+60162650525, +919043703606

Training Information

Azure Devops

We are pleased to offer a comprehensive suite of training solutions tailored to meet your needs. Our services encompass both online and offline corporate training options, ensuring flexibility and accessibility for your team's professional development.

Click Here for Enquiry Form

Course Content


Microsoft Azure

Working with Azure Virtual Machines

Designing solutions for virtual machines

Virtual machine series and sizes

Available VM series and sizes

Availability Sets

Fault domains and update domains

Managed Disks

Creating highly available virtual machines

Creating highly available virtual machines from the Azure Portal

Creating highly available virtual machines from PowerShell& Azure CLI

VM Scale Sets

Creating a VM Scale Set from the Azure Portal

Creating a VM Scale Set from the Azure PowerShell& Azure CLI

Accessing your VM Scale Sets

VM Scale Set templates.

Disaster recovery

Backup and recovery



Identify Workloads That Can And Cannot Be Deployed

Create VMs

Connect to a Windows/Linux VM

PowerShell Basics – Create a Virtual Machine

“VM Workloads” Resources

ARM Templates and Automation

Working with ARM Templates

What is Resource Manager?

Resource Provider & Types

Resource Manager & Classic Deployment

Subscription Governance

Organizing resources with management groups

Create & deploy ARM Template

IDE: using VS Code to Create the ARM Template

Deploy Templates using



Azure CLI

Configure Multiple ARM VMs in an Availability Set for Redundancy

Configure Each Application Tier Into Separate Availability Sets

Combine the Load Balancer with Availability Sets

Configuring Compute-Intensive Applications

High-performance compute virtual machines

Microsoft HPC Pack

Cloud-native HPC solutions

Hybrid HPC architecture

Azure Batch

Creating an Azure Batch service

Stateless components

Containers on Azure Batch

Robust Networking implementations

Azure Virtual Network

IP addresses

Public IP address

Private IP address

Creating a public IP address


Creating a VNet with two subnets

Azure Load Balancer


Azure Traffic Manager

Azure Application Gateway

External connectivity for Azure Virtual Networks

Azure VPN

Site-to-site VPN

VNet-to-VNet VPN

Point-to-site VPN


Network security strategies


Network Security Groups

User Defined Routes

Virtual network service tunneling

Web Application Firewall


Deploy a VM into a Virtual Network

Configure External and Internal Load Balancing

Implement Application Gateway

Design Subnets

Configure Static, Public, and Private IP Addresses

Set Up Network Security Groups (NSGs), DNS at the Virtual Network Level

User Defined Routes (UDRs)

Firewall Rules

Modify Network Configuration

Modify a Subnet

Import and Export a Network Configuration

Multi-Site or Hybrid Network

Choose the Between ExpressRoute, Site-to-site, and Point-to-site

Choose the Appropriate Gateway

Identify Supported Devices and Software VPN Solutions

Storage Solutions

Azure Storage and replication types

Storage account types

General-purpose v1 (GPv1)

Blob storage

General-purpose v2 (GPv2)

Storage replication types

Locally Redundant Storage

Zone Redundant Storage

Geo-redundant Storage

Azure Blob Storage

Access tiers




Azure Table Storage

Creating a storage account

Uploading data to Azure Table Storage

Azure Queue Storage

Azure File Storage

Azure Disk Storage

Standard Disk Storage

Premium Disk Storage

Unmanaged versus Managed Disks


STORSIMPLE Virtual Array

STORSIMPLE 8000 Series

Cosmos DB Storage

Azure Search

Azure SQL Database

SQL Server Stretch Database

High availability

Active geo-replication

Failover groups

Configuring active geo-replication and failover groups

Backup and recovery

Azure Database for MySQL

Azure Database for PostgreSQL


VM storage

Configure Disk Caching

Plan Storage Capacity

Configure Operating System Disk Redundancy

Configure Shared Storage Using Azure File Service

Encrypt Disks

Azure Storage Blobs and Azure Files

Read Data, Change Data, Set Metadata On A Container

Store Data Using Block And Page Blobs

Stream Data Using Blobs

Access Blobs Securely

Implement A sync Blob Copy

Configure a Content Delivery Network (CDN)

