Este treinamento é composto pelos seguintes cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources (Carga: 8h)
2. Course AZ-100T02-A: Implementing and Managing Storage (Carga: 8h)
3. Course AZ-100T03-A: Deploying and Managing Virtual Machines (Carga: 8h)
4. Course AZ-100T04-A: Configure and Manage Virtual Networks (Carga: 8h)
5. Course AZ-100T05-A: Manage Identities (Carga: 8h)
_____________________________________
Segue abaixo a descrição dos cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage their Azure subscriptions, including access, policies, and compliance, as well as how to track and estimate service usage and related costs. Students also learn how cloud resources are managed in Azure through user and group accounts. Students learn how to grant appropriate access to Azure AD users, groups, and services through Role-based access control (RBAC). Students also discover the core monitoring tools and capabilities provided by Azure, including Azure Alerts and Activity Log. Students are then introduced to Log Analytics as a broad data analytics solution and use this service to query and analyze operational data. Students then learn about the Azure Resource Manager deployment model, and how to work with resources, resource groups and ARM templates.
Because this course is the first course in the series for the Azure Administrator exams, there is a considerable amount of foundational content that is covered here in order to prepare students for the remaining courses in the curriculum. So students are provided with a lesson that covers tips and tricks for working in the Azure portal, as well as an introduction to key tools used in the Azure environment, such as the Cloud Shell and Resource Explorer. Emphasis is laid on PowerShell and the command line interface (CLI) as important skills to acquire not only in preparation for the exam but for the job role itself.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Manage Azure subscriptions and billing and implement Azure policies.
• Implement access management with Azure users, groups, and role-based access control.
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
• Query and analyze Log Analytics data.
• Deploy resources with ARM templates and organize Azure resources.
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Course Outline
Module 1: Managing Azure Subscriptions
In this module, you’ll learn about the components that make up an Azure subscription and how management groups are used to organize subscriptions into containers to allow you to control organizational governance and policy management across subscriptions. As well as learning about the different available types of subscription, you’ll see how to apply tags to your Azure resources to logically organize them by categories.
Lessons
• Overview of Azure Subscriptions
• Billing
• Azure Policy
After completing this module, students will be able:
• Manage Azure subscriptions and billing and implement Azure policies.
Module 2: Access Management for Cloud Resources
In this module you will learn the basics of role-based access control as it applies to users and groups. Focus on the administrator role and how it used in Azure.
Lessons
• Azure Users and Groups
• Role-based Access Control
After completing this module, students will be able:
• Implement access management with Azure users, groups, and role-based access control.
Module 3: Monitoring and Diagnostics
In this module, you learn about the Azure Monitor and the many capabilities to ensure your Azure architecture is working correctly. Monitoring skills are explained in this first course and then demonstrated in the following courses. The two main elements explained in this module are Azure Alerts and Azure Activity Log.
Lessons
•
• Exploring Monitoring Capabilities in Azure
• Azure Alerts
• Azure Activity Log
After completing this module, students will be able:
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
Module 4: Log Analytics
In this module, you will focus on Log Analytics. Log Analytics provides a way for you to collect, analyze, and query all types of connected data. It is a very powerful tool.
Lessons
•
• Introduction to Log Analytics
• Querying and Analyzing Log Analytics Data
After completing this module, students will be able:
•
• Query and analyze Log Analytics data.
•
Module 5: Azure Resource Manager
In this module, you will learn about how resources are organized into resource groups and how ARM templates are used to deploy those resources. This module introduces the concepts and then they are applied in the other courses.
Lessons
•
• ARM templates
• Resource Groups
After completing this module, students will be able:
• Deploy resources with ARM templates and organize Azure resources.
Module 6: Azure Tips, Tricks, and Tools
This module is provided to help you get the most from your administrative tools. This include the Azure Portal, Cloud Shell, Azure CLI, Azure PowerShell, and Resource Explorer.
Lessons
• Azure Portal
• Azure Tools and Environment
After completing this module, students will be able:
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Module 7: Lab-Manage Azure Subscriptions and Resources
• This module is provided to give you hands-on experience with the information provided in the course.
Lab : Manage Azure Subscriptions and Resources
• Configure delegation of provisioning and management of Azure resources.
• Verify delegation by provisioning Azure resources.
After completing this module, students will be able to:
•
• Configure delegation of provisioning and management of Azure resources by using built-in Role-Based (RBAC) roles and built-in Azure policies.
• Verify delegation by provisioning Azure resources as a delegated admin and auditing provisioning events.
Prerequisites
Successful Cloud Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2. Course AZ-100T02-A: Implementing and Managing Storage
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
Thiscourse teaches IT Professionals how to implement Azure storage solutions for a variety of scenarios. Students learn aboutthe different storage accounts and services as well as basic data replication concepts and available replication schemes. Students are also introduced to Storage Explorer as a convenient way to work with Azure storage data. Students also learn the types of storage and how to work with managed and custom disks.
Azure blob storage is how Azure stores unstructured data in the cloud, and students learn how to work with blobs and blob containers. They also learn how to use Azure Files to work with file shares that are accessed via the Server Message Block (SMB) protocol. In addition to blob storage, the course covers Table and Queue storage as storage options for structured data.
Students then learn how to secure and manage storage using Shared Access Signatures (SAS) and Azure Backup, using Recovery ServicesVault. Next, students learn how to use Azure File Sync to centralize an organization’s file Shares in Azure Files. Content Delivery Network (CDN) is used to store cached content on a distributed network of servers that are close to end users. Studentslearn how to optimize content delivery with Azure CDN, as wellas how to transfer large amounts of data using the Azure Import/Export service.
Lastly, students learn how to monitor Azure storage by configuring metrics and alerts and using the Activity Log. Students learn how to analyze usage trends, trace requests, and diagnose issues with a storage account.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
• Store and access data using Azure Content Delivery Network, and the Import and Export service.
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Course Outline
Module 1: Overview of Azure Storage
In this module, you’ll learn about storage accounts – Standard and Premium – as well as storage endpoints and how to configure custom domain accounts. You’ll have an opportunity to practice creating and managing storage accounts. The module also covers data replication and provides a comparison of the different available replication schemes. You’ll be introduced to Azure Storage Explorer, a utility that lets you easily work with and manipulate Azure Storage data.
Lessons
• Azure storage accounts
• Data replication
• Azure Storage Explorer
After completing this module, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
Module 2: Storage Services
In this module, you’ll learn about the disks component of Azure Storage as it relates to virtual machines. Disks are how virtual machines store their VHD files. You will learn about the types of disks and storage and how Azure simplifies IaaS disk management by creating and managing the storage accounts associated with the virtual machine disks. You will also learn about how Azure blob storage stores unstructured data in the cloud as objects, or blobs (BLOB = binary large object). And you’ll explore Azure Files, which offers fully managed file shares in the cloud that are accessible via the Server Message Block (SMB) protocol. The other file storage options covered in the module are Tables and Queues for structured storage.
Lessons
• Virtual machine storage
• Blob storage
• Azure files
• Structured storage
After completing this module, students will be able to:
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
Module 3: Securing and Managing Storage
In this module, discover how a shared access signature (SAS) can be used to provide delegated access to resources in storage accounts, allowing clients access to those resources with sharing the storage account keys. You’ll also learn how to use Azure backup as a cloud-based solution for an existing on-premises or off-site backup and data protection solution. This module also covers Azure File Sync as a way to centralize an organization’s file shares in Azure Files and using Windows Server to cache the Azure file share locally, thus enabling scenarios such as “lift and shift,” backup and disaster recovery, and file archiving.
Lessons
• Shared access keys
• Azure backup
• Azure File Sync
After completing this module, students will be able to:
•
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
Module 4: Storing and Accessing Data
In this module, you’ll learn about using a content delivery network (CDN) to deliver cached content that is stored on a distributed network of edge servers closer to end-users. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service and Azure Data Box.
Lessons
• Azure Content Delivery Network
• Import and Export service
• Data Box
After completing this module, students will be able to:
• Store and access data using Azure Content Delivery Network, the Import and Export service, and Data Box.
Module 5: Monitoring Storage
In this module, you will learn techniques for monitoring the health of Azure storage. With metrics and alerts you can check a variety of performance metrics and send notifications to your system administrator team. With the Activity Log you can search and query for specific events, even across subscriptions.
Lessons
• Metrics and Alerts
• Activity Log
After completing this module, students will be able to:
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Module 6: Lab-Implement and Manage Storage
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Storage
• Prepare the lab environment.
• Implement and use Azure Blob storage.
• Implement and use Azure File storage.
After completing this module, you will be able to:
• Implement and use Blob storage.
• Implement and use File storage.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3, Course AZ-100T03-A: Deploying and Managing Virtual Machines
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to create and manage virtual machines as part of an Infrastructure as a Service (IaaS) computing infrastructure. Students learn how to assess their on-premises environment for virtual machine readiness in preparation for moving resources to the cloud, including sizing, pricing, and design considerations.
Students also learn how to create and deploy virtual machines in Azure, using the Azure portal, PowerShell, and ARM templates. The course includes instruction on deploying custom images and Linux virtual machines. Students also learn how to configure the networking and storage components of virtual machines. Deploying highly available virtual machines is critical in the light of planned and unplanned events, and students learn how to use availability sets to ensure that virtual machine resources are available during downtime. Students also learn how to use extensions and Desired State Configuration (DSC) for post deployment automation and configuration tasks.
Finally, students learn how to perform virtual machine backups, and to use Azure’s monitoring capabilities to collect, view, and analyze virtual machine diagnostic and log data.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
• Deploy custom server images and Linux virtual machines.
• Configure virtual machine networking and storage options.
• Implement virtual machine high availability, scalability, and custom scripts extensions.
• Backup, restore, and monitor virtual machines.
Course Outline
Module 1: Overview of Azure Machines
In this module, you’ll will be introduced to Azure virtual machines. What are virtual machines and what operating systems are supported? How can you determine if your existing virtual machines can be supported in Azure? What pricing and sizing options are available?
Lessons
• Azure Virtual Machines Overview
• Planning Considerations
After completing this module, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
Module 2: Creating Virtual Machines
In this module, you will learn how to create and configure Windows virtual machines. You will practice in the Azure portal, in Azure PowerShell, and with ARM templates.
Lessons
• Overview of the Virtual Machine Creation Overview
• Creating Virtual Machines in the Azure Portal
• Creating Virtual Machines (PowerShell)
• Creating Virtual Machines using ARM Templates
After completing this module, students will be able to:
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
Module 3: Deploying Virtual Machine Images
In this module, you will learn how to create custom virtual machines in Azure. For example, deploying a server image that is in your on-premises datacenter. You will also learn how to create and connect to Linux virtual machines.
Lessons
• Deploying Custom Images
• Deploying Linux Virtual Machines
After completing this module, students will be able to:
• Deploy custom server images and Linux virtual machines.
Module 4: Configuring Virtual Machines
In this module, you will learn about the two main configuration areas for virtual machines: networking and storage. In the networking lesson, we will cover IP addressing, network interfaces, and network security groups. In the storage lesson, we will cover virtual machine disks, managed disks, attaching/detaching disks, and uploading disks.
Lessons
• Overview of Virtual Machine Configuration
• Virtual Machine Networking
• Virtual Machine Storage
After completing this module, students will be able to:
• Configure virtual machine networking and storage options.
Module 5: Configuring Availability and Extensibility
In this module, you will learn how to keep your virtual machines highly available with update and fault domains, and availability sets. You will also learn how to use scale sets to increase and decrease the number of the virtual machines as the workload changes. Lastly, virtual machines can be extended through custom scripts and Desired State Configuration.
Lessons
• Virtual Machine Availability
• Virtual Machine Scalability
• Applying Virtual Machine Extensions
After completing this module, students will be able to:
• Implement virtual machine high availability, scalability, and custom scripts extensions.
Module 6: Managing and Monitoring Virtual Machines
In this module, you will learn the very important tasks of backing up your virtual machines and monitoring their overall health. You will practice backing up and restoring virtual machines. You will learn about monitoring, diagnostics, and Azure Advisor.
Lessons
• Backup and Restore
• Monitoring Virtual Machines
After completing this module, students will be able to:
• Backup, restore, and monitor virtual machines.
Module 7: Lab - Deploy and Manage Virtual Machines
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Deploy and Manage Virtual Machines
• Deploy virtual machines.
• Configure networking setting for virtual machines.
• Configure Azure virtual machine scale sets.
After completing this module, you will be able to:
• Deploy Azure VMs by using the Azure portal, Azure PowerShell, and Azure Resource Manager templates.
• Configure networking settings of Azure VMs running Windows and Linux operating systems.
• Deploy and configure Azure VM scale sets.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Course AZ-100T04-A: Configure and Manage Virtual Networks
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to configure and manage Azure virtual networks (VNets). The benefits of moving an infrastructure to the cloud, removing the need to maintain expensive datacenters are an appealing proposition for many small and medium-sized companies. Regardless, once resources are moved to Azure, they require the same networking functionality as an on-premises deployment, and this course deals with the basic network configuration tasks.
Students review the basis of IP addressing, with specific emphasis on how public and private IP addressing works in the cloud. Students learn how to configure network routing and how to implement Azure DNS.
Securing the network infrastructure is of key importance and students learn how to use Network Security Groups (NSGs) to limit network traffic to resources in a virtual network, by creating security rules that allow or deny inbound or outbound traffic. Students also learn how to use NSG logging to diagnose and troubleshoot network connectivity problems.
The course also covers different connectivity scenarios for Azure virtual networks and students learn how to connect virtual networks with VNet-to-VNet VPN gateways and virtual network peering.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
• Implement Azure DNS domains, zones, record types, and resolution methods.
• Configure network security groups, service endpoints, logging, and network troubleshooting.
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Course Outline Module 1: Azure Virtual Networks
In this module, you’ll will be introduced to Azure virtual networks. What are virtual networks and how are they organized? How do you create and configure virtual networks with templates, PowerShell, CLI, or the Azure portal? What is the difference between public, private, static, and dynamic IP addressing? How are system routes, routing tables, and routing algorithms used?
Lessons
• Introducing Virtual Networks
• Creating Azure Virtual Networks
• Review of IP Addressing
• Network Routing
After completing this module, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
Module 2: Azure DNS
In this module, you will learn about DNS basics and specifically implementing Azure DNS. In the DNS Basics lesson you will review DNS domains, zones, record types, and resolution methods. In the Azure DNS lesson, we will cover delegation, metrics, alerts, and DNS hosting schemes.
Lessons
• Azure DNS Basics
• Implementing Azure DNS
After completing this module, students will be able to:
• Implement Azure DNS domains, zones, record types, and resolution methods.
Module 3: Securing Virtual Network Resources
In this module, you will learn primarily about Network Security Groups (NSGs) including NSG rules and NSG scenarios. You will also learn how to implement NSGs considering service endpoints, logging, troubleshooting, and other network traffic.
Lessons
• Introduction to Network Security Groups
• Implementing Network Security Groups and Service Endpoints
After completing this module, students will be able to:
• Configure network security groups, service endpoints, logging, and network troubleshooting.
Module 4: Connecting Virtual Networks
In this module, you will learn about two specific types of intersite connectivity: VNet-to-VNet connections and VNet Peering. In both cases, you will learn when to choose which connectivity method, and how to implement and configure the method.
Lessons
• Intersite Connectivity (VNet-to-VNet Connections)
• Virtual Network Peering
After completing this module, students will be able to:
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Module 5: Lab - Configure and Manage Virtual Networks
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Configure and Manage Virtual Networks
• Prepare the lab environment.
• Configure VNet peering.
• Implement custom routing.
• Validating service chaining.
After completing this module, you will be able to:
• Configure VNet peering.
• Implement custom routing.
• Validate service chaining.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
5. Course AZ-100T05-A: Manage Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to use Azure Active Directory (AD) to provide employees and customers with a multi-tenant cloud-based directory and identity management system. Students will learn the differences between Azure AD and Active Directory Domain Services (AD DS), as well the differences in functionality offered by the different editions of Azure AD. Students also learn how to configure self-service password reset, or to use the option of password writeback to reset user passwords regardless of their location. Students are then introduced to Azure AD Identity Protection and learn how they can use it to protect their organizations from compromised accounts, identity attacks, and configuration issues. Students also learn how to integrate Azure AD with the many Software as a Service (SaaS) applications that are used, in order to secure user access to those applications.
Next, the concepts of Azure domains and tenants, and users and groups are explained and students learn how to work with the various Azure AD objects. Students are introduced to Azure role-based access control to be able to provide a more granular access based on the principle of least privilege. An administrator, or user, can do exactly the task they need to accomplish; no more, no less. Students also learn how to work with Azure joined devices and Hybrid AD joined devices, enabling their users to be productive wherever and whenever – but ensuring that corporate assets are protected and that devices meet security and compliance standards.
Students learn how to use Azure AD Connect to integrate their on-premises directories with Azure AD, providing a common identity for their users of Office 365, Azure, and SaaS applications integrated with Azure AD. Lastly, students also learn how to use Azure AD Application Proxy to be able to provide their users with remote access to web application that are published on-premises, such as SharePoint sites, Outlook Web Access, or any other line of business (LOB) applications the organization has.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
• Configure domains and tenants, users and groups, roles, and devices.
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Course Outline
Module 1: Managing Azure Active Directory
In this module, you’ll will be introduced to Azure Active Directory. What is Azure Active Directory and how is it different from Active Directory Domain Services? What is Self-Service Password Reset and how is it configured? How can Azure AD Identity protection improve your security posture. How do you integrate SaaS applications with Azure AD?
Lessons
• Azure Active Directory Overview
• Self-Service Password Reset
• Azure AD Identity Protection
• Integrating SaaS Applications with Azure AD
After completing this module, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
Module 2: Managing Azure Active Directory Objects
In this module, you will learn the basics of implementing Azure AD objects. These objects include domains and tenants, users and groups, roles, and devices. In each lesson you will practice how to configure these objects through the portal and with Azure PowerShell. The Azure roles lesson will be your introduction to role-based access control.
Lessons
• Azure Domains and Tenants
• Azure Users and Groups
• Azure Roles
• Managing Devices
After completing this module, students will be able to:
• Configure domains and tenants, users and groups, roles, and devices.
Module 3: Implementing and Managing Hybrid Identities
In this module, you will learn how to integrate Active Directory with your existing infrastructure. You will learn about different authentication options like AD Connect, Single Sign On, and Pass-through authentication. You will also learn how to configure Azure AD Application Proxy and how it is used.
Lessons
• Azure Active Directory Integration Options
• Azure AD Application Proxy
After completing this module, students will be able to:
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Module 4: Lab - Implement and Manage Hybrid Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Hybrid Identities
• Deploy a VM with an AD domain controller
• Create and configure an Azure AD tenant
• Synchronize an AD forest with an Azure AD tenant
After completing this module, you will be able to:
• Deploy an Azure VM hosting an Active Directory domain controller.
• Create and configure an Azure Active Directory tenant.
