • configure self-service password reset
  • implement conditional access policies
  • manage multiple directories
  • perform an access review
  • install and configure Azure AD Connect
  • configure federation
  • configure single sign-on
  • manage and troubleshoot Azure AD Connect
  • troubleshoot password sync and writeback
  • provision VMs
  • create Azure Resource Manager templates
  • configure Azure Disk Encryption for VMs
  • implement Azure Backup for VMs
  • migrate servers using Azure Migrate
  • configure application gateway
  • configure Azure Front Door service
  • configure Azure Traffic Manager
  • create and configure Azure VPN Gateway
  • create and configure site to site VPN
  • configure ExpressRoute
  • configure Virtual WAN
  • verify on premises connectivity
  • troubleshoot on premises connectivity with Azure
  • configure user accounts for MFA
  • configure fraud alerts
  • configure bypass options
  • configure trusted IPs
  • configure verification methods
  • create a custom role
  • configure access to Azure resources by assigning roles
  • configure management access to Azure
  • troubleshoot RBAC
  • implement Azure policies
  • assign RBAC roles
  • create an Azure App Service Web App
  • create documentation for the API
  • create an App Service Web App for containers
  • create an App Service background task by using WebJobs
  • enable diagnostics logging
  • configure diagnostic settings on resources
  • create a container image by using a Dockerfile
  • create an Azure Kubernetes Service
  • publish an image to the Azure Container Registry
  • implement an application that runs on an Azure Container Instance
  • manage container settings by using code
  • implement authentication by using certificates, forms-based authentication, tokens, or
  • Windows-integrated authentication
  • implement multi-factor authentication by using Azure AD
  • implement OAuth2 authentication
  • implement Managed identities for Azure resources Service Principal authentication
  • provision VMs
  • create Azure Resource Manager templates
  • configure Azure Disk Encryption for VMs
  • implement Azure Backup for VMs
  • encrypt and decrypt data at rest and in transit
  • encrypt data with Always Encrypted
  • implement Azure Confidential Compute and SSL/TLS communications
  • implement SSL/TLS communications
  • create, read, update, and delete keys, secrets, and certificates by using the KeyVault API
  • configure an app or service to send emails
  • configure Event Grid
  • configure the Azure Relay service
  • create and configure a Notification Hub
  • create and configure an Event Hub
  • create and configure a Service Bus
  • configure queries across multiple products
  • implement autoscaling rules and patterns (schedule, operational/system metrics
  • implement code that addresses singleton application instances
  • implement code that addresses transient state
  • create, read, update, and delete data by using appropriate APIs
  • implement partitioning schemes
  • set the appropriate consistency level for operations
  • provision and configure relational databases
  • configure elastic pools for Azure SQL Database
  • implement Azure SQL Database managed instances
  • create, read, update, and delete data tables by using code
  • identify compliance requirements
  • identify identity and access management infrastructure
  • identify service-oriented architecturess
  • identify accessibility requirements
  • identify availability requirements
  • identify capacity planning and scalability requirements
  • identify deployability requirements
  • identify configurability
  • identify governance requirements
  • identify maintainability requirements
  • identify security requirements
  • identify sizing requirements
  • recommend changes during project execution
  • evaluate products and services to alig
  • create testing scenarios
  • optimize app service costs
  • optimize compute costs
  • optimize identity costs
  • optimize network costs
  • optimize storage costs
  • define logical groupings for resources to be monitored
  • determine levels and storage locations for logs
  • plan for integration with monitoring tools
  • recommend appropriate monitoring tools for a solution
  • specify mechanism for event routing and escalation
  • design auditing for compliance requirements
  • design auditing policies and traceability requirements
  • choose an identity management approach
  • design an identity delegation strategy
  • design an identity repository
  • design self-service identity management
  • design user and persona provisioning
  • define personas
  • define roles recommend appropriate access control strategy
  • choose an authentication approach
  • design a single-sign on approach
  • design for IPSec authentication
  • design for logon authentication
  • design for multi-factor authentication
  • design for network access authentication
  • design for remote authentication
  • choose an authorization approach
  • define access permissions and privileges
  • design secure delegated access
  • recommend when and how to use API Keys
  • design a risk assessment strategy
  • evaluate agreements involving services or products from vendors and contractors
  • update solution design to address and mitigate changes to existing security policies, standards, guidelines and procedures
  • design for alert notifications
  • design an alert and metrics strategy
  • recommend authentication monitors
  • choose between managed and unmanaged data store
  • choose between relational and non-relational databases
  • design a data auditing strategy
  • design a data caching strategy
  • identify data attributes
  • recommend database service tier sizing
  • design a data retention policy
  • design for data availability
  • design for data consistency
  • design for data durability
  • design a data warehouse strategy
  • recommend geographic data storage
  • design an encryption strategy for data at rest
  • design an encryption strategy for data in transmission
  • design an encryption strategy for data in use
  • design a scalability strategy for data
  • design secure access to data
  • design a data loss prevention (DLP) policy
  • identify data flow requirements
  • create a data flow diagram
  • design a data flow to meet business requirements
  • design data flow solutions
  • design a data import and export strategy
  • design for alert notifications
  • design an alert and metrics strategy
  • monitor Azure Data Factory pipelines
  • design a recovery solution
  • design a site recovery replication policy
  • design for site recovery capacity
  • design for storage replication
  • design site failover and failback
  • design the site recovery network
  • recommend recovery objectives
  • identify resources that require site recovery
  • identify supported and unsupported workloads
  • recommend a geographical distribution strategy
  • recommend geographic data storage
  • design an encryption strategy for data at rest
  • design an encryption strategy for data in transmission
  • design an encryption strategy for data in use
  • design a scalability strategy for data
  • design secure access to data
  • design a data loss prevention (DLP) policy
  • design for application redundancy
  • design for autoscaling
  • design for data center and fault domain redundancy
  • design for network redundancy
  • identify resources that require high availability
  • identify storage types for high availability
  • design a disaster recovery strategy for individual workloads
  • design failover/failback scenarios
  • document recovery requirements
  • identify resources that require backup
  • recommend a geographic availability strategy
  • recommend storage types and methodology for data archiving
  • identify business compliance requirements for data archiving
  • identify requirements for data archiving
  • identify SLAs for data archiving
  • design a compute deployment strategy
  • design a container deployment strategy
  • design a data platform deployment strategy
  • design a messaging solution deployment strategy
  • design a storage deployment strategy
  • design a web app and service deployment strategy
  • recommend a migration strategy
  • design data import/export strategies during migration
  • determine the appropriate application migration method
  • determine the appropriate data transfer method
  • determine the appropriate network connectivity method
  • determine migration scope, including redundant, related, trivial, and outdated data
  • determine application and data compatibility
  • design an API gateway strategy
  • determine policies for internal and external consumption of APIs
  • recommend a hosting structure for API management
  • design a storage provisioning strategy
  • design storage access strategy
  • identify storage requirements
  • recommend a storage solution
  • recommend storage management tools
  • design a network provisioning strategy
  • design a network security strategy
  • determine appropriate network connectivity technologies
  • identify networking requirements
  • recommend network management tools
  • recommend network security solutions
  • design for alert notifications
  • design an alert and metrics strategy