Design Blob Hierarchies

Configure Custom Domains

Scale Blob Storage

Azure SQL Databases

Choose the Appropriate Database Tier and Performance Level

Configure Point-in-time Recovery, Geo-replication, and Data Sync

Import and Export Data and Schema

Design a Scaling Strategy

Securing your Resources

List comprehensions

Lambda functions

Third-Party Libraries

Azure Active Directory

Microsoft Graph

Azure AD Connect

Azure Active Directory password hash synchronization

Azure Active Directory pass-through authentication

Active Directory Federation Services

Multi-Factor Authentication

Enabling MFA in the Azure Portal

Azure Active Directory Business to Business

Azure Active Directory Business to Consumer


Manage access

Create and Manage Shared Access Signatures

Use Stored Access Policies

Regenerate Keys

Azure Active Directory (Azure AD) with Existing Directories

Implement Azure AD Connect and Single Sign-on

Setup Azure Active Directory

Add Custom Domains

Implement Azure AD Connect

Monitor Azure AD

Azure AD B2C and Azure B2B

Create an Azure AD B2C Directory

Link a Subscription to a B2C Tenant

Register an Application

Implement Social Identity Provider Authentication

Enable Multi-Factor Authentication

Set Up Self-Service Password Reset

Implement B2B Collaboration

Secure your Data

Azure Key Vault

Azure Storage Service Encryption

Azure Disk Encryption

Azure SQL Database Security

Azure Active Directory Managed Service Identity

Life Cycle of Machine Learning Model Development.

Data Extraction

Data Cleansing & Transformations

Data Preparations

Model Selection

Train the Model

Test the Model

Validate the Model

Measure the accuracy of the model

Deploy the model

Tune/Rebuild the model

Governance and Policies:

Azure Role-Based Access Control

Built-in Roles

Custom Roles

Creating a Custom Role

Azure Resource Policies

Azure AD Privileged Identity Management

Azure AD Identity Protection

Azure Security Center

Advanced Threat Detection

Azure Endpoint Protection

Implementing Messaging Solutions

Azure Queue Storage

Azure Service Bus

Azure Event Grid

Routing Events with Azure Event Grid

Notification Hubs

Designing an effective messaging architecture

Application Monitoring and Alerting Strategies

Azure Log Analytics

Creating a Log Analytics Workspace

Azure Monitor

Application Insights

Azure Service Health

Azure Advisor

Address Recommendation from Azure Advisor

Azure Network Watcher

Designing an Operations Automation Strategy

Azure PowerShell

Desired State Configuration

Azure Automation

Deploy Azure Web Apps

Overview of Azure Web Apps

Deployment Slots

Roll Back Deployments

Pre- and Post-Deployment Actions

Implement Packages

App Service Plans

Migrating to Another App Service Plan

Create an App Under an App Service Plan

Configure Web Apps

Configure Azure Web Apps

General Settings

Auto Swap and Debugging Settings

App Settings and Connection Strings

Handlers and Virtual Directories

Custom Domains

Binding the SSL and Runtime Configuration

Scaling Web Apps

Web App Scaling – Changing the Size of an Instance

Web App Scaling – Enable Auto scaling

Configure Traffic Manager


Model 1: Continues Integration and Continues Delivery by AZURE

• Git

• Jenkins

• Maven

• Jfrog

• SonarQube

Model 2: Configuration Management

• Vagrant

• Ansible

Model 3: Containerization

• Docker

• Kubernetes

Model 4: Infrastructure Automation

• Terraform

Model 5: Monitoring

• Elastic search

• Kibana

• Log stash

• Nagios

Why DevOps:

• Business Perspective

• IT Perspective

• Developer Perspective

• Tester Perspective

• Operations Perspective

What is DevOps:

• Definition

• Stakeholders of DevOps

What is SDLC:

• Phases of SDLC

• Role of Dev in SDLC

• Role of Ops in SDLC

Introduction to DevOps Automation:

• Introduction

• Tools

• DevOps Technology Categories

• Collaboration

• Planning

• Issue Tracking

• Configuration Management

• Source Control

• Dev Environments

• Continuous Integration

• Continuous Testing

• Continuous Deployment

• Monitoring

Linux Essentials:

• History

• Types of OS

• Flavours

• OS Structure

• File system

• All Linux basic commands

• File & directorys persmisions

• User & groups administration

• Accessing Servers with ssh

• How multi user works in Linux

• How make normal user as sudo user.