• Synchronize Active Directory forest with an Azure Active Directory tenant.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Este treinamento é composto pelos seguintes cursos:
1. AZ-101T01: Migrate Servers to Azure (Carga: 8h)
2. AZ-101T02: Implement and Manage Application Services (Carga: 8h)
3. AZ-101T03: Implement Advanced Virtual Networking (Carga: 8h)
4. AZ-101T04: Secure Identities (Carga: 8h)
______________________________________
Segue abaixo a descrição dos cursos:
1.Course AZ-101T01-A: Migrate Servers to Azure
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT professionals how to discover, assess, plan and implement a migration of on-premises resources and infrastructure to Azure. Students will learn how to use Azure Migrate to perform the discovery and assessment phase that is critical to a successful migration. Students will also learn how to use Azure Site Recovery for performing the actual migration of workloads to Azure. The course focuses primarily on using ASR on a Hyper-V infrastructure to prepare and complete the migration process. Students will learn about using Azure Backup and Azure to Azure replication to ensure adequate disaster recovery mechanisms are in place. Finally, students will learn about using Azure Database Migration Service and the Azure Import/Export service for data migration scenarios.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Course Outline
Module 1: Azure Migrate
In this module, you will be introduced to Azure migration projects and specifically Azure Migrate. Azure Migrate will be your tool of choice for automated server discovery and workload sizing. You will step through the process of using Azure Migrate to create a project, create a collector, assess machine readiness, and estimate cost.
Lessons
• Overview of Cloud Migration
• Azure Migrate: The Process
After completing this module, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
Module 2: Azure Site Recovery
In this module, you will be introduced to Azure Site Recovery (ASR). ASR will be your primary tool for migrating workloads to Azure. You will learn which scenarios are most appropriate for ASR and the features that the product provides. You will also learn how to use the ASR deployment planner to ensure your infrastructure is ready for migration. Lastly, you will walk through the process of implementing ASR on a Hyper-V infrastructure.
Lessons
• Overview of ASR
• Preparing the Infrastructure
• Completing the Migration Process
After completing this module, students will be able to:
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
Module 3: Disaster Recovery
In this module, you will introduced to Azure Backup. Azure Backup can be used to backup and restore your virtual machines. You will also learn about Azure to Azure replication. This will enable you to replicate virtual machines from one Azure region to another Azure region. This will protect against regional outages.
Lessons
• Backup and Restore
• Azure to Azure Disaster Recovery
After completing this module, students will be able to:
• Use Azure Backup for virtual machines, and migrate virtual machines from one Azure region to another.
Module 4: Migrating Data
In this module, you will learn about using the Azure Database Migration service to perform seamless migrations at scale from multiple database sources to Azure Data platforms. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service.
Lessons
• Database Migration
• Import and Export Service
After completing this module, students will be able to:
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Module 5: Lab-Implement Azure Site Recovery Between Azure Regions
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Azure Site Recovery Between Azure Regions
• Implement prerequisites for migration of Azure VMs by using Azure Site Recovery
• Migrate an Azure VM between Azure regions by using Azure Site Recovery
After completing this module, students will be able to:
• Implement Azure Site Recovery Vault.
• Configure replication of Azure VMs between Azure regions by using Azure Site Recovery.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2.Course AZ-101T02-A: Implement and Manage Application Services
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage and maintain the infrastructure for the core web apps and services that developers build and deploy. Students will learn how Azure App Service is used as a Platform as a Service (PaaS) offering for deploying cloud apps for web and mobile environments. Students will learn how to use App Service Environments (ASE) to host a dedicated environment for securing and running App Service apps at scale. Students will also learn how to use deployment slots as staging environments for web apps, that can then be swapped into production when needed. This course also teaches students how to scale up and scale out to meet and adjust for demand, and how bandwidth for web traffic can be optimized using Application Gateways and Content Delivery Networks (CDN). Lastly, the course provides students with an overview of serverless computing solutions, including Azure Functions, Event Grid, Service Bus, and Logic Apps.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
• Manage and secure web apps with backup, restore, snapshot, and cloning.
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Course Outline
Module 1: Introducing the Azure App Service Platform
In this module, you will be introduced to the Azure App Services Platform. You will learn about app service plans, web app hosting options, app service scenarios and how to monitor apps. You will also learn about how to isolate apps with App Service Environments.
Lessons
• Introducing Azure App Service
• App Service Environments
After completing this module, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
Module 2: Managing and Securing Web Apps
In this module, you will learn how to deploy your app with minimal downtime. You will also learn how to backup, restore, snapshot, and clone your app. Lastly, you will implement security features like authentication options and authentication providers.
Lessons
• Deploying Web Apps
• Managing Web Apps
• App Service Security
After completing this module, students will be able to:
• Manage and secure web apps with backup, restore, snapshot, and cloning.
Module 3: Scaling and Performance
In this module, you will learn how to ensure your app performs under various workloads. You will learn how to scale up and scale out your app. You will learn how to automatically scale your app and to grow out the app through geo-distribution. Lastly you will learn how CDN provides a way to optimize bandwidth and web traffic.
Lessons
• Scale Up and Scale Out
• Autoscale and Grow out
• Optimizing Bandwidth and Web Traffic
After completing this module, students will be able to:
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
Module 4: Deploying Serverless Computing Solutions
In the module, you will learn what serverless computing is and what it provides. You will implement three serverless computing solutions: Azure Functions, Event Grid, and Service Bus. Azure Functions provide small pieces of code, or "functions," that run in the cloud. Event Grid is a service for managing routing of all events from any source to any destination. Service Bus multi-tenant cloud messaging service that sends information between applications and services.
Lessons
• Serverless Computing Concepts
• Managing Azure Functions
• Managing Event Grid
• Managing Service Bus
• Managing Logic App
After completing this module, students will be able to:
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Module 5: Lab-Implement and Manage Application Services
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Application Services
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
After completing this module, students will be able to:
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3.Course AZ-101T03-A: Implement Advanced Virtual Networking
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to implement and configure different Azure networking traffic distribution mechanisms, including Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. Students will also learn how to implement site connectivity for multiple scenarios including cross-premises and hybrid configurations, as well as extending on-premises networks into the Microsoft cloud over a dedicated private connection, using Azure ExpressRoute. Lastly, students will learn how to use Network Watcher to monitor and troubleshoot Azure virtual networks. They will also learn how to troubleshoot and remediate common errors in Azure Application Gateway and Azure Load Balancer.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Cloud Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
• Implement and configure Network Watcher and troubleshooting common network issues.
Course Outline
Module 1: Distributing Network Traffic
In this module, you will learn about three ways to distribute network traffic: Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. The Azure Load Balancer delivers high availability and network performance to your applications. The Azure Traffic Manager allows you to control the distribution of user traffic to your service endpoints. The Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications.
Lessons
• Overview of Network Traffic Distribution Options
• Azure Load Balancer
• Azure Traffic Manager
• Azure Application Gateway
After completing this module, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
Module 2: Site Connectivity
In this module, you will learn and implement two ways to connect your virtual networks: Site-to-Site VPN Connections and ExpressRoute. Site-to-Site VPN connections provide secure tunneling for cross-premises and hybrid configurations. ExpressRoute extends your on-premises networks into the Microsoft cloud over a dedicated private connection facilitated by a connectivity provider.
Lessons
• Site-to-Site VPN Connections
• ExpressRoute
After completing this module, students will be able to:
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
Module 3: Monitoring and Troubleshooting Network Connectivity
In this module, you will learn important skills around troubleshooting virtual network connectivity. The primary tool discussed is Azure Network Watcher. Azure Network Watcher provides IP flow verification, VPN diagnostics, NSG views and flows, and next hop analysis.
Lessons
• Introducing Network Watcher
• Implementing Network Watcher
• Network Troubleshooting Examples
After completing this module, students will be able to:
• Implement and configure Network Watcher and troubleshooting common network issues.
Module 4: Lab-Implement Advanced Virtual Networking
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Advanced Virtual Networking
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
After completing this module, students will be able to:
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
4.Course AZ-101T04-A: Secure Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals to understand the challenges that organizations face in keeping modern IT environments secure, as the more distributed environments that are part of a cloud-first or hybrid world have rapidly created new security challenges for IT. The course focuses on three key areas in the defense against attackers who target security vulnerabilities, resulting particularly from credential theft and compromised identities: Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and Azure Active Directory Privileged Identity Management (PIM). Students learn to implement two-step verification to secure the sign-in process, as well has how to use advanced features like trusted IPs and Fraud Alerts with MFA to customize their identity access strategy. Using Privileged Identity Management, students learn how to apply just the right amount of access rights for just the right amount of time to the various administrative roles as well as to resources.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Course Outline
Module 1: Introduction to Identity Protection in Azure
In this module, you’ll learn about Role-Based Access Control as the foundation to organizing and managing an organization’s administrative access based on the principle of least privilege. You will also review Azure Active Directory concepts, as well as gaining insight into the threat landscape and security risks that are exposed to IT organizations through breach of privileged access.
Lessons
• Role-Based Access Control
• Azure Active Directory (Refresher)
• Protecting Privileged Access in the Environment
After completing this module, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
Module 2: Using Multi-Factor Authentication for Secure Access
In this module, you’ll learn about securing the sign-in process through Multi-Factor Authentication (MFA). You’ll learn how MFA works and the differences in implementation between on-premises and cloud scenarios. You’ll also learn about using conditional access policies to provide more fine-grained control over apps and resources in your environment.
Lessons
• Introducing Multi-Factor Authentication
• Implementing MFA
After completing this module, students will be able to:
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
Module 3: Azure AD Privileged Identity Management
In this module, you’ll learn how to use Azure Privileged Identity Management (PIM) to enable just-in-time administration and control the number of users who can perform privileged operations. You’ll also learn about the different directory roles available as well as newer functionality that includes PIM being expanded to role assignments at the resource level.
Lessons
• Getting Started with PIM
• PIM Security Wizard
• PIM for Directory Roles
• PIM for Role Resources
After completing this module, students will be able to:
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Module 4: Lab-Secure Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Secure Identities
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
After completing this module, students will be able to:
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft SQL Server, System Center, and more. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches.
Audience profile
This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others.
At course completion
After completing this course, students will be able to:
• Describe the functionality of Windows PowerShell and use it to run and find basic commands.
• Identify and run cmdlets for server administration.
• Work with Windows PowerShell pipeline.
• Describe the techniques Windows PowerShell pipeline uses.
• Use PSProviders and PSDrives to work with other forms of storage.
• Query system information by using WMI and CIM.
• Work with variables, arrays, and hash tables.
• Write basic scripts in Windows PowerShell.
• Write advanced scripts in Windows PowerShell.
• Administer remote computers.
• Use background jobs and scheduled jobs.
• Use advanced Windows PowerShell techniques.
Course details
Course Outline
Module 1: Getting started with Windows PowerShell
This module will introduce you to Windows PowerShell and provide an overview of the product’s functionality. The module shows you how to open and configure the shell for use and how to run commands within the shell. The module also introduces the built-in Help system in Windows PowerShell.
Lessons
• Overview and background of Windows PowerShell
• Understanding command syntax
• Finding commands
Lab : Configuring Windows PowerShell
• Configuring the Windows PowerShell console
• Configuring the Windows PowerShell ISE application
Lab : Finding and running basic commands
• Finding commands
• Running commands
• Using the About files
After completing this module, students will be able to:
• Open and configure Windows PowerShell.
• Find and run Windows PowerShell commands.
• Run commands by using the correct command and parameter syntax.
Module 2: Cmdlets for administration
This module introduces you to the cmdlets commonly used for administration. While you can search for cmdlets each time you need to accomplish a task, it is more efficient to have at least a basic understanding of the cmdlets available for system administration.
Lessons
• Active Directory administration cmdlets
• Network configuration cmdlets
• Other server administration cmdlets
Lab : Windows Administration
• Creating and managing Active Directory objects
• Configuring network settings on Windows Server
• Creating a web site
After completing this module, students will be able to:
• Identify and use cmdlets for Active Directory administration.
• Identify and use cmdlets for network configuration.
• Identify and use cmdlets for other server administration tasks.
Module 3: Working with the Windows PowerShell pipeline
This module introduces the pipeline feature of Windows PowerShell. Although the pipeline feature is included in several command-line shells such as the command prompt in the Windows operating system, the pipeline feature in Windows PowerShell provides more complex, more flexible, and more capable functionalities compared to other shells. This module provides you with the skills and knowledge that will help you use the shell more effectively and efficiently.
Lessons
• Understanding the pipeline
• Selecting, sorting, and measuring objects
• Filtering objects out of the pipeline
• Enumerating objects in the pipeline
• Sending pipeline data as output
Lab : Using the pipeline
• Selecting, sorting, and displaying data
Lab : Filtering objects
• Filtering objects
Lab : Enumerating objects
• Enumerating objects
Lab : Sending output to a file
• Exporting user information to a file
After completing this module, students will be able to:
• Describe the purpose of the Windows PowerShell pipeline.
• Select, sort, and measure objects in the pipeline.
• Filter objects out of the pipeline.
• Enumerate objects in the pipeline.
• Send output consisting of pipeline data.
Module 4: Understanding how the pipeline works
This module shows you how Windows PowerShell passes objects from one command to another in the pipeline. The shell provides two techniques that you can use. Knowing how these techniques work, and which one will be used in a given scenario, lets you construct more useful and complex command lines.
Lessons
• Passing the pipeline data
• Advanced considerations for pipeline data
Lab : Working with pipeline parameter binding
• Predicting pipeline behaviour
After completing this module, students will be able to:
• Pass data by using the ByValue technique.
• Describe the advanced techniques for passing pipeline data.
Module 5: Using PSProviders and PSDrives
This module introduces the PSProviders and PSDrives adapters. A PSProvider is basically a Windows PowerShell adapter that makes some form of storage resemble a disk drive. A PSDrive is an actual connection to a form of storage. You can use these two adapters to work with various forms of storage by using the same commands and techniques that you use to manage the file system.
Lessons
• Using PSProviders
• Using PSDrives
Lab : Using PSProviders and PSDrives
• Creating files and folders on a remote computer
• Creating a registry key for your future scripts
• Create a new Active Directory group
After completing this module, students will be able to:
• Use PSProviders.
• Use PSDrives.
Module 6: Querying system information by using WMI and CIM
This module introduces you to two parallel technologies: Windows Management Instrumentation (WMI) and Common Information Model (CIM). Both these technologies provide local and remote access to a repository of management information including access to robust information available from the operating system, computer hardware, and installed software.
Lessons
• Understanding WMI and CIM
• Querying data by using WMI and CIM
• Making changes with WMI/CIM
Lab : Working with WMI and CIM
• Querying information by using WMI
• Querying information by using CIM
• Invoking methods
After completing this module, students will be able to:
• Explain the differences between Common Information Model (CIM) and Windows Management Instrumentation (WMI).
• Query management information by using CIM and WMI.
• Invoke methods by using CIM and WMI.
Module 7: Working with variables, arrays, and hash tables
This module provides you the skills and knowledge required to use variables, arrays, and hash tables in Windows PowerShell.
Lessons
• Using variables.
• Manipulating variables.
• Manipulating arrays and hash tables.
Lab : Working with variables
• Working with variable types
• Using arrays
• Using hash tables
After completing this module, students will be able to:
• Assign a value to variables.
• Describe how to manipulate variables.
• Describe how to manipulate arrays and hash tables.
Module 8: Basic scripting
This module shows you how to package a Windows PowerShell command in a script. Scripts allow you to perform repetitive tasks and more complex tasks than cannot be accomplished in a single command.
Lessons
• Introduction to scripting
• Scripting constructs
• Importing data from files
Lab : Basic scripting
• Setting a script
• Processing an array with a ForEach loop
• Processing items by using If statements
• Creating a random password
• Creating users based on a CSV file
After completing this module, students will be able to:
• Run a Windows PowerShell script.
• Use Windows PowerShell scripting constructs.
• Import data from a file.
Module 9: Advanced scripting
This module introduces you to more advanced techniques that you can use in scripts. These techniques includes gathering user input, reading input from files, documenting scripts with help information and error handling.
Lessons
• Accepting user input
• Overview of script documentation
• Troubleshooting and error handling
• Functions and modules
Lab : Accepting data from users
• Querying disk information from remote computers
• Updating the script to use alternate credentials
• Documenting a script
Lab : Implementing functions and modules
• Creating a logging function
• Adding error handling to a script
• Converting a function to a module
After completing this module, students will be able to:
• Accept user input for a script.
• Explain script documentation.
• Implement error handling for a script.
• Explain functions and modules.
Module 10: Administering Remote Computers
This module introduces you to the Windows PowerShell remoting technology that enables you to connect to one or more remote computers and instruct them to run commands on your behalf.
Lessons
• Using basic Windows PowerShell remoting
• Using advanced Windows PowerShell remoting techniques
• Using PSSessions
Lab : Using basic remoting
• Enabling remoting on the local computer
• Performing one-to-one remoting
• Performing one-to-many remoting
Lab : Using PSSessions
• Using implicit remoting
• Managing multiple computers
After completing this module, students will be able to:
• Describe remoting architecture and security.
• Use advanced remoting techniques.
• Create and manage persistent remoting sessions.
Module 11: Using background jobs and scheduled jobs
This module provides information about the job features of Windows PowerShell. Jobs are an extension point in Windows PowerShell, and there are many different kinds of jobs. Each kind of job can work slightly differently, and has different capabilities.
Lessons
• Using background jobs
• Using scheduled jobs
Lab : Using background jobs and scheduled jobs
• Starting and managing jobs
• Creating a scheduled job
After completing this module, students will be able to:
• Create and manage background jobs.
• Create and manage scheduled jobs.
Module 12: Using advanced Windows PowerShell techniques
This module covers several advanced Windows PowerShell techniques and features. Many of these techniques and features extend functionality that you have learned about in previous modules. Some of these techniques are new and provide additional capabilities.
Lessons
• Creating profile scripts
• Using advanced techniques
Lab : Practicing advanced techniques
• Creating a profile script
• Verifying the validity of an IP address
• Reporting disk information
• Configuring NTFS permissions
• Creating user accounts with passwords from a CSV file
Lab : Practicing script development (optional)
• TBA
• TBA
• TBA
After completing this module, students will be able to:
• Create and manage profile scripts.
• Use advanced techniques to work with data.
Prerequisites
• Experience with Windows networking technologies and implementation.
• Experience with Windows Server administration, maintenance, and troubleshooting.
• Experience with Windows Client administration, maintenance, and troubleshooting
• Students who attend this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Windows system administrator. No prerequisite courses are required.
Carga: 24 horas
Carga: 40 horas
Carga: 40 horas
Carga: 40 horas
Carga: 40 horas
Carga: 40 horas
Overview
Type: Course
Audience(s): Developer
Technology: Cross-Platform Development
Level: Advanced
This Revision: D
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
In this course, students will learn how to design and develop services that access local and remote data from various sources. Students will also learn how to develop and deploy services to hybrid environments, including on-premises servers and Microsoft Azure.
Audience profile
Primary: .NET developers who want to learn how to develop services and deploy them to hybrid environments.