 Upcoming Azure Solution Architect AZ-305 Training Class in kolkata AEM - |

Start Date Class Timing Course Duration Course Fees
21st January 2023 8pm-10pm [WeekEnd] Four Months INR 19,800/-
5th February 2023 10am-1pm [WeekEnd] Four Months INR 19,800/-
20th February 2023 1pm-3pm [Mon-Thur] One Month INR 19,800/-

 Benefits of Learning AZURE Cloud

  • Azure is the most stable cloud in Microsoft Technology domain which has a variety of features and high stability.
  • Azure has a significant share in the global cloud computing market.
  • Most demanding cloud for Active Directory based solution.
  • Azure has a more mature model of infrastructure in comparison to other cloud computing services.
  • Azure Administration provides more job opportunities than normal system administration.


What if I miss a session?
Our learning system makes it possible for you to access the recorded session at any time of your convenience. In case you need further clarification on anything related to the content, we also have a dedicated support team in place to help you out. Hence, missing a session won’t be much of a problem.
Do you offer demo classes before enrollment?
Our live sessions are offered only to a limited number of participants to maintain the quality standards. Hence, there is no provision for one to participate without enrollment. However, we can provide you with a few sample recordings of our classes to clarify your doubts. You will have to contact us directly for those samples though.
What should be my internet speed to attend the live classes?
The recommended speed is 2 MBps if you want to attend an uninterrupted live class from AEM.
Are your instructors experienced enough?
All the instructors at AEM are industry experts with a minimum of ten to fifteen years of experience in their relevant fields. They are also further trained by AEM to provide a smooth learning experience to the participants.
Do you provide a course completion certificate?
Of course, we do. We will provide you with a certificate based on a few parameters like exam performance, session attendance, etc. upon the completion of your course.

Contact Us

8B Lake Road, 1st Floor, Lake Market, Behind Lake Mall, Kolkata - 700029

+91 93309 25622