Shell Script:

• Introduction

• Type of shells

• Variables

• Types of variables

• Operators

• Input arguments

• String comparison

• Athematic comparison

• File conditions

• If, loops, case, functions

• Examples


• Introduction

• What is Virtualization

• Server Virtualization

• Desktop Virtualization

• Application Virtualization

Apache Webserver:

• Installations

• Configuration

Tomcat Application Server:

• Installation, configuration

• Tomcat Manager

• Application Management

• Application Deployment

DevOps Tools

Model 1: Continues Integration and Continues Delivery by Azure

Source Code Management:

What is Version Control System?


• Source Code Management

• SCM Tools

• What is Git

• Installation

• Work space/ work dir/ work tree

• Configuration

• Commit/check-in

• Version/version-ID/commit-ID,

• Work space, staging area, buffer area

• Local Repo/remote repo

• Customer Branching

• Release Branching

• Merge, stash, fast-forwarding, rebase

• Chery-pick, cat-file and hocks

• Repositories and Tracking

• Git Commands: add, commit, log, push, status, ignore, branch, checkout merge, confict, stash, reset, revert

• Git GUI

Automate Build Process:


• Introduction, Maven Structure

• Maven Dependenciess

• Maven Repositories

• Maven Plugins and goals

• Integrated Maven Build

• Maven project


What is Jenkins?

Installation and configuration

• Prerequisitesd

• Download and installation

• Configuration.