Secondary: .NET developers with Web application development experience who are exploring developing new applications or porting existing applications to Microsoft Azure.
At course completion
After completing this course, students will be able to:
• Describe the basic concepts of service development and data access strategies using the .NET platform.
• Describe the Microsoft Azure cloud platform and its compute, data, and application hosting offerings.
• Design and develop a data-centric application using Visual Studio 2017 and Entity Framework Core.
• Design, implement, and consume HTTP services using ASP.NET Core.
• Extend HTTP services using ASP.NET Core.
• Host services on-premises and in Microsoft Azure.
• Deploy services to both on-premises and cloud environments and manage the interface and policy for their services.
• Choose a data storage solution, cache, distribute, and synchronize data.
• Monitor, log, and troubleshoot services.
• Describe claim-based identity concepts and standards, and implement authentication and authorization with Azure Active Directory.
• Create scalable service applications.
Course Outline
Module 1: Overview of service and cloud technologies
This module provides an overview of service and cloud technologies using the Microsoft .NET Core and the Azure. The first lesson, “Key Components of Distributed Applications,” discusses characteristics that are common to distributed systems, regardless of the technologies they use. Lesson 2, “Data and Data Access Technologies” describes how data is used in distributed applications. Lesson 3, “Service Technologies,” discusses two of the most common protocols in distributed system and the .NET Core technologies used to develop services based on those protocols. Lesson 4, “Cloud Computing,” describes cloud computing and how it is implemented in Azure.
Lessons
• Key Components of Distributed Applications
• Data and Data Access Technologies
• Service Technologies
• Cloud Computing
• Manipulating Data
Lab : Exploring the Work Environment
• Creating an ASP.NET Core project
• Create a simple Entity Framework model
• Create a web API class
• Deploy the web application to Azure
After completing this module, students will be able to:
• Explain services architecture and hosting environments
• Explain cloud computing and the Microsoft Azure cloud platform
• Explain data access strategies
Module 2: Querying and Manipulating Data Using Entity Framework
In this module, you will learn about the Entity Framework data model, and about how to create, read, update, and delete data. Entity Framework is a rich object-relational mapper, which provides a convenient and powerful application programming interface (API) to manipulate data. This module focuses on the Code First approach with Entity Framework.
Lessons
• ADO.NET Overview
• Creating an Entity Data Model
• Querying Data
Lab : Creating a Data Access Layer using Entity Framework
• Creating a data model
• Query the Database
Lab : Manipulating Data
• Create repository methods
• Test the model using SQL Server and SQLite
After completing this module, students will be able to:
• Describe basic objects in ADO.NET and explain how asynchronous operations work.
• Create an Entity Framework Core data model.
• Query data by using Entity Framework Core.
• Insert, delete, and update entities by using Entity Framework Core.
Module 3: Creating and Consuming ASP.NET Core Web APIs
ASP.NET Core Web API provides a robust and modern framework for creating Hypertext Transfer Protocol (HTTP)-based services. In this module, you will be introduced to the HTTP-based services. You will learn how HTTP works and become familiar with HTTP messages, HTTP methods, status codes, and headers. You will also be introduced to the Representational State Transfer (REST) architectural style and hypermedia. You will learn how to create HTTP-based services by using ASP.NET Core Web API. You will also learn how to consume them from various clients. After Lesson 3, in the lab "Creating an ASP.NET Core Web APIs", you will create a web API and consume it from a client.
Lessons
• HTTP Services
• Creating an ASP.NET Core Web API
• Consuming ASP.NET Core Web APIs
• Handling HTTP Requests and Responses
• Automatically Generating HTTP Requests and Responses
Lab : Creating an ASP.NET Core Web API
• Create a controller class
• Use the API from a browser
• Create a client
After completing this module, students will be able to:
• Design services by using the HTTP protocol.
• Create services by using ASP.NET Core Web API.
• Use the HttpRequest/IActionResult classes to control HTTP messages.
• Consume ASP.NET Web API services.
Module 4: Extending ASP.NET Core HTTP Services
ASP.NET Core Web API provides a complete solution for building HTTP services, but services often have various needs and dependencies. In many cases, you will need to extend or customize the way ASP.NET Core Web API executes your service. Handling needs such as applying error handling and logging integrate with other components of your application and supporting other standards that are available in the HTTP world. Understanding the way ASP.NET Core Web API works is important when you extend ASP.NET Core Web API. The division of responsibilities between components and the order of execution are important when intervening with the way ASP.NET Core Web API executes. Finally, with ASP.NET Core Web API, you can also extend the way you interact with other parts of your system. With the dependency resolver mechanism, you can control how instances of your service are created, giving you complete control on managing dependencies of the services.
Lessons
• The ASP.NET Core Request Pipeline
• Customizing Controllers and Actions
• Injecting Dependencies into Controllers
Lab : Customizing the ASP.NET Core Pipeline
• Use Dependency Injection to Get a Repository Object
• Create a Cache Filter
• Create a Debugging Middleware
After completing this module, students will be able to:
• Extend the ASP.NET Web API request and response pipeline.
• Customize Controllers and Actions.
• Inject dependencies into ASP.NET Web API controllers.
Module 5: Hosting Services On-Premises and in Azure
In this module you will learn how to host your application on-premises and on Azure. You will also learn about Docker containers, and writing serverless applications with Azure functions.
Lessons
• Hosting Services on-premises
• Hosting Services in Azure App Service
• Packaging Services in Containers
• Implementing Serverless Services
Lab : Host an ASP.NET Core service in a Windows Service
• Creating a new ASP.NET Core Application
• Registering the Windows Service
Lab : Host an ASP.NET Core Web API in an Azure Web App
• Create a Web App in the Azure portal
• Deploy an ASP.NET Core Web API to the Web App
Lab : Host an ASP.NET Core service in Azure Container Instances
• Publish the service to a Docker container
• Host the service in Azure Container Instances
Lab : Implement an Azure Function
• Develop the service locally
• Deploy the service to Azure Functions
After completing this module, students will be able:
• Host services on-premises by using Windows services and Microsoft Internet Information Services (IIS).
• Host services in the Azure cloud environment by using Web Apps, Docker containers, and Azure Functions.
• Package services in containers.
• Implement serverless services.
Module 6: Deploying and Managing Services
In this module, you will learn about Web Deploy and how to deploy web applications by using Web Deploy in Visual Studio. You will also learn how to define continuous integration and continuous delivery pipelines and how to use Azure API Management and OpenAPI to provide robust, secure, and reliable APIs to your customers.
Lessons
• Web Deployment with Visual Studio 2017
• Continuous Delivery with Visual Studio Team Services
• Deploying Applications to Staging and Production Environments
• Defining Service Interfaces with Azure API Management
Lab : Deploying an ASP.NET Core web service on Linux
• Publish the ASP.NET Core web service for Linux
• Configure Nginx as a reverse proxy
Lab : Deploying to Staging and Production
• Deploy the application to production
• Create a staging slot
• Swap the Environments
Lab : Publishing a Web API with Azure API Management
• Creating an Azure API Management instance
• Testing and managing the API
After completing this module, students will be able to:
• Explain Microsoft Internet Information Services (IIS) Web Deploy.
• Explain Azure Web Apps deployment by using a Microsoft Visual Studio Team Services build pipeline.
• Explain how to deploy web services to Azure Container Instances.
• Explain how to define service interfaces by using API Management and Swagger.
• Explain how to define policies by using API Management.
• Explain defining service interfaces using Azure API Management and Swagger
Module 7: Implementing Data Storage in Azure
This module explains how to store and access data stored in Azure Storage. It also explains how to configure storage access rights for storage containers and content.
Lessons
• Choosing a Data Storage Mechanism
• Accessing Data in Azure Storage
• Working with Structured Data in Azure
• Geographically Distributing Data with Azure CDN
• Scaling with Out-of-Process Cache
Lab : Storing Files in Azure Storage
• Store publicly accessible files in Azure Blobs
• Generate and store private files in Azure Blobs
Lab : Querying Graph Data with CosmosDB
• Create the CosmosDB graph database
• Query the CosmosDB database
Lab : Caching out-of-process with Azure Redis cache
• Create the Azure Redis Cache service
• Access the cache service from code
• Test the application
After completing this module, students will be able to:
• Describe the architecture of Storage.
• Control access to your Storage items.
• Cache data using Azure Cache for Redis.
• Distribute data by using Microsoft Azure Content Delivery Network.
Module 8: Diagnostics and Monitoring
This module explains how to monitor and log services, both on-premises and in Azure.
Lessons
• Logging in ASP.NET Core
• Diagnostic Tools
• Application Insights
Lab : Monitoring ASP.NET Core with ETW and LTTng
• Collect and view ETW events
• Collect and view LTTng events
Lab : Monitoring Azure Web Apps with Application Insights
• Add the Application Insights SDK
• Load test the web service
• Analyze the performance results
After completing this module, students will be able to:
• Explain trace listeners
• Explain performance counters
• Explain ETW and LTTng events
• Demonstrate using App Insights to monitor services
Module 9: Securing services on-premises and in Microsoft Azure
This module describes claim-based identity concepts and standards, and how to implement authentication and authorization by using Azure Active Directory to secure an ASP.NET Core Web API service.
Lessons
• Explaining Security Terminology
• Securing Services with ASP.NET Core Identity
• Securing Services with Azure Active Directory
Lab : Using ASP.NET Core Identity
• Add ASP.NET Core Identity middleware
• Add authorization code
• Run a client application to test the server
Lab : Using Azure Active Directory with ASP.NET Core
• Authenticate a client application using AAD B2C and MSAL.js
Module 10: Scaling Services
This module explains how to create scalable services and applications and scale them automatically using Web Apps load balancers, Azure Application Gateway and Azure Traffic Manager.
Lessons
• Introduction to Scalability
• Automatic Scaling
• Azure Application Gateway and Traffic Manager
Lab : Load Balancing Azure Web Apps
• Prepare the application for load-balancing
• Test the load balancing with instance affinity
• Test the load balancing without affinity
Lab : Load Balancing with Azure Traffic Manager
• Deploy an Azure Web App to multiple regions
• Create an Azure Traffic Manager profile
After completing this module, students will be able to:
• Explain the need for scalability.
• Describe how to use load balancing for scaling services.
• Explain Azure Load Balancer, Azure Application Gateway, and Azure Traffic Manager.
Prerequisites
Before attending this course, students must have:
• Experience with C# programming, and concepts such as lambda expressions, LINQ, and anonymous types
• Understanding the concepts of n-tier applications
• Experience with querying and manipulating data with ADO.NET
Carga: 40 horas
Carga: 40 horas
Carga: 40 horas
Carga: 40 horas
Carga: 24 horas
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
First published:
19 January 2018
About this course
This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.
Audience profile
This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server 2016. This course will help them update their knowledge and skills related to storage and compute for Windows Server 2016.
Candidates suitable for this course would be:
•Windows Server administrators who are relatively new to Windows Server administration and related technologies, and who want to learn more about the storage and compute features in Windows Server 2016.
•IT professionals with general IT knowledge who are looking to gain knowledge about Windows Server especially around storage and compute technologies in Windows Server 2016.
The secondary audience for this course are IT professionals looking to take the Microsoft 70-740 certification exam, Installation, Storage and Compute with Windows Server 2016.
At course completion
After completing this course, students will be able to:
• Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.
• Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes.
• Describe enterprise storage solutions, and select the appropriate solution for a given situation.
• Implement and manage Storage Spaces and Data Deduplication.
• Install and configure Microsoft Hyper-V, and configure virtual machines.
• Deploy, configure, and manage Windows and Hyper-V containers.
• Describe the high availability and disaster recovery technologies in Windows Server 2016.
• Plan, create, and manage a failover cluster.
• Implement failover clustering for Hyper-V virtual machines.
• Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.
• Create and manage deployment images.
• Manage, monitor, and maintain virtual machine installations.
Course details
Course Outline
Module 1: Installing, upgrading, and migrating servers and workloads
This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.
Lessons
• Introducing Windows Server 2016
• Preparing and installing Server Core
• Preparing for upgrades and migrations
• Migrating server roles and workloads
• Windows Server activation models
Lab : Installing and configuring Server Core
• Installing Server Core
• Completing post-installation tasks on Windows Server 2016 Core
• Performing remote management
After completing this module, students will be able to:
• Describe the new features of Windows Server 2016.
• Prepare for and install Server Core.
• Plan a server upgrade and migration strategy.
• Perform a migration of server roles and workloads within a domain and across domains.
• Choose an appropriate activation model.
Module 2: Configuring local storage
This module explains how to manage disks and volumes in Windows Server 2016.Lessons
• Managing disks in Windows Server
• Managing volumes in Windows Server
Lab : Configuring local storage
• Creating and managing volumes
• Resizing volumes
• Managing virtual hard disks
After completing this module, students will be able to:
• Manage disks in Windows Server.
• Manage volumes in Windows Server.
Module 3: Implementing enterprise storage solutions
This module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.
Lessons
• Overview of DAS, NAS, and SANs
• Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
• Understanding iSNS, DCB, and MPIO
• Configuring sharing in Windows Server 2016
Lab : Planning and configuring storage technologies and components
• Planning storage requirements
• Configuring iSCSI storage
• Configuring and managing the share infrastructure
After completing this module, students will be able to:
• Describe DAS, NAS, and SANs.
• Compare Fibre Channel, iSCSI, and FCoE.
• Explain the use of iSNS, DCB, and MPIO.
• Configure sharing in Windows Server.
Module 4: Implementing Storage Spaces and Data Deduplication
This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.
Lessons
• Implementing Storage Spaces
• Managing Storage Spaces
• Implementing Data Deduplication
Lab : Implementing Storage Spaces
• Creating a Storage Space
Lab : Implementing Data Deduplication
• Installing Data Deduplication
• Configuring Data Deduplication
After completing this module, students will be able to:
• Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
• Manage and maintain Storage Spaces.
• Describe and implement Data Deduplication.
Module 5: Installing and configuring Hyper-V and virtual machines
This module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.
Lessons
• Overview of Hyper-V
• Installing Hyper-V
• Configuring storage on Hyper-V host servers
• Configuring networking on Hyper-V host servers
• Configuring Hyper-V virtual machines
• Managing virtual machines
Lab : Installing and configuring Hyper-V
• Verify installation of the Hyper-V server role
• Configuring Hyper-V networks
• Creating and configuring virtual machines
• Enable nested virtualization for a virtual machine
After completing this module, students will be able to:
• Describe Hyper-V and virtualization.
• Install Hyper-V.
• Configure storage on Hyper-V host servers.
• Configure networking on Hyper-V host servers.
• Configure Hyper-V virtual machines.
• Manage Hyper-V virtual machines.
Module 6: Deploying and managing Windows and Hyper-V containers
This module provides an overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.
Lessons
• Overview of containers in Windows Server 2016
• Deploying Windows Server and Hyper-V containers
• Installing, configuring, and managing containers by using Docker
Lab : Installing and configuring containers
• Installing and configuring Windows Server containers by using Windows PowerShell
• Installing and configuring Windows Server containers by using Docker
After completing this module, students will be able to:
• Describe containers in Windows Server 2016.
• Explain how to deploy containers.
• Explain how to install, configure, and manage containers using Docker.
Module 7: Overview of high availability and disaster recovery
This module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.
Lessons
• Defining levels of availability
• Planning high availability and disaster recovery solutions with Hyper-V virtual machines
• Backing up and restoring by using Windows Server Backup
• High availability with failover clustering in Windows Server 2016
Lab : Planning and implementing a high availability and disaster recovery solution
• Determining the appropriate high availability and disaster recovery solution
• Implementing storage migration
• Configuring Hyper-V replicas
After completing this module, students will be able to:
• Define levels of availability.
• Plan high availability and disaster recovery solutions with Hyper-V virtual machines.
• Back up and restore data by using Windows Server Backup.
• Describe high availability with failover clustering in Windows Server 2016.
Module 8: Implementing failover clustering
This module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.
Lessons
• Planning a failover cluster
• Creating and configuring a new failover cluster
• Maintaining a failover cluster
• Troubleshooting a failover cluster
• Implementing site high availability with stretch clustering
Lab : Implementing failover clustering
• Creating a failover cluster
• Verifying quorum settings and adding a node
Lab : Managing a failover cluster
• Evicting a node and verifying quorum settings
• Changing the quorum from disk witness to file-share witness, and defining node voting
• Verifying high availability
After completing this module, students will be able to:
• Plan for a failover-clustering implementation.
• Create and configure a failover cluster.
• Maintain a failover cluster.
• Troubleshoot a failover cluster.
• Implement high availability and stretch clustering for a site.
Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V
This module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.
Lessons
• Overview of the integration of Hyper-V Server 2016 with failover clustering
• Implementing Hyper-V VMs on failover clusters
• Key features for VMs in a clustered environment
Lab : Implementing failover clustering with Windows Server 2016 Hyper-V
• Configure iSCSI storage
• Configuring a failover cluster for Hyper-V
• Configuring a highly available VM
After completing this module, students will be able to:
• Describe how Hyper-V integrates with failover clustering.
• Implement Hyper-V VMs on failover clusters.
• Describe the key features for VMs in a clustered environment.
Module 10: Implementing Network Load Balancing
This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.
Lessons
• Overview of NLB
• Configuring an NLB cluster
• Planning an NLB implementation
Lab : Implementing NLB
• Implementing a Network Load Balancing (NLB) cluster
• Configuring and managing the NLB cluster
• Validating high availability for the NLB cluster
After completing this module, students will be able to:
• Describe NLB.
• Configure an NLB cluster.
• Explain how to plan an NLB implementation.
Module 11: Creating and managing deployment images
This module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.
Lessons
• Introduction to deployment images
• Creating and managing deployment images by using MDT
• Virtual machine environments for different workloads
Lab : Using MDT to deploy Windows Server 2016
• Configuring MDT
• Creating and deploying an image
After completing this module, students will be able to:
• Describe the Windows Server 2016 image deployment process.
• Create and manage deployment images by using MDT.
• Describe the different workloads in the virtual machine environment.
Module 12: Managing, monitoring, and maintaining virtual machine installations
This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.
Lessons
• WSUS overview and deployment options
• Update management process with WSUS
• Overview of Windows PowerShell DSC
• Overview of Windows Server 2016 monitoring tools
• Using Performance Monitor
• Monitoring event logs
Lab : Implementing WSUS and deploying updates
• Implementing WSUS
• Configuring update settings
• Approving and deploying an update by using WSUS
Lab : Monitoring and troubleshooting Windows Server 2016
• Establishing a performance baseline
• Identifying the source of a performance problem
• Viewing and configuring centralized event logs
After completing this module, students will be able to:
• Describe the purpose of WSUS and the requirements to implement WSUS.
• Manage the update process with WSUS.
• Describe the purpose and benefits of Windows PowerShell DSC.
• Describe the monitoring tools available in Windows Server 2016.
• Use Performance Monitor.
• Manage event logs.
Prerequisites
Before attending this course, students must have:
• A basic understanding of networking fundamentals.
• An awareness and understanding of security best practices.
• An understanding of basic AD DS concepts.
• Basic knowledge of server hardware.
• Experience supporting and configuring Windows client operating systems such as Windows 8 or Windows 10.
Additionally, students would benefit from having some previous Windows Server operating system experience, such as experience as a Windows Server systems administrator.
Overview
Technology: Windows Server
Level: Intermediate
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This 5-day classroom-based course provides the fundamental networking skills required to deploy and support Windows Server 2016 in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking.
Audience profile
This course is intended for existing IT professionals who have some networking knowledge and experience and are looking for a single course that provides insight into core and advanced networking technologies in Windows Server 2016. This audience would typically include:
• Network administrators who are looking to reinforce existing skills and learn about new networking technology changes and functionality in Windows Server 2016.
• System or Infrastructure Administrators with general networking knowledge who are looking to gain core and advanced networking knowledge and skills on Windows Server 2016.
The secondary audience for this course is those IT professionals who are looking to take the MCSA 70-741: Networking with Windows Server 2016 exam.
At course completion
After completing this course, students will be able to:
• Plan and implement an IPv4 network.
• Implement Dynamic Host Configuration Protocol (DHCP).
Implement IPv6.
• Implement Domain Name System (DNS).
• Implement and manage IP address management (IPAM).
• Plan for remote access.
• Implement DirectAccess.
• Implement virtual private networks (VPNs).
• Implement networking for branch offices.
• Configure advanced networking features.
• Implement Software Defined Networking.
Course Outline
Module 1: Planning and implementing an IPv4 network
This module also explains how to use fundamental networking tools and techniques to configure and troubleshoot IPv4-based networks.
Lessons
• Planning IPv4 addressing
• Configuring an IPv4 host
• Managing and troubleshooting IPv4 network connectivity
Lab : Planning an IPv4 network
• Planning the IPv4 address assignments
Lab : Implementing and troubleshooting an IPv4 network
• Verifying IPv4
• Troubleshooting IPv4
After completing this module, students will be able to:
• Plan IPv4 addressing.
• Configure an IPv4 host.
• Manage and troubleshoot IPv4 network connectivity
Module 2: Implementing DHCP
This module explains how to plan and implement DHCP to support the IPv4 infrastructure.
Lessons
• Overview of the DHCP server role
• Deploying DHCP
• Managing and troubleshooting DHCP
Lab : Implementing DHCP
• Planning a DHCP server implementation
• Implementing the DHCP configuration
• Validating the DHCP implementation
After completing this module, students will be able to:
• Explain the DHCP server role.
• Deploy DHCP.
• Manage and troubleshoot DHCP.
Module 3: Implementing IPv6
This module explains how to implement IPv6, and how to integrate IPv6 and IPv4 networks.
Lessons
• Overview of IPv6 addressing
• Configuring an IPv6 host
• Implementing IPv6 and IPv4 coexistence
• Transitioning from IPv4 to IPv6
Lab : Configuring and evaluating IPv6 transition technologies
• Reviewing the default IPv6 configuration
• Implementing DHCPv6
• Configuring network integration by using ISATAP
• Configuring native IPv6 connectivity
• Configuring 6to4 connectivity
After completing this module, students will be able to:
• Describe the features and benefits of IPv6.
• Configure an IPv6 host.
• Implement the coexistence between IPv4 and IPv6 networks.
• Transition from an IPv4 network to an IPv6 network.
Module 4: Implementing DNS
This module explains how to install, configure, and troubleshoot DNS within the organization’s network.
Lessons
• Implementing DNS servers
• Configuring zones in DNS
• Configuring name resolution between DNS zones
• Configuring DNS integration with Active Directory Domain Services (AD DS)
• Configuring advanced DNS settings
Lab : Planning and implementing name resolution by using DNS
• Planning DNS name resolution
• Implementing DNS servers and zones
Lab : Integrating DNS with Active Directory
• Integrating DNS with Active Directory
Lab : Configuring advanced DNS settings
• Configuring DNS policies
• Validating the DNS implementation
• Troubleshooting DNS
After completing this module, students will be able to:
• Implement DNS servers.
• Configure zones in DNS.
• Configure name resolution between DNS zones.
• Configure DNS integration with AD DS.
• Configure advanced DNS settings
Module 5: Implementing and managing IPAM
This module explains how to implement and manage the IPAM feature in Windows Server 2016. This module also explains how to use IPAM to manage services such as DHCP and DNS.
Lessons
• Overview of IPAM
• Deploying IPAM
• Managing IP address spaces by using IPAM
Lab : Implementing IPAM
• Installing the IPAM Server feature
• Provisioning the IPAM Server
• Managing IP address spaces by using IPAM
After completing this module, students will be able to:
• Describe the IPAM functionality and components.
• Deploy IPAM.
• Manage IP address spaces by using IPAM.
Module 6: Remote access in Windows Server 2016
This module explains how to plan for remote access in Windows Server 2016 and how to implement Web Application Proxy.
Lessons
• Overview of remote access
• Implementing the Web Application Proxy
Lab : Implementing Web Application Proxy
• Implementing Web Application Proxy
• Validating the Web Application Proxy deployment
After completing this module, students will be able to:
• Describe remote access.
• Implement Web Application Proxy.
Module 7: Implementing DirectAccess
This module explains how to implement and manage DirectAccess in Windows Server 2016.
Lessons
• Overview of DirectAccess
• Implementing DirectAccess by using the Getting Started Wizard
• Implementing and managing an advanced DirectAccess infrastructure
Lab : Implementing DirectAccess by using the Getting Started Wizard
• Verifying readiness for a DirectAccess deployment
• Configuring DirectAccess
• Validating the DirectAccess deployment
Lab : Deploying an advanced DirectAccess solution
• Preparing the environment for DirectAccess
• Implementing the advanced DirectAccess infrastructure
• Validating the DirectAccess deployment
After completing this module, students will be able to:
• Explain DirectAccess and how it works.
• Implement DirectAccess by using the Getting Started Wizard.
• Implement and manage an advanced DirectAccess infrastructure.
Module 8: Implementing VPNs
This module explains how to implement and manage remote access in Windows Server 2016 by using VPNs.
Lessons
• Planning VPNs
• Implementing VPNs
Lab : Implementing VPN
• Implementing VPN
• Validating the VPN deployment
• Troubleshooting VPN access
After completing this module, students will be able to:
• Plan a VPN solution.
• Implement VPNs.
Module 9: Implementing networking for branch offices
This module explains how to implement network services for branch offices.
Lessons
• Networking features and considerations for branch offices
• Implementing Distributed File System (DFS) for branch offices
• Implementing BranchCache for branch offices
Lab : Implementing DFS for branch offices
• Implementing DFS
• Validating the deployment
Lab : Implementing BranchCache
• Implementing BranchCache
• Validating the deployment
After completing this module, students will be able to:
• Describe the networking features and considerations for branch offices.
• Implement DFS for branch offices.
• Implement BranchCache for branch offices.
Module 10: Configuring advanced networking features
This module explains how to implement an advanced networking infrastructure.
Lessons
• Overview of high performance networking features
• Configuring advanced Microsoft Hyper-V networking features
Lab : Configuring advanced Hyper-V networking features
• Creating and using Hyper-V virtual switches
• Configuring and using the advanced features of a virtual switch
After completing this module, students will be able to:
• Describe the high performance networking enhancements in Windows Server 2016.
• Configure the advanced Microsoft Hyper-V networking features.
Module 11: Implementing Software Defined Networking
This module explains how to implement SDN.
Lessons
• Overview of SDN.
• Implementing network virtualization
• Implementing Network Controller
Lab : Deploying Network Controller
• Preparing to deploy Network Controller
• Deploying Network Controller
After completing this module, students will be able to:
• Describe SDN.
• Implement network virtualization.
• Implement Network Controller.
Prerequisites
In addition to professional experience, students who attend this training should already have the following technical knowledge:
• Experience working with Windows Server 2008 or Windows Server 2012
• Experience working in a Windows Server infrastructure enterprise environment
• Knowledge of the Open Systems Interconnection (OSI) model
• Understanding of core networking infrastructure components and technologies such as cabling, routers, hubs, and switches
• Familiarity with networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking
• Some basic knowledge of the TCP/IP protocol stack, addressing and name resolution
• Experience with and knowledge of Hyper-V and virtualization
• Hands-on experience working with the Windows client operating systems such as Windows 8.1 or Windows 10
• Students can meet the prerequisites by attending the following courses, or by having knowledge and skills equivalent to: 10967A: Fundamentals of a Windows Server Infrastructure
Overview
Technology: Windows Server
Level: Intermediate
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory–related issues with Windows Server 2016. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS).
Audience profile
This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. This would typically include:
AD DS administrators who are looking to train in identity and access technologies with Windows Server 2012 or Windows Server 2016.
System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2012 or Windows Server 2016.
The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam.
At course completion
After completing this course, students will be able to:
• Install and configure domain controllers.
• Manage objects in AD DS by using graphical tools and Windows PowerShell.
• Implement AD DS in complex environments.
• Implement AD DS sites, and configure and manage replication.
• Implement and manage Group Policy Objects (GPOs).
• Manage user settings by using GPOs.
• Secure AD DS and user accounts.
• Implement and manage a certificate authority (CA) hierarchy with AD CS.
• Deploy and manage certificates.
• Implement and administer AD FS.
• Implement and administer Active Directory Rights Management Services (AD RMS).
• Implement synchronization between AD DS and Azure AD.
• Monitor, troubleshoot, and establish business continuity for AD DS services.
Course Outline
Module 1: Installing and configuring domain controllers
This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.
Lessons
• Overview of AD DS
• Overview of AD DS domain controllers
• Deploying a domain controller
Lab : Deploying and administering AD DS
• Deploying AD DS
• Deploying domain controllers by performing domain controller cloning
• Administering AD DS
After completing this module, students will be able to:
• Describe AD DS and its main components.
• Describe the purpose and roles of domain controllers.
• Describe the considerations for deploying domain controllers.
Module 2: Managing objects in AD DS
This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.
Lessons
• Managing user accounts
• Managing groups in AD DS
• Managing computer objects in AD DS
• Using Windows PowerShell for AD DS administration
• Implementing and managing OUs
Lab : Managing AD DS objects
• Creating and managing groups in AD DS
• Creating and configuring user accounts in AD DS
• Managing computer objects in AD DS
Lab : Administering AD DS
• Delegate administration for OUs
• Creating and modifying AD DS objects with Windows PowerShell
After completing this module, students will be able to:
• Manage user accounts in AD DS.
• Manage groups in AD DS.
• Manage computer objects in AD DS.
• Use Windows PowerShell for AD DS administration.
• Implement and manage OUs.
• Administer AD DS.
Module 3: Advanced AD DS infrastructure management
This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.
Lessons
• Overview of advanced AD DS deployments
• Deploying a distributed AD DS environment
• Configuring AD DS trusts
Lab : Domain and trust management in AD DS
• Implementing forest trusts
• Implementing child domains in AD DS
After completing this module, students will be able to:
• Describe the components of an advanced AD DS deployment.
• Deploy a distributed AD DS environment..
• Configure AD DS trusts.
..
Module 4: Implementing and administering AD DS sites and replication
This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.
Lessons
• Overview of AD DS replication
• Configuring AD DS sites
• Configuring and monitoring AD DS replication
Lab : Implementing AD DS sites and replication
• Modifying the default site
• Creating additional sites and subnets
• Configuring AD DS replication
• Monitoring and troubleshooting AD DS replication
After completing this module, students will be able to:
• Describe how AD DS replication works.
• Configure AD DS sites to help optimize authentication and replication traffic.
• Configure and monitor AD DS replication.
Module 5: Implementing Group Policy
This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.
Lessons
• Introducing Group Policy
• Implementing and administering GPOs
• Group Policy scope and Group Policy processing
• Troubleshooting the application of GPOs
Lab : Implementing a Group Policy infrastructure
• Creating and configuring GPOs
• Managing GPO scope
Lab : Troubleshooting Group Policy infrastructure
• Verify GPO application
• Troubleshooting GPOs
After completing this module, students will be able to:
• Explain what Group Policy is.
• Implement and administer GPOs.
• Describe Group Policy scope and Group Policy processing.
• Troubleshoot GPO application.
Module 6: Managing user settings with Group Policy
This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.
Lessons
• Implementing administrative templates
• Configuring Folder Redirection, software installation, and scripts
• Configuring Group Policy preferences
Lab : Managing user settings with GPOs
• Using administrative templates to manage user settings
• Implement settings by using Group Policy preferences
• Configuring Folder Redirection
• Planning Group Policy (optional)
After completing this module, students will be able to:
• Implement administrative templates.
• Configure Folder Redirection, software installation, and scripts.
• Configure Group Policy preferences.
Module 7: Securing Active Directory Domain Services
This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).
Lessons
• Securing domain controllers
• Implementing account security
• Implementing audit authentication
• Configuring managed service accounts
Lab : Securing AD DS
• Implementing security policies for accounts, passwords, and administrative groups
• Deploying and configuring an RODC
• Creating and associating a group MSA
After completing this module, students will be able to:
• Secure domain controllers.
• Implement account security.
• Implement audit authentication.
• Configure managed service accounts (MSAs).
Module 8: Deploying and managing AD CS
This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.
Lessons
• Deploying CAs
• Administering CAs
• Troubleshooting and maintaining CAs
Lab : Deploying and configuring a two-tier CA hierarchy
• Deploying an offline root CA
• Deploying an enterprise subordinate CA
After completing this module, students will be able to:
• Deploy CAs.
• Administer CAs.
• Troubleshoot and maintain CAs.
Module 9: Deploying and managing certificates
This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.
Lessons
• Deploying and managing certificate templates
• Managing certificate deployment, revocation, and recovery
• Using certificates in a business environment
• Implementing and managing smart cards
Lab : Deploying and using certificates
• Configuring certificate templates
• Enrolling and using certificates
• Configuring and implementing key recovery
After completing this module, students will be able to:
• Deploy and manage certificate templates.
• Manage certificates deployment, revocation, and recovery.
• Use certificates in a business environment.
• Implement and manage smart cards
Module 10: Implementing and administering AD FS
This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.
Lessons
• Overview of AD FS
• AD FS requirements and planning
• Deploying and configuring AD FS
• Web Application Proxy Overview
Lab : Implementing AD FS
• Configuring AD FS prerequisites
• Installing and configuring AD FS
• Configuring an internal application for AD
• Configuring AD FS for federated business partners
After completing this module, students will be able to:
• Describe AD FS.
• Explain how to deploy AD FS.
• Explain how to implement AD FS for a single organization.
• Explain how to extend AD FS to external clients.
• Implement single sign-on (SSO) to support online services.
Module 11: Implementing and administering AD RMS
This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.
Lessons
• Overview of AD RMS
• Deploying and managing an AD RMS infrastructure
• Configuring AD RMS content protection
Lab : Implementing an AD RMS infrastructure
• Installing and configuring AD RMS
• Configuring AD RMS templates
• Using AD RMS on clients
After completing this module, students will be able to:
• Describe AD RMS.
• Deploy and manage an AD RMS infrastructure. .
• Configure AD RMS content protection.
Module 12: Implementing AD DS synchronization with Microsoft Azure AD
This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.
Lessons
• Planning and preparing for directory synchronization
• Implementing directory synchronization by using Azure AD Connect
• Managing identities with directory synchronization
Lab : Configuring directory synchronization
• Preparing for directory synchronization
• Configuring directory synchronization
• Managing Active Directory users and groups and monitoring directory synchronization
After completing this module, students will be able to:
• Plan and prepare for directory synchronization.
• Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
• Manage identities with directory synchronization.
Module 13: Monitoring, managing, and recovering AD DS
This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.
Lessons
• Monitoring AD DS
• Managing the Active Directory database
• Active Directory backup and recovery options for AD DS and other identity and access solutions
Lab : Recovering objects in AD DS
• Backing up and restoring AD DS
• Recovering objects in AD DS
After completing this module, students will be able to:
• Monitor AD DS.
• Manage the Active Directory database.
• Describe the backup and recovery options for AD DS and other identity access solutions.
Prerequisites
Before attending this course, students must have:
• Some exposure to and experience with AD DS concepts and technologies in Windows Server 2012 or Windows Server 2016.
• Experience working with and configuring Windows Server 2012 or Windows Server 2016
• Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
• Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
• An awareness of basic security best practices.
• Hands-on working experience with Windows client operating systems such as Windows 7, Windows 8, Windows 8.1, or Windows 10.
• Basic experience with the Windows PowerShell command-line interface.
Overview
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to.
This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.
Audience profile
This course is for IT professionals who need to securely administer Windows Server 2016 networks. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the internet and cloud services.
Students who seek certification in the 70-744 Securing Windows server exam also will benefit from this course.
At course completion
After completing this course, students will be able to:
• Secure Windows Server.
• Protect credentials and implement privileged access workstations.
• Limit administrator rights with Just Enough Administration.
• Manage privileged access.
• Mitigate malware and threats.
• Analyze activity with advanced auditing and log analytics.
• Deploy and configure Advanced Threat Analytics and Microsoft Operations Management Suite.
• Configure Guarded Fabric virtual machines (VMs).
• Use the Security Compliance Toolkit (SCT) and containers to improve security.
• Plan and protect data.
• Optimize and secure file services.
• Secure network traffic with firewalls and encryption.
• Secure network traffic by using DNSSEC and Message Analyzer.
Course Outline
Module 1: Attacks, breach detection, and Sysinternals tools
This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.
Lessons
• Understanding attacks
• Detecting security breaches
• Examining activity with the Sysinternals tools
Lab : Basic breach detection and incident response strategies
• Identifying attack types
• Exploring Sysinternals tools
After completing this module, students will be able to:
• Describe the types of attacks that can occur.
• Explain how to detect security breaches.
• Explain how to examine activity by using the Sysinternals suite of tools.
Module 2: Protecting credentials and privileged access
This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.
Lessons
• Understanding user rights
• Computer and service accounts
• Protecting credentials
• Privileged Access Workstations and jump servers
• Local administrator password solution
Lab : Implementing user rights, security options, and group managed service accounts
• Configuring user rights and account-security options
• Delegating privileges
• Creating group Managed Service Accounts
• Locating problematic accounts
Lab : Configuring and deploying LAPs
• Installing and configuring LAPs
• Deploying and testing LAPs
After completing this module, students will be able to:
• Configure user rights.
• Implement computer and service accounts.
• Protect credentials.
• Describe how to configure Privileged Access Workstations and jump servers.
• Configure the Local Administrator Password Solution (LAPS).
Module 3: Limiting administrator rights with Just Enough Administration
This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.
Lessons
• Understanding JEA
• Verifying and deploying JEA
Lab : Limiting administrator privileges with JEA
• Creating a role-capability file
• Creating a session-configuration file
• Creating a JEA endpoint
• Connecting and testing a JEA endpoint
• Deploying a JEA configuration to another computer
After completing this module, students will be able to:
• Understand JEA.
• Verify and deploy JEA.
Module 4: Privileged access management and administrative forests
This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).