Managing Jenkins

• Securing Jenkins, Managing Credentials, Plugin Management

• Jenkins Backup, Create a Build Slave

Creating Application Builds

• Manual compilation with Maven

• Manually Testing, Packaging and Running the App

• Creating a Jenkins Job and configuring a Git Repo

• Compiling in Jenkins

• App Packaging in Jenkins

• Archiving artifacts

• Cleaning up Past Builds

• Build time trend

• The jenkins Dashboard

• Troubleshooting build failures

• Build linking upstream and downstream


• Introduction

• Plugin Architecture

• Extension Points

• Getting Plugins

• Useful Plugins Overview

• Build Tool Plugins

• Installing a plugin

• Plugin configuration

• Security Overview

Continuous Testing and Continuous Integration and Testing

• Adding steps to Freestyle Project

• Creating a Pipeline job to execute Maven

• Archiving in a Pipeline

• Checking out git repository in pipeline

• The Master Agent Model

• Allocating a node and workspace in Pipeline

• Triggering Automated Builds

• Configuring an Email Server

• Notifications when a build fails

• Executing unit tests

Finding and Managing Plugins

• The need for plugins

• Integrated Code Coverage

• Assessing a plugin

• Testing Plugins and Plugin Types

Building Continuous Delivery Pipeline

• Continuous Delivery

• Backup and Restore

• A Second Node Allocation

• Adding an Agent Node

• Setup parallel integration testing in a pipeline

• Executing and Monitoring Parallel pipelines

• Setup Deployment to staging

• Executing a Deployment pipeline

• Checkin pipeline script to Git

Master and Slave Configuration

Integrating Jenkins with jfrog and sonarqube



• What is Vagrant

• Virtualization Overview

Setting Up Vagrant

• Virtual Box Installation

• Vagrant Installation

Using Vagrant

• Vagrant Machine

• Vagrant Files

• Boxes

• Running Vagrant Machines

• SSH to Vagrant Machine

• Synced Folders

• Environment Management

Automated Provisioning

• Provisioning

• Installing Apache /Shell Script


• Private Networking

• Public Networking

Model 2: Configuration / Provisioning



• What is Ansible

• Change Management

• Provisioning

• Automation

• Orchestration

• Why use Ansible


• Built in Security

• Extendable

• Conclusion

Architecture and Process Flow

• Architecture Introduction

• System Requirement

• Components Overview

• Process of Execution

• Conclusion

Setup and Configuration

• Test Environment Setup

• Download and Installation

• Ansible Configuration File

• The HOSTS File

• Overriding the Default HOSTS File

• Overriding the Default System Ansible.Cfg File

• Overriding the Default Roles Path

• Understanding the core components of Ansible

• Ad-hoc commands in Ansible

Ansible Inventory and Configuration

• Introduction to Inventory &Configuration

• Inventory Fundamentals

• Scaling out with Multiple Files

• Ansible Configuration Basics

Ansible Playbooks

• Ansible Command Line

• Our First Playbook

• Variables: Inclusion Types

• Target Section

• Variable Section

• Task Section

• Handler Section

• Outlining Playbook

• Create a Playbook from Outline

• Optimizing Playbook

• Taking Playbook for a Dry Run

• Simple Variable Substitution

• Loops

• Conditionals

• Vault

• Basic Include Statements

• Tags

• Basic Error Handling

• Includes - Breaking Your Playbook Into Discrete Plays

• Starting At Task or Stepping Through All Tasks

• Passing Variables Into Playbooks at the Command Line

• Using Jinja2 Templates

• Use a playbook to copy a program and customize it for the target host.

• Wiring Play books for java, webservers and applications server

Ansible Modules

• Introduction

• Ansible Modules Fundamentals

• Module Docs

• Yum Module

• Setup Module

• Other modules

Create and use templates to create customized configuration files

• Introduction

• Templates

Working with Ansible facts and variables.

• Let see how we get ansible facts and how we use facts

• Using Ansible facts

• Using variables to gather server info


• Introduction to Roles

• Role Basics

• Creating Role

• Ansible Galaxy

• Roles - The Directory Structure

• Role Based Tasks

• Task Order - Pre and Post Tasks

• Roles - Conditional Execution

• Roles - Variable Substitution

• Roles - Handlers

• Roles - Configuring Alternate Roles Paths

• Roles - Conditional Include Statements

• Roles - Waiting For Events

• Roles - Executing a Task Until

• Roles - Using Tags

• Roles - Breaking a Playbook Into a Role

• Roles - Passing Variables from Command Line

• Roles - Using Jinja2 Templates

• Roles - LocalAction

• Roles - Lets create a role to install apache.

• Lets use the previous role and add a new one.

• Lets build on the previous role

• Create Role for installing tomcat on multiple nodes

• Create Role for deployapplication on multiple nodes

Model 3: Containerization


• Introduction

• What is Docker

• Docker Life Cycle

• How Docker Containers working

Installing Docker

• Installing Docker on Linux

Working with Containers

• How to create the containers

• Docker commands

• Theory of pulling and Running Containers

• Working with images

• Container Life cycle

• Dockerfile

• Build Docker images

• Docker push

• Docker compose

• Docker volumes

• Docker cpu

• Docker memory

• Docker Networking


• What is kubernets

• Purpose of Kubernets

• How kubernets works

• Master components, how works

• Node Compenents, how works

• How pods works

• Installations and configuration kubernets cluster

• Pod lifecycle

• Work with pods

• Work with Services

• Work with Replica controller

• Work with Deployment

• How to Releases java application by using RC and Deploy


Model 4: Terraform

Infrastructure Automation

• What is Infrastructure as Code and why is it needed?

• Declarative vs Procedural tools for Infrastructure as Code

• Infrastructure as Code in the Cloud

• Requirements for infrastructure provisioner

• Deploying First Server

• Preparing work environment

• Terraform providers

• Configuring AWS provider e. Creating EC2 instance with Terraform

• Working with state

• Handling resource updates

Resource Dependencies and Modules

• Creating AWS Virtual Private Cloud

• Controlling dependencies with depends_on and ignore_changes

• Making sense of our template

Storing and Supplying Configuration

• Understanding variables

• Configuring data sources

• Exploring Terraform configuration resources

Model 5: Monitoring

System Monitoring: Nagios

• Installation of Nagios

• Configuring Nagios

• Monitoring with Nagios

Application Monitoring: ELK

• Installation of Elasticsearch, logstash, Kiban stack

• Configuring the ELK Stack

• Monitoring logs with ELK