Lessons
• ESAE forests
• Overview of Microsoft Identity Manager
• Overview of JIT administration and PAM
Lab : Limiting administrator privileges with PAM
• Layered approach to security
• Configuring trust relationships and shadow principals
• Requesting privileged access
• Managing PAM roles
After completing this module, students will be able to:
• Describe ESAE forests.
• Describe MIM.
• Understand JIT administration and PAM.
Module 5: Mitigating malware and threats
This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.
Lessons
• Configuring and managing Windows Defender
• Restricting software
• Configuring and using the Device Guard feature
Lab : Securing applications with Windows Defender, AppLocker, and Device Guard Rules
• Configuring Windows Defender
• Configuring AppLocker
• Configuring Device Guard
After completing this module, students will be able to:
• Configure and manage Windows Defender.
• Use software restriction policies and AppLocker.
• Configure and use the Device Guard feature.
Module 6: Analyzing activity with advanced auditing and log analytics
This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.
Lessons
• Overview of auditing
• Advanced auditing
• Windows PowerShell auditing and logging
Lab : Configuring advanced auditing
• Configuring the auditing of file system access
• Auditing domain sign-ins
• Managing advanced audit policy configuration
• Windows PowerShell logging and auditing
After completing this module, students will be able to:
• Describe auditing.
• Understand advanced auditing.
• Configure Windows PowerShell auditing and logging.
Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.
Lessons
• Deploying and configuring ATA
• Deploying and configuring Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
Lab : Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
• Preparing and deploying ATA
• Preparing and deploying Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
After completing this module, students will be able to:
• Deploy and configure ATA.
• Deploy and configure Microsoft Operations Management Suite.
• Deploy and configure Azure Security Center.
Module 8: Secure Virtualization Infrastructure
This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.
Lessons
• Guarded fabric
• Shielded and encryption-supported virtual machines
Lab : Guarded fabric with Admin-trusted attestation and shielded VMs
• Deploying a guarded fabric with admin-trusted attestation
• Deploying a shielded VM
After completing this module, students will be able to:
• Configure the guarded fabric.
• Describe shielded and encryption-supported VMs.
Module 9: Securing application development and server-workload infrastructure
This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.
Lessons
• Using SCT
• Understanding containers
Lab : Using SCT
• Configuring a security baseline for Windows Server 2016
• Deploying the security baseline for Windows Server 2016
Lab : Deploying and configuring containers
• Deploying and managing a Windows container
After completing this module, students will be able to:
• Install SCT, and create and deploy security baselines.
• Configure Windows and Hyper-V containers in Windows Server 2016.
Module 10: Planning and protecting data
This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.
Lessons
• Planning and implementing encryption
• Planning and implementing BitLocker
• Protecting data by using Azure Information Protection
Lab : Protecting data by using encryption and BitLocker
• Encrypting and recovering access to encrypted files
• Using BitLocker to protect data
After completing this module, students will be able to:
• Plan and implement encryption.
• Plan and implement BitLocker.
• Plan and implement Azure Information Protection.
Module 11: Optimizing and securing file services
This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).
Lessons
• File Server Resource Manager
• Implementing classification and file management tasks
• Dynamic Access Control
Lab : Quotas and file screening
• Configuring File Server Resource Manager quotas
• Configuring file screening and storage reports
Lab : Implementing Dynamic Access Control
• Preparing for implementing Dynamic Access Control
• Implementing Dynamic Access Control
• Validating and remediating Dynamic Access Control
After completing this module, students will be able to:
• Describe File Server Resource Manager.
• Implement classification and file management tasks.
• Implement Dynamic Access Control.
Module 12: Securing network traffic with firewalls and encryption
This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.
Lessons
• Understanding network-related security threats
• Understanding Windows Firewall with Advanced Security
• Configuring IPsec
• Datacenter Firewall
Lab : Configuring Windows Firewall with Advanced Security
• Creating and testing inbound rules
• Creating and testing outbound rules
• Creating and testing connection security rules
After completing this module, students will be able to:
• Describe network-related security threats and how to mitigate them.
• Configure Windows Firewall with Advanced Security.
• Configure IPsec.
• Describe Datacenter Firewall.
Module 13: Securing network traffic
This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.
Lessons
• Configuring advanced DNS settings
• Examining network traffic with Message Analyzer
• Securing and analyzing SMB traffic
Lab : Securing DNS
• Configuring and testing DNSSEC
• Configuring DNS policies and RRL
Lab : Microsoft Message Analyzer and SMB encryption
• Installing and using the Message Analyzer
• Configuring and verifying SMB encryption on SMB shares
After completing this module, students will be able to:
• Configure advanced DNS settings.
• Use the Message Analyzer.
• Secure SMB traffic.
Prerequisites
Students should have at least two years of experience in the IT field and should have:
• Completed courses 740, 741, and 742, or the equivalent.
• A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).
• A solid, practical understanding of Active Directory Domain Services (AD DS) principles.
• A solid, practical understanding of Microsoft Hyper-V virtualization fundamentals.
• An understanding of Windows Server security principles.
Overview
Audience(s): Data Professional
Technology: Microsoft SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course is designed to introduce students to Transact-SQL. It is designed in such a way that the first three days can be taught as a course to students requiring the knowledge for other courses in the SQL Server curriculum. Days 4 & 5 teach the remaining skills required to take exam 70-761.
Audience profile
The main purpose of the course is to give students a good understanding of the Transact-SQL language which is used by all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. As such, the primary target audience for this course is: Database Administrators, Database Developers and BI professionals.
At course completion
After completing this course, students will be able to:
• Describe key capabilities and components of SQL Server.
• Describe T-SQL, sets, and predicate logic.
• Write a single table SELECT statement.
• Write a multi-table SELECT statement.
• Write SELECT statements with filtering and sorting.
• Describe how SQL Server uses data types.
• Write DML statements.
• Write queries that use built-in functions.
• Write queries that aggregate data.
• Write subqueries.
• Create and implement views and table-valued functions.
• Use set operators to combine query results.
• Write queries that use window ranking, offset, and aggregate functions.
• Transform data by implementing pivot, unpivot, rollup and cube.
• Create and implement stored procedures.
• Add programming constructs such as variables, conditions, and loops to T-SQL code.
Course Outline
Module 1: Introduction to Microsoft SQL Server
This module introduces SQL Server, the versions of SQL Server, including cloud versions, and how to connect to SQL Server using SQL Server Management Studio.
Lessons
• The Basic Architecture of SQL Server
• SQL Server Editions and Versions
• Getting Started with SQL Server Management Studio
Lab : Working with SQL Server Tools
• Working with SQL Server Management Studio
• Creating and Organizing T-SQL Scripts
• Using Books Online
After completing this module, you will be able to:
• Describe relational databases and Transact-SQL queries.
• Describe the on-premise and cloud-based editions and versions of SQL Server.
• Describe how to use SQL Server Management Studio (SSMS) to connect to an instance of SQL Server, explore the databases contained in the instance, and work with script files that contain T-SQL queries.
Module 2: Introduction to T-SQL Querying
This module describes the elements of T-SQL and their role in writing queries. Describe the use of sets in SQL Server. Describe the use of predicate logic in SQL Server. Describe the logical order of operations in SELECT statements.
Lessons
• Introducing T-SQL
• Understanding Sets
• Understanding Predicate Logic
• Understanding the Logical Order of Operations in SELECT statements
Lab : Introduction to T-SQL Querying
• Executing Basic SELECT Statements
• Executing Queries that Filter Data using Predicates
• Executing Queries That Sort Data Using ORDER BY
After completing this module, you will be able to:
• Describe the role of T-SQL in writing SELECT statements.
• Describe the elements of the T-SQL language and which elements will be useful in writing queries.
• Describe the concepts of the set theory, one of the mathematical underpinnings of relational databases, and to help you apply it to how you think about querying SQL Server
• Describe predicate logic and examine its application to querying SQL Server.
• Explain the elements of a SELECT statement, delineate the order in which the elements are evaluated, and then apply this understanding to a practical approach to writing queries.
Module 3: Writing SELECT QueriesThis module introduces the fundamentals of the SELECT statement, focusing on queries against a single table.
Lessons
• Writing Simple SELECT Statements
• Eliminating Duplicates with DISTINCT
• Using Column and Table Aliases
• Writing Simple CASE Expressions
Lab : Writing Basic SELECT Statements
• Writing Simple SELECT Statements
• Eliminating Duplicates Using DISTINCT
• Using Column and Table Aliases
• Using a Simple CASE Expression
After completing this module, you will be able to:
• Describe the structure and format of the SELECT statement, as well as enhancements that will add functionality and readability to your queries
• Describe how to eliminate duplicates using the DISTINCT clause
• Describe the use of column and table aliases
• Understand and use CASE expressions
Module 4: Querying Multiple Tables
This module describes how to write queries that combine data from multiple sources in Microsoft SQL Server.
Lessons
• Understanding Joins
• Querying with Inner Joins
• Querying with Outer Joins
• Querying with Cross Joins and Self Joins
Lab : Querying Multiple Tables
• Writing Queries that use Inner Joins
• Writing Queries that use Multiple-Table Inner Joins
• Writing Queries that use Self-Joins
• Writing Queries that use Outer Joins
• Writing Queries that use Cross Joins
After completing this module, you will be able to:
• Explain the fundamentals of joins in SQL Server
• Write inner join queries
• Write queries that use outer joins
• Use additional join types
Module 5: Sorting and Filtering Data
This module describes how to implement sorting and filtering.
Lessons
• Sorting Data
• Filtering Data with Predicates
• Filtering Data with TOP and OFFSET-FETCH
• Working with Unknown Values
Lab : Sorting and Filtering Data
• Writing Queries that Filter Data using a WHERE Clause
• Writing Queries that Sort Data Using an ORDER BY Clause
• Writing Queries that Filter Data Using the TOP Option
• Write Queries that filter data using the OFFSET-FETCH clause
After completing this module, you will be able to:
• Explain how to add an ORDER BY clause to your queries to control the order of rows displayed in your query's output
• Explain how to construct WHERE clauses to filter out rows that do not match the predicate.
• Explain how to limit ranges of rows in the SELECT clause using a TOP option.
• Explain how to limit ranges of rows using the OFFSET-FETCH option of an ORDER BY clause.
• Explain how three-valued logic accounts for unknown and missing values, how SQL Server uses NULL to mark missing values, and how to test for NULL in your queries.
.
Module 6: Working with SQL Server Data Types
This module introduces the data types SQL Server uses to store data.
Lessons
• Introducing SQL Server Data Types
• Working with Character Data
• Working with Date and Time Data
Lab : Working with SQL Server Data Types
• Writing Queries that Return Date and Time Data
• Writing Queries that use Date and Time Functions
• Writing Queries That Return Character Data
• Writing Queries That Return Character Functions
After completing this module, you will be able to:
• Explore many of the data types SQL Server uses to store data and how data types are converted between types
• Explain the SQL Server character-based data types, how character comparisons work, and some common functions you may find useful in your queries
• Describe data types that are used to store temporal data, how to enter dates and times so they will be properly parsed by SQL Server, and how to manipulate dates and times with built-in functions.
Module 7: Using DML to Modify Data
This module describes how to create DML queries, and why you would want to.
Lessons
• Adding Data to Tables
• Modifying and Removing Data
• Generating automatic column values
Lab : Using DML to Modify Data
• Inserting Records with DML
• Updating and Deleting Records Using DML
After completing this module, you will be able to:
• Use INSERT and SELECT INTO statements
• Use UPDATE, MERGE, DELETE, and TRUNCATE.
Module 8: Using Built-In Functions
This module introduces some of the many built in functions in SQL Server.
Lessons
• Writing Queries with Built-In Functions
• Using Conversion Functions
• Using Logical Functions
• Using Functions to Work with NULL
Lab : Using Built-In Functions
• Writing Queries That Use Conversion Functions
• Writing Queries that use Logical Functions
• Writing Queries that Test for Nullability
After completing this module, you will be able to:
• Describe the types of functions provided by SQL Server, and then focus on working with scalar functions
• Explain how to explicitly convert data between types using several SQL Server functions
• Describe how to use logical functions that evaluate an expression and return a scalar result.
• Describe additional functions for working with NULL
Module 9: Grouping and Aggregating Data
This module describes how to use aggregate functions.
Lessons
• Using Aggregate Functions
• Using the GROUP BY Clause
• Filtering Groups with HAVING
Lab : Grouping and Aggregating Data
• Writing Queries That Use the GROUP BY Clause
• Writing Queries that Use Aggregate Functions
• Writing Queries that Use Distinct Aggregate Functions
• Writing Queries that Filter Groups with the HAVING Clause
After completing this module, you will be able to:
• Describe the built-in aggregate function in SQL Server and write queries using it.
• Write queries that separate rows using the GROUP BY clause.
• Write queries that use the HAVING clause to filter groups.
Module 10: Using Subqueries
This module describes several types of subquery and how and when to use them.
Lessons
• Writing Self-Contained Subqueries
• Writing Correlated Subqueries
• Using the EXISTS Predicate with Subqueries
Lab : Using Subqueries
• Writing Queries That Use Self-Contained Subqueries
• Writing Queries That Use Scalar and Multi-Result Subqueries
• Writing Queries That Use Correlated Subqueries and an EXISTS Clause
After completing this module, you will be able to:
• Describe where subqueries may be used in a SELECT statement.
• Write queries that use correlated subqueries in a SELECT statement
• Write queries that use EXISTS predicates in a WHERE clause to test for the existence of qualifying rows
• Use the EXISTS predicate to efficiently check for the existence of rows in a subquery.
Module 11: Using Table Expressions
Previously in this course, you learned about using subqueries as an expression that returned results to an outer calling query. Like subqueries, table expressions are query expressions, but table expressions extend this idea by allowing you to name them and to work with their results as you would work with data in any valid relational table. Microsoft SQL Server supports four types of table expressions: derived tables, common table expression (CTEs), views, and inline table-valued functions (TVFs). In this module, you will learn to work with these forms of table expressions and learn how to use them to help create a modular approach to writing queries.
Lessons
• Using Views
• Using Inline Table-Valued Functions
• Using Derived Tables
• Using Common Table Expressions
Lab : Using Table Expressions
• Writing Queries That Use Views
• Writing Queries That Use Derived Tables
• Writing Queries That Use Common Table Expressions (CTEs)
• Writing Queries That Use Inline Table-Valued Expressions (TVFs)
After completing this module, you will be able to:
• Write queries that return results from views.
• Use the CREATE FUNCTION statement to create simple inline TVFs.
• Write queries that create and retrieve results from derived tables.
• Write queries that create CTEs and return results from the table expression.
Module 12: Using Set Operators
This module introduces how to use the set operators UNION, INTERSECT, and EXCEPT to compare rows between two input sets.
Lessons
• Writing Queries with the UNION operator
• Using EXCEPT and INTERSECT
• Using APPLY
Lab : Using Set Operators
• Writing Queries That Use UNION Set Operators and UNION ALL
• Writing Queries That Use CROSS APPLY and OUTER APPLY Operators
• Writing Queries That Use the EXCEPT and INTERSECT Operators
After completing this module, students will be able to:
• Write queries that use UNION to combine input sets.
• Write queries that use UNION ALL to combine input sets
• Write queries that use the EXCEPT operator to return only rows in one set but not another.
• Write queries that use the INTERSECT operator to return only rows that are present in both sets
• Write queries using the CROSS APPLY operator.
• Write queries using the OUTER APPLY operator
Module 13: Using Windows Ranking, Offset, and Aggregate Functions
This module describes the benefits to using window functions. Restrict window functions to rows defined in an OVER clause, including partitions and frames. Write queries that use window functions to operate on a window of rows and return ranking, aggregation, and offset comparison results.
Lessons
• Creating Windows with OVER
• Exploring Window Functions
Lab : Using Windows Ranking, Offset, and Aggregate Functions
• Writing Queries that use Ranking Functions
• Writing Queries that use Offset Functions
• Writing Queries that use Window Aggregate Functions
After completing this module, students will be able to:
• Describe the T-SQL components used to define windows, and the relationships between them.
• Write queries that use the OVER clause, with partitioning, ordering, and framing to define windows
• Write queries that use window aggregate functions.
• Write queries that use window ranking functions.
• Write queries that use window offset functions
Module 14: Pivoting and Grouping Sets
This module describes write queries that pivot and unpivot result sets. Write queries that specify multiple groupings with grouping sets
Lessons
• Writing Queries with PIVOT and UNPIVOT
• Working with Grouping Sets
Lab : Pivoting and Grouping Sets
• Writing Queries that use the PIVOT Operator
• Writing Queries that use the UNPIVOT Operator
• Writing Queries that use the GROUPING SETS CUBE and ROLLUP Subclauses
After completing this module, students will be able to:
• Describe how pivoting data can be used in T-SQL queries.
• Write queries that pivot data from rows to columns using the PIVOT operator.
• Write queries that unpivot data from columns back to rows using the UNPIVOT operator.
• Write queries using the GROUPING SETS subclause.
• Write queries that use ROLLUP AND CUBE.
• Write queries that use the GROUPING_ID function.
Module 15: Executing Stored Procedures
This module describes how to return results by executing stored procedures. Pass parameters to procedures. Create simple stored procedures that encapsulate a SELECT statement. Construct and execute dynamic SQL with EXEC and sp_executesql.
Lessons
• Querying Data with Stored Procedures
• Passing Parameters to Stored procedures
• Creating Simple Stored Procedures
• Working with Dynamic SQL
Lab : Executing Stored Procedures
• Using the EXECUTE statement to Invoke Stored Procedures
• Passing Parameters to Stored procedures
• Executing System Stored Procedures
After completing this module, students will be able to:
• Describe stored procedures and their use.
• Write T-SQL statements that execute stored procedures to return data.
• Write EXECUTE statements that pass input parameters to stored procedures.
• Write T-SQL batches that prepare output parameters and execute stored procedures.
• Use the CREATE PROCEDURE statement to write a stored procedure.
• Create a stored procedure that accepts input parameters.
• Describe how T-SQL can be dynamically constructed.
• Write queries that use dynamic SQL.
Module 16: Programming with T-SQL
This module describes how to enhance your T-SQL code with programming elements.
Lessons
• T-SQL Programming Elements
• Controlling Program Flow
Lab : Programming with T-SQL
• Declaring Variables and Delimiting Batches
• Using Control-Of-Flow Elements
• Using Variables in a Dynamic SQL Statement
• Using Synonyms
After completing this module, students will be able to:
• Describe how Microsoft SQL Server treats collections of statements as batches.
• Create and submit batches of T-SQL code for execution by SQL Server.
• Describe how SQL Server stores temporary objects as variables.
• Write code that declares and assigns variables.
• Create and invoke synonyms
• Describe the control-of-flow elements in T-SQL.
• Write T-SQL code using IF...ELSE blocks.
• Write T-SQL code that uses WHILE.
Module 17: Implementing Error Handling
This module introduces error handling for T-SQL.
Lessons
• Implementing T-SQL error handling
• Implementing structured exception handling
Lab : Implementing Error Handling
• Redirecting errors with TRY/CATCH
• Using THROW to pass an error message back to a client
After completing this module, students will be able to:
• Implement T-SQL error handling.
• Implement structured exception handling.
Module 18: Implementing Transactions
This module describes how to implement transactions.
Lessons
• Transactions and the database engines
• Controlling transactions
Lab : Implementing Transactions
• Controlling transactions with BEGIN, COMMIT, and ROLLBACK
• Adding error handling to a CATCH block
After completing this module, students will be able to:
• Describe transactions and the differences between batches and transactions.
• Describe batches and how they are handled by SQL Server.
• Create and manage transactions with transaction control language (TCL) statements.
• Use SET XACT_ABORT to define SQL Servers handling of transactions outside TRY/CATCH blocks.
Additional Reading
To help you prepare for this class, review the following resources:
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to developing a database.
Audience profile
The primary audience for this course is IT Professionals who want to become skilled on SQL Server product features and technologies for implementing a database.
The secondary audiences for this course are individuals who are developers from other product platforms looking to become skilled in the implementation of a SQL Server database.
At course completion
After completing this course, students will be able to:
• Design and Implement Tables.
• Describe advanced table designs
• Ensure Data Integrity through Constraints.
• Describe indexes, including Optimized and Columnstore indexes
• Design and Implement Views.
• Design and Implement Stored Procedures.
• Design and Implement User Defined Functions.
• Respond to data manipulation using triggers.
• Design and Implement In-Memory Tables.
• Implement Managed Code in SQL Server.
• Store and Query XML Data.
• Work with Spatial Data.
• Store and Query Blobs and Text Documents.
Course Outline
Module 1: Introduction to Database Development
Before beginning to work with Microsoft SQL Server in either a development or an administration role, it is important to understand the scope of the SQL Server platform. In particular, it is useful to understand that SQL Server is not just a database engine—it is a complete platform for managing enterprise data. SQL Server provides a strong data platform for all sizes of organizations, in addition to a comprehensive set of tools to make development easier, and more robust.
Lessons
• Introduction to the SQL Server Platform
• SQL Server Database Development Tasks
After completing this module, you will be able to:
• Describe the SQL Server platform.
• Use SQL Server administration tools.
Module 2: Designing and Implementing Tables
In a relational database management system (RDBMS), user and system data is stored in tables. Each table consists of a set of rows that describe entities and a set of columns that hold the attributes of an entity. For example, a Customer table might have columns such as CustomerName and CreditLimit, and a row for each customer. In Microsoft SQL Server data management software tables are contained within schemas that are very similar in concept to folders that contain files in the operating system. Designing tables is one of the most important tasks that a database developer undertakes, because incorrect table design leads to the inability to query the data efficiently. After an appropriate design has been created, it is important to know how to correctly implement the design.
Lessons
• Designing Tables
• Data Types
• Working with Schemas
• Creating and Altering Tables
Lab: Designing and Implementing Tables
• Designing Tables
• Creating Schemas
• Creating Tables
After completing this module, you will be able to:
• Design tables using normalization, primary and foreign keys.
• Work with identity columns.
• Understand built-in and user data types.
• Use schemas in your database designs to organize data, and manage object security.
• Work with computed columns and temporary tables.
Module 3: Advanced Table Designs
The physical design of a database can have a significant impact on the ability of the database to meet the storage and performance requirements set out by the stakeholders. Designing a physical database implementation includes planning the filegroups, how to use partitioning to manage large tables, and using compression to improve storage and performance. Temporal tables are a new feature in SQL Server and offer a straightforward solution to collecting changes to your data.
Lessons
• Partitioning Data
• Compressing Data
• Temporal Tables
Lab: Using Advanced Table Designs
• Partitioning Data
• Compressing Data
After completing this module, you will be able to:
• Describe the considerations for using partitioned tables in a SQL Server database.
• Plan for using data compression in a SQL Server database.
• Use temporal tables to store and query changes to your data.
Module 4: Ensuring Data Integrity through Constraints
The quality of data in your database largely determines the usefulness and effectiveness of applications that rely on it—the success or failure of an organization or a business venture could depend on it. Ensuring data integrity is a critical step in maintaining high-quality data. You should enforce data integrity at all levels of an application from first entry or collection through storage. Microsoft SQL Server data management software provides a range of features to simplify the job.
Lessons
• Enforcing Data Integrity
• Implementing Data Domain Integrity
• Implementing Entity and Referential Integrity
Lab: Using Data Integrity Through Constraints
• Add Constraints
• Test the Constraints
After completing this module, you will be able to:
• Describe the options for enforcing data integrity, and the levels at which they should be applied.
• Implement domain integrity through options such as check, unique, and default constraints.
• Implement referential integrity through primary and foreign key constraints.
Module 5: Introduction to Indexes
An index is a collection of pages associated with a table. Indexes are used to improve the performance of queries or enforce uniqueness. Before learning to implement indexes, it is helpful to understand how they work, how effective different data types are when used within indexes, and how indexes can be constructed from multiple columns. This module discusses table structures that do not have indexes, and the different index types available in Microsoft SQL Server.
Lessons
• Core Indexing Concepts
• Data Types and Indexes
• Heaps, Clustered, and Nonclustered Indexes
• Single Column and Composite Indexes
Lab: Implementing Indexes
• Creating a Heap
• Creating a Clustered Index
• Creating a Covered Index
After completing this module, you will be able to:
• Explain core indexing concepts.
• Evaluate which index to use for different data types.
• Describe the difference between single and composite column indexes.
Module 6: Designing Optimized Index Strategies
Indexes play an important role in enabling SQL Server to retrieve data from a database quickly and efficiently. This module discusses advanced index topics including covering indexes, the INCLUDE clause, query hints, padding and fill factor, statistics, using DMOs, the Database Tuning Advisor, and Query Store.
Lessons
• Index Strategies
• Managing Indexes
• Execution Plans
• The Database Engine Tuning Advisor
• Query Store
Lab: Optimizing Indexes
• Using Query Store
• Heaps and Clustered Indexes
• Creating a Covered Index
After completing this module, you will be able to:
• What a covering index is, and when to use one.
• The issues involved in managing indexes.
• Actual and estimated execution plans.
• How to use Database Tuning Advisor to improve the performance of queries.
• How to use Query Store to improve query performance.
Module 7: Columnstore Indexes
Introduced in Microsoft SQL Server 2012, columnstore indexes are used in large data warehouse solutions by many organizations. This module highlights the benefits of using these indexes on large datasets; the improvements made to columnstore indexes in SQL Server 2016; and the considerations needed to use columnstore indexes effectively in your solutions.
Lessons
• Introduction to Columnstore Indexes
• Creating Columnstore Indexes
• Working with Columnstore Indexes
Lab: Using Columnstore Indexes
• Creating a Columnstore Index
• Create a Memory Optimized Columnstore Table
After completing this module, you will be able to:
• Describe columnstore indexes and identify suitable scenarios for their use.
• Create clustered and nonclustered columnstore indexes.
• Describe considerations for using columnstore indexes.
Module 8: Designing and Implementing Views
This module describes the design and implementation of views. A view is a special type of query—one that is stored and can be used in other queries—just like a table. With a view, only the query definition is stored on disk; not the result set. The only exception to this is indexed views, when the result set is also stored on disk, just like a table. Views simplify the design of a database by providing a layer of abstraction, and hiding the complexity of table joins. Views are also a way of securing your data by giving users permissions to use a view, without giving them permissions to the underlying objects. This means data can be kept private, and can only be viewed by appropriate users.
Lessons
• Introduction to Views
• Creating and Managing Views
• Performance Considerations for Views
Lab: Designing and Implementing Views
• Creating Standard Views
• Creating an Updateable view
After completing this module, you will be able to:
• Understand the role of views in database design.
• Create and manage views.
• Understand the performance considerations with views.
Module 9: Designing and Implementing Stored Procedures
This module describes the design and implementation of stored procedures.
Lessons
• Introduction to Stored Procedures
• Working with Stored Procedures
• Implementing Parameterized Stored Procedures
• Controlling Execution Context
Lab: Designing and Implementing Stored Procedures
• Create Stored procedures
• Create Parameterized Stored procedures
• Changes Stored Procedure Execution Context
After completing this module, you will be able to:
• Understand what stored procedures are, and what benefits they have.
• Design, create, and alter stored procedures.
• Control the execution context of stored procedures.
• Implement stored procedures that use parameters.
Module 10: Designing and Implementing User-Defined Functions
Functions are routines that you use to encapsulate frequently performed logic. Rather than having to repeat the function logic in many places, code can call the function. This makes code more maintainable, and easier to debug. In this module, you will learn to design and implement user-defined functions (UDFs) that enforce business rules or data consistency. You will also learn how to modify and maintain existing functions.
Lessons
• Overview of Functions
• Designing and Implementing Scalar Functions
• Designing and Implementing Table-Valued Functions
• Considerations for Implementing Functions
• Alternatives to Functions
Lab: Designing and Implementing User-Defined Functions
• Format Phone numbers
• Modify an Existing Function
•
After completing this module, you will be able to:
• Describe different types of functions.
• Design and implement scalar functions.
• Design and implement table-valued functions (TVFs).
• Describe considerations for implementing functions.
• Describe alternatives to functions.
Module 11: Responding to Data Manipulation via Triggers
Data Manipulation Language (DML) triggers are powerful tools that you can use to enforce domain, entity, referential data integrity and business logic. The enforcement of integrity helps you to build reliable applications. In this module, you will learn what DML triggers are, how they enforce data integrity, the different types of trigger that are available to you, and how to define them in your database.
Lessons
• Designing DML Triggers
• Implementing DML Triggers
• Advanced Trigger Concepts
Lab: Responding to Data Manipulation by Using Triggers
• Create and Test the Audit Trigger
• Improve the Audit Trigger
After completing this module, you will be able to:
• Design DML triggers
• Implement DML triggers
• Explain advanced DML trigger concepts, such as nesting and recursion.
Module 12: Using In-Memory Tables
Microsoft SQL Server 2014 data management software introduced in-memory online transaction processing (OLTP) functionality features to improve the performance of OLTP workloads. SQL Server adds several enhancements, such as the ability to alter a memory-optimized table without recreating it. Memory-optimized tables are primarily stored in memory, which provides the improved performance by reducing hard disk access. Natively compiled stored procedures further improve performance over traditional interpreted Transact-SQL.
Lessons
• Memory-Optimized Tables
• Natively Compiled Stored Procedures
Lab: Using In-Memory Database Capabilities
• Using Memory-Optimized Tables
• Using Natively Compiled Stored procedures
After completing this module, you will be able to:
• Use memory-optimized tables to improve performance for latch-bound workloads.
• Use natively compiled stored procedures.
Module 13: Implementing Managed Code in SQL Server
As a SQL Server professional, you are likely to be asked to create databases that meet business needs. Most requirements can be met using Transact-SQL. However, occasionally you may need additional capabilities that can only be met by using common language runtime (CLR) code. As functionality is added to SQL Server with each new release, the necessity to use managed code decreases. However, there are times when you might need to create aggregates, stored procedures, triggers, user-defined functions, or user-defined types. You can use any .NET Framework language to develop these objects. In this module, you will learn how to use CLR managed code to create user-defined database objects for SQL Server.
Lessons
• Introduction to CLR Integration in SQL Server
• Implementing and Publishing CLR Assemblies
Lab: Implementing Managed Code in SQL Server
• Assessing Proposed CLR Code
• Creating a Scalar-Valued CLR Function
• Creating a Table Valued CLR Function
After completing this module, you will be able to:
• Explain the importance of CLR integration in SQL Server.
• Implement and publish CLR assemblies using SQL Server Data Tools (SSDT).
Module 14: Storing and Querying XML Data in SQL Server
XML provides rules for encoding documents in a machine-readable form. It has become a widely adopted standard for representing data structures, rather than sending unstructured documents. Servers that are running Microsoft SQL Server data management software often need to use XML to interchange data with other systems; many SQL Server tools provide an XML-based interface. SQL Server offers extensive handling of XML, both for storage and querying. This module introduces XML, shows how to store XML data within SQL Server, and shows how to query the XML data. The ability to query XML data directly avoids the need to extract data into a relational format before executing Structured Query Language (SQL) queries. To effectively process XML, you need to be able to query XML data in several ways: returning existing relational data as XML, and querying data that is already XML.
Lessons
• Introduction to XML and XML Schemas
• Storing XML Data and Schemas in SQL Server
• Implementing the XML Data Type
• Using the Transact-SQL FOR XML Statement
• Getting Started with XQuery
• Shredding XML
Lab: Storing and Querying XML Data in SQL Server
• Determining when to use XML
• Testing XML Data Storage in Variables
• Using XML Schemas
• Using FOR XML Queries
• Creating a Stored Procedure to Return XML
After completing this module, you will be able to:
• Describe XML and XML schemas.
• Store XML data and associated XML schemas in SQL Server.
• Implement XML indexes within SQL Server.
• Use the Transact-SQL FOR XML statement.
• Work with basic XQuery queries.
Module 15: Storing and Querying Spatial Data in SQL Server
This module describes spatial data and how this data can be implemented within SQL Server.
Lessons
• Introduction to Spatial Data
• Working with SQL Server Spatial Data Types
• Using Spatial Data in Applications
Lab: Working with SQL Server Spatial Data
• Become Familiar with the Geometry Data Type
• Add Spatial Data to an Existing Table
• Find Nearby Locations
After completing this module, you will be able to:
• Describe how spatial data can be stored in SQL Server
• Use basic methods of the GEOMETRY and GEOGRAPHY data types
• Query databases containing spatial data
Module 16: Storing and Querying BLOBs and Text Documents in SQL Server
Traditionally, databases have been used to store information in the form of simple values—such as integers, dates, and strings—that contrast with more complex data formats, such as documents, spreadsheets, image files, and video files. As the systems that databases support have become more complex, administrators have found it necessary to integrate this more complex file data with the structured data in database tables. For example, in a product database, it can be helpful to associate a product record with the service manual or instructional videos for that product. SQL Server provides several ways to integrate these files—that are often known as Binary Large Objects (BLOBs)—and enable their content to be indexed and included in search results. In this module, you will learn how to design and optimize a database that includes BLOBs.
Lessons
• Considerations for BLOB Data
• Working with FILESTREAM
• Using Full-Text Search
Lab: Storing and Querying BLOBs and Text Documents in SQL Server
• Enabling and Using FILESTREAM Columns
• Enabling and Using File Tables
• Using a Full-Text Index
After completing this module, you will be able to:
• Describe the considerations for designing databases that incorporate BLOB data.
• Describe the benefits and design considerations for using FILESTREAM to store BLOB data on a Windows file system.
• Describe the benefits of using full-text indexing and Semantic Search, and explain how to use these features to search SQL Server data, including unstructured data
Module 17: SQL Server Concurrency
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. Concurrency control is a critical feature of multiuser database systems; it allows data to remain consistent when many users are modifying data at the same time. This module covers the implementation of concurrency in Microsoft SQL Server. You will learn about how SQL Server implements concurrency controls, and the different ways you can configure and work with concurrency settings.
Lessons
• Concurrency and Transactions
• Locking Internals
Lab: SQL Server Concurrency
• Implement Snapshot Isolation
• Implement Partition Level Locking
After completing this module, you will be able to:
• Describe concurrency and transactions in SQL Server.
• Describe SQL Server locking.
Module 18: Performance and Monitoring
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. This module looks at how to measure and monitor the performance of your SQL Server databases. The first two lessons look at SQL Server Extended Events, a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. These lessons focus on the architectural concepts, troubleshooting strategies and usage scenarios.
Lessons
• Extended Events
• Working with extended Events
• Live Query Statistics
• Optimize Database File Configuration
• Metrics
Lab: Monitoring, Tracing, and Baselining
• Collecting and Analyzing Data Using Extended Events
• Implementing Baseline Methodology
After completing this module, you will be able to:
• Understand Extended Events and how to use them.
• Work with Extended Events.
• Understand Live Query Statistics.
• Optimize the file configuration of your databases.
• Use DMVs and Performance Monitor to create baselines and gather performance metrics.
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of Transact-SQL.
• Working knowledge of relational databases.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and skills to administer a SQL server database infrastructure. Additionally, it will be of use to individuals who develop applications that deliver content from SQL Server databases.
Audience profile
The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job.
The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases.
At course completion
After completing this course, students will be able to:
• Authenticate and authorize users
• Assign server and database roles
• Authorize users to access resources
• Protect data with encryption and auditing
• Describe recovery models and backup strategies
• Backup SQL Server databases
• Restore SQL Server databases
• Automate database management
• Configure security for the SQL Server agent
• Manage alerts and notifications
• Managing SQL Server using PowerShell
• Trace access to SQL Server
• Monitor a SQL Server infrastructure
• Troubleshoot a SQL Server infrastructure
• Import and export data
Course Outline
Module 1: SQL Server Security
Protection of data within your Microsoft SQL Server databases is essential and requires a working knowledge of the issues and SQL Server security features. This module describes SQL Server security models, logins, users, partially contained databases, and cross-server authorization.
Lessons
• Authenticating Connections to SQL Server
• Authorizing Logins to Connect to databases
• Authorization Across Servers
• Partially Contained Databases
Lab : Authenticating Users
• Create Logins
• Create Database Users
• Correct Application Login Issues
• Configure Security for Restored Databases
After completing this module, you will be able to:
• SQL Server basic concepts.
• SQL Server connection authentication.
• User login authorization to databases.
• Partially contained databases.
• Authorization across servers.
Module 2: Assigning Server and Database Roles
Using roles simplifies the management of user permissions. With roles, you can control authenticated users’ access to system resources based on each user’s job function—rather than assigning permissions user-by-user, you can grant permissions to a role, then make users members of roles. Microsoft SQL Server includes support for security roles defined at server level and at database level.
Lessons
• Working with server roles
• Working with Fixed Database Roles
• Assigning User-Defined Database Roles
Lab : Assigning server and database roles
• Assigning Server Roles
• Assigning Fixed Database Roles
• Assigning User-Defined Database Roles
• Verifying Security
After completing this module, you will be able to:
• Describe and use server roles to manage server-level security.
• Describe and use fixed database roles.
• Use custom database roles and application roles to manage database-level security.
Module 3: Authorizing Users to Access Resources
In the previous modules, you have seen how Microsoft SQL Server security is organized and how sets of permissions can be assigned at the server and database level by using fixed server roles, user-defined server roles, fixed database roles, and application roles. The final step in authorizing users to access SQL Server resources is the authorization of users and roles to access server and database objects. In this module, you will see how these object permissions are managed. In addition to access permissions on database objects, SQL Server provides the ability to determine which users are allowed to execute code, such as stored procedures and functions. In many cases, these permissions and the permissions on the database objects are best configured at the schema level rather than at the level of the individual object. Schema-based permission grants can simplify your security architecture. You will explore the granting of permissions at the schema level in the final lesson of this module.
Lessons
• Authorizing User Access to Objects
• Authorizing Users to Execute Code
• Configuring Permissions at the Schema Level
Lab : Authorizing users to access resources
• Granting, Denying, and Revoking Permissions on Objects
• Granting EXECUTE Permissions on Code
• Granting Permissions at the Schema Level
After completing this module, you will be able to:
• Authorize user access to objects.
• Authorize users to execute code.
• Configure permissions at the schema level.
Module 4: Protecting Data with Encryption and Auditing
When configuring security for your Microsoft SQL Server systems, you should ensure that you meet any of your organization’s compliance requirements for data protection. Organizations often need to adhere to industry-specific compliance policies, which mandate auditing of all data access. To address this requirement, SQL Server provides a range of options for implementing auditing. Another common compliance requirement is the encryption of data to protect against unauthorized access in the event that access to the database files is compromised. SQL Server supports this requirement by providing transparent data encryption (TDE). To reduce the risk of information leakage by users with administrative access to a database, columns containing sensitive data—such as credit card numbers or national identity numbers—can be encrypted using the Always Encrypted feature. This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server Audit feature, and how to implement encryption.
Lessons
• Options for auditing data access in SQL Server
• Implementing SQL Server Audit
• Managing SQL Server Audit
• Protecting Data with Encryption
Lab : Using Auditing and Encryption
• Working with SQL Server Audit
• Encrypt a Column as Always Encrypted
• Encrypt a Database using TDE
After completing this module, you will be able to:
• Describe the options for auditing data access.
• Implement SQL Server Audit.
• Manage SQL Server Audit.
• Describe and implement methods of encrypting data in SQL Server.
• Implement encryption
Module 5: Recovery Models and Backup Strategies
One of the most important aspects of a database administrator's role is ensuring that organizational data is reliably backed up so that, if a failure occurs, you can recover the data. Even though the computing industry has known about the need for reliable backup strategies for decades—and discussed this at great length—unfortunate stories regarding data loss are still commonplace. A further problem is that, even when the strategies in place work as they were designed, the outcomes still regularly fail to meet an organization’s operational requirements. In this module, you will consider how to create a strategy that is aligned with organizational needs, based on the available backup models, and the role of the transaction logs in maintaining database consistency.
Lessons
• Understanding Backup Strategies
• SQL Server Transaction Logs
• Planning Backup Strategies
Lab : Understanding SQL Server recovery models
• Plan a Backup Strategy
• Configure Database Recovery Models
After completing this module, you will be able to:
• Describe various backup strategies.
• Describe how database transaction logs function.
• Plan SQL Server backup strategies.
Module 6: Backing Up SQL Server Databases
In the previous module, you learned how to plan a backup strategy for a SQL Server system. You can now learn how to perform SQL Server backups, including full and differential database backups, transaction log backups, and partial backups. In this module, you will learn how to apply various backup strategies.
Lessons
• Backing Up Databases and Transaction Logs
• Managing Database Backups
• Advanced Database Options
Lab : Backing Up Databases
• Backing Up Databases
• Performing Database, Differential, and Transaction Log Backups
• Performing a Partial Backup
After completing this module, you will be able to:
• Perform backups of SQL Server databases and transaction logs.
• Manage database backups.
• Describe advanced backup options.
Module 7: Restoring SQL Server 2016 Databases
In the previous module, you learned how to create backups of Microsoft SQL Server 2016 databases. A backup strategy might involve many different types of backup, so it is essential that you can effectively restore them. You will often be restoring a database in an urgent situation. You must, however, ensure that you have a clear plan of how to proceed and successfully recover the database to the required state. A good plan and understanding of the restore process can help avoid making the situation worse. Some database restores are related to system failure. In these cases, you will want to return the system as close as possible to the state it was in before the failure. Some failures, though, are related to human error and you might wish to recover the system to a point before that error. The point-in-time recovery features of SQL Server 2016 can help you to achieve this. Because they are typically much larger, user databases are more likely to be affected by system failures than system databases. However, system databases can be affected by failures, and special care should be taken when recovering them. In particular, you need to understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore user and system databases and how to implement point-in-time recovery.
Lessons
• Understanding the Restore Process
• Restoring Databases
• Advanced Restore Scenarios
• Point-in-Time Recovery
Lab : Restoring SQL Server Databases
• Restoring a Database Backup
• Restring Database, Differential, and Transaction Log Backups
• Performing a Piecemeal Restore
After completing this module, you will be able to:
• Explain the restore process.
• Restore databases.
• Perform advanced restore operations.
• Perform a point-in-time recovery.
Module 8: Automating SQL Server Management
The tools provided by Microsoft SQL Server make administration easy when compared to some other database engines. However, even when tasks are easy to perform, it is common to have to repeat a task many times. Efficient database administrators learn to automate repetitive tasks. This can help to avoid situations where an administrator forgets to execute a task at the required time. Perhaps more importantly, the automation of tasks helps to ensure that they are performed consistently, each time they are executed. This module describes how to use SQL Server Agent to automate jobs, how to configure security contexts for jobs, and how to implement multiserver jobs.
Lessons
• Automating SQL Server management
• Working with SQL Server Agent
• Managing SQL Server Agent Jobs
• Multi-server Management
Lab : Automating SQL Server Management
• Create a SQL Server Agent Job
• Test a Job
• Schedule a Job
• Configure Master and Target Servers
After completing this module, you will be able to:
• Describe methods for automating SQL Server Management.
• Configure jobs, job step types, and schedules.
• Manage SQL Server Agent jobs.
• Configure master and target servers.
Module 9: Configuring Security for SQL Server Agent
Other modules in this course have demonstrated the need to minimize the permissions that are granted to users, following the principle of “least privilege.” This means that users have only the permissions that they need to perform their tasks. The same logic applies to the granting of permissions to SQL Server Agent. Although it is easy to execute all jobs in the context of the SQL Server Agent service account, and to configure that account as an administrative account, a poor security environment would result from doing this. It is important to understand how to create a minimal privilege security environment for jobs that run in SQL Server Agent.
Lessons
• Understanding SQL Server Agent Security
• Configuring Credentials
• Configuring Proxy Accounts
Lab : Configuring Security for SQL Server Agent
• Analyzing Problems in SQL Server Agent
• Configuring a Credential
• Configuring a Proxy Account
• Configuring and testing the Security Context of a Job
After completing this module, you will be able to:
• Explain SQL Server Agent security.
• Configure credentials.
• Configure proxy accounts.
Module 10: Monitoring SQL Server with Alerts and Notifications
One key aspect of managing Microsoft SQL Server in a proactive manner is to make sure you are aware of problems and events that occur in the server, as they happen. SQL Server logs a wealth of information about issues. You can configure it to advise you automatically when these issues occur, by using alerts and notifications. The most common way that SQL Server database administrators receive details of events of interest is by email message. This module covers the configuration of Database Mail, alerts, and notifications for a SQL Server instance, and the configuration of alerts for Microsoft Azure SQL Database.
Lessons
• Monitoring SQL Server Errors
• Configuring Database Mail
• Operators, Alerts, and Notifications
• Alerts in Azure SQL Database
Lab : Monitoring SQL Server with Alerts and Notifications
• Configuring Database Mail
• Configuring Operators
• Configuring Alerts and Notifications
• Testing Alerts and Notifications
After completing this module, you will be able to:
• Monitor SQL Server errors.
• Configure database mail.
• Configure operators, alerts, and notifications.
• Work with alerts in Azure SQL Database.
Module 11: Introduction to Managing SQL Server by using PowerShell
This module looks at how to use Windows PowerShell with Microsoft SQL Server. Businesses are constantly having to increase the efficiency and reliability of maintaining their IT infrastructure; with PowerShell, you can improve this efficiency and reliability by creating scripts to carry out tasks. PowerShell scripts can be tested and applied multiple times to multiple servers, saving your organization both time and money.
Lessons
• Getting Started with Windows PowerShell
• Configure SQL Server using PowerShell
• Administer and Maintain SQL Server with PowerShell
• Managing Azure SQL Databases using PowerShell
Lab : Using PowerShell to Manage SQL Server
• Getting Started with PowerShell
• Using PowerShell to Change SQL Server settings
After completing this module, you will be able to:
• Describe the benefits of PowerShell and its fundamental concepts.
• Configure SQL Server by using PowerShell.
• Administer and maintain SQL Server by using PowerShell.
• Manage an Azure SQL Database by using PowerShell.
Module 12: Tracing Access to SQL Server with Extended events
Monitoring performance metrics provides a great way to assess the overall performance of a database solution. However, there are occasions when you need to perform more detailed analysis of the activity occurring within a Microsoft SQL Server instance—to troubleshoot problems and identify ways to optimize workload performance. SQL Server Extended Events is a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. This module focuses on the architectural concepts, troubleshooting strategies and usage scenarios of Extended Events.
Lessons
• Extended Events Core Concepts
• Working with Extended Events
Lab : Extended Events
• Using the System_Health Extended Events Session
• Tracking Page Splits Using Extended Events
After completing this module, you will be able to:
• Describe Extended Events core concepts.
• Create and query Extended Events sessions.
Module 13: Monitoring SQL Server
The Microsoft SQL Server Database Engine can run for long periods without the need for administrative attention. However, if you regularly monitor the activity that occurs on the database server, you can deal with potential issues before they arise. SQL Server provides a number of tools that you can use to monitor current activity and record details of previous activity. You need to become familiar with what each of the tools does and how to use them. It is easy to become overwhelmed by the volume of output that monitoring tools can provide, so you also need to learn techniques for analyzing their output.
Lessons
• Monitoring activity
• Capturing and Managing Performance Data
• Analyzing Collected Performance Data
• SQL Server Utility
Lab : Monitoring SQL Server
After completing this module, you will be able to:
• Monitor current activity.
• Capture and manage performance data.
• Analyze collected performance data.
• Configure SQL Server Utility.
Module 14: Troubleshooting SQL Server
Database administrators working with Microsoft SQL Server need to adopt the important role of troubleshooter when issues arise—particularly if users of business-critical applications that rely on SQL Server databases are being prevented from working. It is important to have a solid methodology for resolving issues in general, and to be familiar with the most common issues that can arise when working with SQL Server systems.
Lessons
• A Trouble Shooting Methodology for SQL Server
• Resolving Service Related Issues
• Resolving Connectivity and Log-in issues
Lab : Troubleshooting Common Issues
• Troubleshoot and Resolve a SQL Login Issue
• Troubleshoot and Resolve a Service Issue
• Troubleshoot and Resolve a Windows Login Issue
• Troubleshoot and Resolve a Job Execution Issue
• Troubleshoot and Resolve a Performance Issue
After completing this module, you will be able to:
• Describe a troubleshooting methodology for SQL Server.
• Resolve service-related issues.
• Resolve login and connectivity issues.
Module 15: Importing and Exporting Data
While a great deal of data residing in a Microsoft SQL Server system is entered directly by users who are running application programs, there is often a need to move data in other locations, to and from SQL Server. SQL Server provides a set of tools you can use to transfer data in and out. Some of these tools, such as the bcp (Bulk Copy Program) utility and SQL Server Integration Services, are external to the database engine. Other tools, such as the BULK INSERT statement and the OPENROWSET function, are implemented in the database engine. With SQL Server, you can also create data-tier applications that package all the tables, views, and instance objects associated with a user database into a single unit of deployment. In this module, you will explore these tools and techniques so that you can import and export data to and from SQL Server.
Lessons
• Transferring Data to and from SQL Server
• Importing and Exporting Table Data
• Using bcp and BULK INSERT to Import Data
• Deploying and Upgrading Data-Tier Application
Lab : Importing and Exporting Data
• Import and Excel Data Using the Import Wizard
• Import a Delimited Text File Using bcp
• Import a Delimited Text File using BULK INSERT
• Create and Test an SSIS Package to Extract Data
• Deploy a Data-Tier Application
After completing this module, you will be able to:
• Describe tools and techniques for transferring data.
• Import and export table data.
• Use bcp and BULK INSERT to import data.
• Use data-tier applications to import and export database applications.
Prerequisites
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
· Basic knowledge of the Microsoft Windows operating system and its core functionality.
· Working knowledge of Transact-SQL.
· Working knowledge of relational databases.
· Some experience with database design.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course is designed to teach students how to provision SQL Server databases both on premise and in SQL Azure.
Audience profile
The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job.
The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases.
At course completion
After completing this course, students will be able to:
• Provision a Database Server
• Upgrade SQL Server
• Configure SQL Server
• Manage Databases and Files (shared)
• Provision, migrate and manage databases in the cloud
Course Outline
Module 1: SQL Server Components
This module describes the various SQL Server components and versions.
Lessons
• Introduction to the SQL Server Platform
• Overview of SQL Server Architecture
• SQL Server Services and Configuration Options
After completing this module, you will be able to:
• Describe SQL Server components and versions.
• Describe SQL Server architecture and resource usage.
• Describe SQL Server services and how you manage the configuration of those services.
Module 2: Installing SQL Server
This modules describes the process to install SQL Server 2016.
Lessons
• Considerations for SQL Installing Server
• TempDB Files
• Installing SQL Server
• Automating Installation
Lab : Installing SQL Server
• Preparing to install SQL Server
• Install an instance of SQL Server
• Perform post installation checks
• Automating Installation
After completing this module, you will be able to:
• Describe the considerations when installing SQL Server.
• Describe TempDB files.
• Install SQL Server.
• Automate a SQL Server installation.
Module 3: Upgrading SQL Server to SQL Server 2017
This module describes the process for upgrading to SQL Server 2017.
Lessons
• Upgrade Requirements
• Upgrade SQL Server Services
• Side by Side Upgrade: Migrating SQL Server Data and Applications
Lab : Upgrading SQL Server
• Create the Application Logins
• Restore the backups of the TSQL Database
• Orphaned Users and Database Compatibility Level
After completing this module, you will be able to:
• Describe the upgrade requirements for SQL Server.
• Upgrade SQL Server.
• Migrate SQL Server data and applications.
Module 4: Working with Databases
This module describes the preinstalled system databases, the physical structure of databases and the most common configuration options related to them.
Lessons
• Introduction to Data Storage with SQL Server
• Managing Storage for System Databases
• Managing Storage for User Databases
• Moving and Copying Database Files
• Buffer Pool Extension
Lab : Managing Database Storage
• Configuring tempdb Storage
• Creating Databases
• Attaching a Database
• Enable Buffer Pool Extension
After completing this module, you will be able to:
• Describe Data Storage with SQL Server.
• Manage Storage for System Databases.
• Manage Storage for User Databases.
• Move and Copy Database Files.
• Describe and use Buffer Pool Extensions.
Module 5: Performing Database Maintenance
This module covers database maintenance plans.
Lessons
• Ensuring Database Integrity
• Maintaining Indexes
• Automating Routine Database Maintenance
Lab : Performing Database Maintenance
• Use DBCC CHECKDB to Verify Database Integrity
• Rebuild Indexes
• Create a Database Maintenance Plan
After completing this module, you will be able to:
• Ensure Database Integrity.
• Maintain Indexes.
• Automate Routine Database Maintenance.
Module 6: Database Storage Options
Describe SQL Server storage options.
Lessons
• SQL Server storage Performance
• SMB Fileshare
• SQL Server Storage in Microsoft Azure
• Stretch Databases
Lab : Implementing Stretch Database
• Run Stretch Database Advisor
• Implement Stretch Database
After completing this module, you will be able to:
• Describe SQL Server Storage Performance.
• Describe SMB Fileshare.
• Explain SQL Server Storage in Microsoft Azure.
• Describe Stretch Database.
Module 7: Planning to Deploy SQL Server on Microsoft Azure
This module describes how to plan to deploy SQL Server on Azure.
Lessons
• SQL Server Virtual Machines in Azure
• Azure Storage
• Azure SQL Authentication
• Deploying an Azure SQL Database
Lab : Plan and Deploy an Azure SQL Database
• Plan an Azure SQL Database, Networking, performance tiers, security
• Provision an Azure SQL Database
• Connect to an Azure SQL Database
After completing this module, you will be able to:
• Describe SQL Server Virtual Machines in Azure.
• Describe Azure Storage.
• Explain Azure SQL Authentication, auditing and compliance.
• Deploy an Azure SQL Database.
Module 8: Migrating Databases to Azure SQL Database
This module describes how to migrate databases to Azure SQL Database.
Lessons
• Database Migration Testing Tools
• Database Migration Compatibility Issues
• Migrating a SQL Server Database to Azure SQL Database
Lab : Migrating SQL Server Databases to Azure
• Perform Migration Testing
• Migrate a SQL Server Database to Azure SQL Database
• Test a Migrated Database
After completing this module, students will be able to:
• Describe various database migration testing tools.
• Explain database migration compatibility issues.
• Migrate a SQL Server database to Azure SQL database.
Module 9: Deploying SQL Server on a Microsoft Azure Virtual Machine
This module describes how to deploy SQL Server on Microsoft Azure VMs.
Lessons
• Deploying SQL Server on an Azure VM
• The Deploy Database to a Microsoft Azure VM Wizard
Lab : Deploying SQL Server on an Azure Virtual Machine
• Provision an Azure VM
• Use the Deploy Database to Azure VM Wizard
After completing this module, students will be able to:
• Deploy SQL Server on an Azure VM.
• Use The Deploy Database to a Microsoft Azure VM Wizard.
• Configure SQL Server Connections
Module 10: Managing databases in the Cloud
This module describes how to manage SQL Server on Azure.
Lessons
• Managing Azure SQL Database Security
• Configure Azure storage
• Azure Automation
Lab : Managing Databases in the Cloud
• Add data masking
• Use Azure automation to stop Virtual Machines
After completing this module, students will be able to:
• Manage Azure SQL Database Security.
• Configure Azure storage.
• Implement Azure Automation.
Prerequisites
This course requires that you meet the following prerequisites:
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of Transact-SQL.
• Working knowledge of relational databases.
• Some experience with database design
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students with the knowledge and skills to provision a Microsoft SQL Server database. The course covers SQL Server provision both on-premise and in Azure, and covers installing from new and migrating from an existing install.
Audience profile
The primary audience for this course are database professionals who need to fulfil a Business Intelligence Developer role. They will need to focus on hands-on work creating BI solutions including Data Warehouse implementation, ETL, and data cleansing.
At course completion
After completing this course, students will be able to:
• Describe the key elements of a data warehousing solution
• Describe the main hardware considerations for building a data warehouse
• Implement a logical design for a data warehouse
• Implement a physical design for a data warehouse
• Create columnstore indexes
• Implementing an Azure SQL Data Warehouse
• Describe the key features of SSIS
• Implement a data flow by using SSIS
• Implement control flow by using tasks and precedence constraints
• Create dynamic packages that include variables and parameters
• Debug SSIS packages
• Describe the considerations for implement an ETL solution
• Implement Data Quality Services
• Implement a Master Data Services model
• Describe how you can use custom components to extend SSIS
• Deploy SSIS projects
• Describe BI and common BI scenarios
Course Outline
Module 1: Introduction to Data Warehousing
This module describes data warehouse concepts and architecture consideration.
Lessons
• Overview of Data Warehousing
• Considerations for a Data Warehouse Solution
Lab : Exploring a Data Warehouse Solution
• Exploring data sources
• Exploring an ETL process
• Exploring a data warehouse
After completing this module, you will be able to:
• Describe the key elements of a data warehousing solution
• Describe the key considerations for a data warehousing solution
Module 2: Planning Data Warehouse Infrastructure
This module describes the main hardware considerations for building a data warehouse.
Lessons
• Considerations for data warehouse infrastructure.
• Planning data warehouse hardware.
Lab : Planning Data Warehouse Infrastructure
• Planning data warehouse hardware
After completing this module, you will be able to:
• Describe the main hardware considerations for building a data warehouse
• Explain how to use reference architectures and data warehouse appliances to create a data warehouse
Module 3: Designing and Implementing a Data Warehouse
This module describes how you go about designing and implementing a schema for a data warehouse.
Lessons
• Data warehouse design overview
• Designing dimension tables
• Designing fact tables
• Physical Design for a Data Warehouse
Lab : Implementing a Data Warehouse Schema
• Implementing a star schema
• Implementing a snowflake schema
• Implementing a time dimension table
After completing this module, you will be able to:
• Implement a logical design for a data warehouse
• Implement a physical design for a data warehouse
Module 4: Columnstore Indexes
This module introduces Columnstore Indexes.
Lessons
• Introduction to Columnstore Indexes
• Creating Columnstore Indexes
• Working with Columnstore Indexes
Lab : Using Columnstore Indexes
• Create a Columnstore index on the FactProductInventory table
• Create a Columnstore index on the FactInternetSales table
• Create a memory optimized Columnstore table
After completing this module, you will be able to:
• Create Columnstore indexes
• Work with Columnstore Indexes
Module 5: Implementing an Azure SQL Data Warehouse
This module describes Azure SQL Data Warehouses and how to implement them.
Lessons
• Advantages of Azure SQL Data Warehouse
• Implementing an Azure SQL Data Warehouse
• Developing an Azure SQL Data Warehouse
• Migrating to an Azure SQ Data Warehouse
• Copying data with the Azure data factory
Lab : Implementing an Azure SQL Data Warehouse
• Create an Azure SQL data warehouse database
• Migrate to an Azure SQL Data warehouse database
• Copy data with the Azure data factory
After completing this module, you will be able to:
• Describe the advantages of Azure SQL Data Warehouse
• Implement an Azure SQL Data Warehouse
• Describe the considerations for developing an Azure SQL Data Warehouse
• Plan for migrating to Azure SQL Data Warehouse
Module 6: Creating an ETL Solution
At the end of this module you will be able to implement data flow in a SSIS package.
Lessons
• Introduction to ETL with SSIS
• Exploring Source Data
• Implementing Data Flow
Lab : Implementing Data Flow in an SSIS Package
• Exploring source data
• Transferring data by using a data row task
• Using transformation components in a data row
After completing this module, you will be able to:
• Describe ETL with SSIS
• Explore Source Data
• Implement a Data Flow
Module 7: Implementing Control Flow in an SSIS Package
This module describes implementing control flow in an SSIS package.
Lessons
• Introduction to Control Flow
• Creating Dynamic Packages
• Using Containers
• Managing consistency.
Lab : Implementing Control Flow in an SSIS Package
• Using tasks and precedence in a control flow
• Using variables and parameters
• Using containers
Lab : Using Transactions and Checkpoints
• Using transactions
• Using checkpoints
After completing this module, you will be able to:
• Describe control flow
• Create dynamic packages
• Use containers
Module 8: Debugging and Troubleshooting SSIS Packages
This module describes how to debug and troubleshoot SSIS packages.
Lessons
• Debugging an SSIS Package
• Logging SSIS Package Events
• Handling Errors in an SSIS Package
Lab : Debugging and Troubleshooting an SSIS Package
• Debugging an SSIS package
• Logging SSIS package execution
• Implementing an event handler
• Handling errors in data flow
After completing this module, you will be able to:
• Debug an SSIS package
• Log SSIS package events
• Handle errors in an SSIS package
Module 9: Implementing a Data Extraction Solution
This module describes how to implement an SSIS solution that supports incremental DW loads and changing data.
Lessons
• Introduction to Incremental ETL
• Extracting Modified Data
• Loading modified data
• Temporal Tables
Lab : Extracting Modified Data
• Using a datetime column to incrementally extract data
• Using change data capture
• Using the CDC control task
• Using change tracking
Lab : Loading a data warehouse
• Loading data from CDC output tables
• Using a lookup transformation to insert or update dimension data
• Implementing a slowly changing dimension
• Using the merge statement
After completing this module, you will be able to:
• Describe incremental ETL
• Extract modified data
• Load modified data.
• Describe temporal tables
Module 10: Enforcing Data Quality
This module describes how to implement data cleansing by using Microsoft Data Quality services.
Lessons
• Introduction to Data Quality
• Using Data Quality Services to Cleanse Data
• Using Data Quality Services to Match Data
Lab : Cleansing Data
• Creating a DQS knowledge base
• Using a DQS project to cleanse data
• Using DQS in an SSIS package
Lab : De-duplicating Data
• Creating a matching policy
• Using a DS project to match data
After completing this module, you will be able to:
• Describe data quality services
• Cleanse data using data quality services
• Match data using data quality services
• De-duplicate data using data quality services
Module 11: Using Master Data Services
This module describes how to implement master data services to enforce data integrity at source.
Lessons
• Introduction to Master Data Services
• Implementing a Master Data Services Model
• Hierarchies and collections
• Creating a Master Data Hub
Lab : Implementing Master Data Services
• Creating a master data services model
• Using the master data services add-in for Excel
• Enforcing business rules
• Loading data into a model
• Consuming master data services data
After completing this module, you will be able to:
• Describe the key concepts of master data services
• Implement a master data service model
• Manage master data
• Create a master data hub
Module 12: Extending SQL Server Integration Services (SSIS)
This module describes how to extend SSIS with custom scripts and components.
Lessons
• Using scripting in SSIS
• Using custom components in SSIS
Lab : Using scripts
• Using a script task
After completing this module, you will be able to:
• Use custom components in SSIS
• Use scripting in SSIS
Module 13: Deploying and Configuring SSIS Packages
This module describes how to deploy and configure SSIS packages.
Lessons
• Overview of SSIS Deployment
• Deploying SSIS Projects
• Planning SSIS Package Execution
Lab : Deploying and Configuring SSIS Packages
• Creating an SSIS catalog
• Deploying an SSIS project
• Creating environments for an SSIS solution
• Running an SSIS package in SQL server management studio
• Scheduling SSIS packages with SQL server agent
After completing this module, you will be able to:
• Describe an SSIS deployment
• Deploy an SSIS package
• Plan SSIS package execution
Module 14: Consuming Data in a Data Warehouse
This module describes how to debug and troubleshoot SSIS packages.
Lessons
• Introduction to Business Intelligence
• An Introduction to Data Analysis
• Introduction to reporting
• Analyzing Data with Azure SQL Data Warehouse
Lab : Using a data warehouse
• Exploring a reporting services report
• Exploring a PowerPivot workbook
• Exploring a power view report
After completing this module, you will be able to:
• Describe at a high level business intelligence
• Show an understanding of reporting
• Show an understanding of data analysis
• Analyze data with Azure SQL data warehouse
Prerequisites
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
• Some experience with database design.
Overview
Audience(s): Developers
Technology: SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The focus of this 3-day instructor-led course is on creating managed enterprise BI solutions. It describes how to implement both multidimensional and tabular data models and how to create cubes, dimensions, measures, and measure groups. This course helps you prepare for the Exam 70-768.
Audience profile
The primary audience for this course are database professionals who need to fulfil BI Developer role to create enterprise BI solutions.
Primary responsibilities will include:
• Implementing multidimensional databases by using SQL Server Analysis Services
• Creating tabular semantic data models for analysis by using SQL Server Analysis Services
At course completion
After completing this course, students will be able to:
• Describe the components, architecture, and nature of a BI solution
• Create a multidimensional database with Analysis Services
• Implement dimensions in a cube
• Implement measures and measure groups in a cube
• Use MDX syntax
• Customize a cube
• Implement a tabular database
• Use DAX to query a tabular model
• Use data mining for predictive analysis
Course Outline
Module 1: Introduction to Business Intelligence and Data Modeling
This module introduces key BI concepts and the Microsoft BI product suite.
Lessons
• Introduction to Business Intelligence
• The Microsoft business intelligence platform
Lab: Exploring a BI Solution
• Exploring a Data Warehouse
• Exploring a data model
After completing this module, students will be able to:
• Describe BI scenarios, trends, and project roles.
• Describe the products that make up the Microsoft BI platform.
Module 2: Creating Multidimensional Databases
This module describes how to create multidimensional databases using SQL Server Analysis Services.
Lessons
• Introduction to Multidimensional Analysis
• Data Sources and Data Source Views
• Cubes
• Overview of Cube Security
• Configure SSAS
• Monitoring SSAS
Lab: Creating a multidimensional database
• Creating a Data Source
• Creating and Configuring a data Source View
• Creating and Configuring a Cube
• Adding a Dimension to a Cube
After completing this module, you will be able to:
• Describe considerations for a multidimensional database.
• Create data sources and data source views.
• Create a cube
• Implement security in a multidimensional database.
• Configure SSAS to meet requirements including memory limits, NUMA and disk layout.
• Monitor SSAS performance.
Module 3: Working with Cubes and Dimensions
This module describes how to implement dimensions in a cube.
Lessons
• Configuring Dimensions
• Defining Attribute Hierarchies
• Implementing Sorting and Grouping Attributes
• Slowly Changing Dimensions
Lab: Working with Cubes and Dimensions
• Configuring Dimensions
• Defining Relationships and Hierarchies
• Sorting and Grouping Dimension Attributes
After completing this module, you will be able to:
• Configure dimensions.
• Define attribute hierarchies.
• Implement sorting and grouping for attributes.
• Implement slowly changing dimensions.
Module 4: Working with Measures and Measure Groups
This module describes how to implement measures and measure groups in a cube.
Lessons
• Working with Measures
• Working with Measure Groups
Lab: Configuring Measures and Measure Groups
• Configuring Measures
• Defining Regular Relationships
• Configuring Measure Group Storage
After completing this module, you will be able to:
• Configure measures.
• Configure measure groups.
Module 5: Introduction to MDX
This module describes the MDX syntax and how to use MDX.
Lessons
• MDX fundamentals
• Adding Calculations to a Cube
• Using MDX to Query a Cube
Lab: Using MDX
• Querying a cube using MDX
• Adding a Calculated Member
After completing this module, you will be able to:
• Use basic MDX functions.
• Use MDX to add calculations to a cube.
• Use MDX to query a cube.
Module 6: Customizing Cube Functionality
This module describes how to customize a cube.
Lessons
• Implementing Key Performance Indicators
• Implementing Actions
• Implementing Perspectives
• Implementing Translations
Lab: Customizing a Cube
• Implementing an action
• Implementing a perspective
• Implementing a translation
After completing this module, you will be able to:
• Implement KPIs in a Multidimensional database
• Implement Actions in a Multidimensional database
• Implement perspectives in a Multidimensional database
• Implement translations in a Multidimensional database
Module 7: Implementing a Tabular Data Model by Using Analysis Services
This module describes how to implement a tabular data model in Power Pivot.
Lessons
• Introduction to Tabular Data Models
• Creating a Tabular Data Model
• Using an Analysis Services Tabular Data Model in an Enterprise BI Solution
Lab: Working with an Analysis Services Tabular Data Model
• Creating an Analysis Services Tabular Data Model
• Configure Relationships and Attributes
• Configuring Data Model for an Enterprise BI Solution.
After completing this module, students will be able to:
• Describe tabular data models
• Describe how to create a tabular data model
• Use an Analysis Services Tabular Model in an enterprise BI solution
Module 8: Introduction to Data Analysis Expression (DAX)
This module describes how to use DAX to create measures and calculated columns in a tabular data model.
Lessons
• DAX Fundamentals
• Using DAX to Create Calculated Columns and Measures in a Tabular Data Model
Lab: Creating Calculated Columns and Measures by using DAX
• Creating Calculated Columns
• Creating Measures
• Creating a KPI
• Creating a Parent – Child Hierarchy
After completing this module, students will be able to:
• Describe the key features of DAX
• Create calculated columns and measures by using DAX
Module 9: Performing Predictive Analysis with Data Mining
This module describes how to use data mining for predictive analysis.
Lessons
• Overview of Data Mining
• Creating a Custom Data Mining Solution
• Validating a Data Mining Model
• Connecting to and Consuming a Data-Mining Model
• Using the Data Mining add-in for Excel
Lab: Using Data Mining
• Creating a Data Mining Structure and Model
• Exploring Data Mining Models
• Validating Data Mining Models
• Consuming a Data Mining Model
• Using the Excel Data Mining add-in
After completing this module, students will be able to:
• Describe considerations for data mining
• Create a data mining model
• Validate a data mining model
• Connect to a data-mining model
• Use the data mining add-in for Excel
Prerequisites
Before attending this course, students must have:
• Experience of querying data using Transact-SQL
Carga: 40 horas
Overview
Audience(s): Information Workers
Technology: SQL Server
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App.
Audience profile
The course will likely be attended by SQL Server report creators who are interested in alternative methods of presenting data.
At course completion
After completing this course, students will be able to:
• Perform Power BI desktop data transformation.
• Describe Power BI desktop modelling.
• Create a Power BI desktop visualization.
• Implement the Power BI service.
• Describe how to connect to Excel data.
• Describe how to collaborate with Power BI data.
• Connect directly to data stores.
• Describe the Power BI developer API.
• Describe the Power BI mobile app.
Course Outline
Module 1: Introduction to Self-Service BI Solutions
Introduces business intelligence (BI) and how to self-serve with BI.
Lessons
• Introduction to business intelligence
• Introduction to data analysis
• Introduction to data visualization
• Overview of self-service BI
• Considerations for self-service BI
• Microsoft tools for self-service BI
Lab: Exploring an Enterprise BI solution
• Viewing reports
• Creating a Power BI report
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Describe the trends in BI
• Describe the process of data analysis in Power BI.
• Use the key visualizations in Power BI.
• Describe the rationale for self-service BI.
• Describe considerations for self-service BI.
• Understand how you can use Microsoft products to implement a BI solution.
Module 2: Introducing Power BI
This module introduces Power BI desktop, and explores the features that enable the rapid creation and publication of sophisticated data visualizations.
Lessons
• Power BI
• The Power BI service
Lab: Creating a Power BI dashboard
• Connecting to Power BI data
• Create a Power BI dashboard
After completing this module, students will be able to:
• Develop reports using the Power BI Desktop app.
• Use report items to create dashboards on the Power BI portal.
• Understand the components of the Power BI service including licensing and tenant management.
Module 3: Power BI
At the end of this module students will be able to explain the rationale and advantages of using Power BI.
Lessons
• Using Excel as a data source for Power BI
• The Power BI data model
• Using databases as a data source for Power BI
• The Power BI service
Lab: Importing data into Power BI
• Importing Excel files into Power BI
• Viewing reports from Excel files
After completing this module, students will be able to:
• Describe the data model and know how to optimize data within the model.
• Connect to Excel files and import data
• Use on-premises and cloud Microsoft SQL Server databases as a data source, along with the R script data connector
• Take advantage of the features of the Power BI service by using Q&A to ask questions in natural query language, and create content packs and groups.
Module 4: Shaping and Combining Data
With Power BI desktop you can shape and combine data with powerful, buil-in tools. This module introduces the tools that are available for preparing your data, and transforming it into a form ready for reporting.
Lessons
• Power BI desktop queries
• Shaping data
• Combining data
Lab: Shaping and combining data
• Shape power BI data
• Combine Power BI data
After completing this module, students will be able to:
• Perform a range of query editing skills in Power BI
• Shape data, using formatting and transformations.
• Combine data together from tables in your dataset.
Module 5: Modeling data
This module describes how to shape and enhance data.
Lessons
• Relationships
• DAX queries
• Calculations and measures
Lab: Modeling Data
• Create relationships
• Calculations
After completing this module, students will be able to:
• Describe relationships between data tables.
• Understand the DAX syntax, and use DAX functions to enhance your dataset.
• Create calculated columns, calculated tables and measures.
Module 6: Interactive Data Visualizations
This module describes how to create and manage interactive data visualizations.
Lessons
• Creating Power BI reports
• Managing a Power BI solution
Lab: Creating a Power BI report
• Connecting to Power BI data
• Building Power BI reports
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Use Power Bi desktop to create interactive data visualizations.
• Manage a power BI solution.
Module 7: Direct Connectivity
This module describes various connectivity options using Power BI.
Lessons
• Cloud data
• Connecting to analysis services
Lab: Direct Connectivity
• Direct connectivity from Power BI desktop
• Direct connectivity from the Power BI service
After completing this module, students will be able to:
• Use Power BI direct connectivity to access data in Azure SQL data warehouse, in addition to big data sources such as Hadoop
• Use Power BI with SQL Server Analysis Services data, including Analysis services modles running in multidimentional mode.
Module 8: The Developer API
This module describes the developer API within Power BI.
Lessons
• The developer API
• Custom visuals
Lab: Using the developer API
• Using custom visuals
After completing this module, students will be able to:
• Describe the developer API.
• Use the developer API to create custom visuals.
Module 9: Power BI mobile app
This module describes the Power BI mobile app.
Lessons
• Power BI mobile apps
• Using the Power BI mobile app
• Power BI embedded
After completing this module, students will be able to:
• Describe the Power BI mobile app.
• Download and use the Power BI mobile app.
• Describe Power BI embedded and when you would want to use it.
Prerequisites
Before attending this course, students must have:
• Excellent knowledge of relational databases and reporting.
• Some basic knowledge of data warehouse schema topology (including star and snowflake schemas).
• Some exposure to basic programming constructs (such as looping and branching).
• An awareness of key business priorities such as revenue, profitability, and financial accounting is desirable.
• Familiarity with Microsoft Office applications – particularly Excel.
Carga: 24 horas
Obrigado por entrar em contato. Retornaremos assim que possível!
Desculpe, houve um erro ao enviar a mensagem. Por favor, tente novamente mais tarde...
Ao submeter os seus dados, você manifesta o seu consentimento em fornecer os dados pessoais acima solicitados, que serão utilizados com a finalidade de entrarmos em contato para o fornecimento de informações sobre os produtos e/ou serviços escolhidos por você.
Os seus dados não serão utilizados para nenhum outro tipo de tratamento, a não ser que já exista alguma obrigação legal.
Você poderá solicitar a revogação do seu consentimento a qualquer momento, através do e-mail: privacidade@xpositum.com.br.
Prestamos serviços de consultoria em governança corporativa, programas de compliance, segurança da informação e tecnologia para clientes de todos os segmentos.
Rua Aristides França, 646 - Cidade Jardim
São José dos Pinhais – PR
83035-170
Fone: (41) 2102-0700
Copyright © 2024 Xpositum – Todos os direitos reservados.