Training Information
Azure Devops
We are pleased to offer a comprehensive suite of training solutions tailored to meet your needs. Our services encompass both online and offline corporate training options, ensuring flexibility and accessibility for your team's professional development.
Course Content
Syllabus:
Microsoft Azure
Working with Azure Virtual Machines
Designing solutions for virtual machines
Virtual machine series and sizes
Available VM series and sizes
Availability Sets
Fault domains and update domains
Managed Disks
Creating highly available virtual machines
Creating highly available virtual machines from the Azure Portal
Creating highly available virtual machines from PowerShell& Azure CLI
VM Scale Sets
Creating a VM Scale Set from the Azure Portal
Creating a VM Scale Set from the Azure PowerShell& Azure CLI
Accessing your VM Scale Sets
VM Scale Set templates.
Disaster recovery
Backup and recovery
Replication
Administration:
Identify Workloads That Can And Cannot Be Deployed
Create VMs
Connect to a Windows/Linux VM
PowerShell Basics – Create a Virtual Machine
“VM Workloads” Resources
ARM Templates and Automation
Working with ARM Templates
What is Resource Manager?
Resource Provider & Types
Resource Manager & Classic Deployment
Subscription Governance
Organizing resources with management groups
Create & deploy ARM Template
IDE: using VS Code to Create the ARM Template
Deploy Templates using
Portal
PowerShell
Azure CLI
Configure Multiple ARM VMs in an Availability Set for Redundancy
Configure Each Application Tier Into Separate Availability Sets
Combine the Load Balancer with Availability Sets
Configuring Compute-Intensive Applications
High-performance compute virtual machines
Microsoft HPC Pack
Cloud-native HPC solutions
Hybrid HPC architecture
Azure Batch
Creating an Azure Batch service
Stateless components
Containers on Azure Batch
Robust Networking implementations
Azure Virtual Network
IP addresses
Public IP address
Private IP address
Creating a public IP address
DNS
Creating a VNet with two subnets
Azure Load Balancer
Probes
Azure Traffic Manager
Azure Application Gateway
External connectivity for Azure Virtual Networks
Azure VPN
Site-to-site VPN
VNet-to-VNet VPN
Point-to-site VPN
ExpressRoute
Network security strategies
DMZ
Network Security Groups
User Defined Routes
Virtual network service tunneling
Web Application Firewall
Administration:
Deploy a VM into a Virtual Network
Configure External and Internal Load Balancing
Implement Application Gateway
Design Subnets
Configure Static, Public, and Private IP Addresses
Set Up Network Security Groups (NSGs), DNS at the Virtual Network Level
User Defined Routes (UDRs)
Firewall Rules
Modify Network Configuration
Modify a Subnet
Import and Export a Network Configuration
Multi-Site or Hybrid Network
Choose the Between ExpressRoute, Site-to-site, and Point-to-site
Choose the Appropriate Gateway
Identify Supported Devices and Software VPN Solutions
Storage Solutions
Azure Storage and replication types
Storage account types
General-purpose v1 (GPv1)
Blob storage
General-purpose v2 (GPv2)
Storage replication types
Locally Redundant Storage
Zone Redundant Storage
Geo-redundant Storage
Azure Blob Storage
Access tiers
Hot
Cool
Archive
Azure Table Storage
Creating a storage account
Uploading data to Azure Table Storage
Azure Queue Storage
Azure File Storage
Azure Disk Storage
Standard Disk Storage
Premium Disk Storage
Unmanaged versus Managed Disks
STORSIMPLE
STORSIMPLE Virtual Array
STORSIMPLE 8000 Series
Cosmos DB Storage
Azure Search
Azure SQL Database
SQL Server Stretch Database
High availability
Active geo-replication
Failover groups
Configuring active geo-replication and failover groups
Backup and recovery
Azure Database for MySQL
Azure Database for PostgreSQL
Administration:
VM storage
Configure Disk Caching
Plan Storage Capacity
Configure Operating System Disk Redundancy
Configure Shared Storage Using Azure File Service
Encrypt Disks
Azure Storage Blobs and Azure Files
Read Data, Change Data, Set Metadata On A Container
Store Data Using Block And Page Blobs
Stream Data Using Blobs
Access Blobs Securely
Implement A sync Blob Copy
Configure a Content Delivery Network (CDN)
Design Blob Hierarchies
Configure Custom Domains
Scale Blob Storage
Azure SQL Databases
Choose the Appropriate Database Tier and Performance Level
Configure Point-in-time Recovery, Geo-replication, and Data Sync
Import and Export Data and Schema
Design a Scaling Strategy
Securing your Resources
List comprehensions
Lambda functions
Third-Party Libraries
Azure Active Directory
Microsoft Graph
Azure AD Connect
Azure Active Directory password hash synchronization
Azure Active Directory pass-through authentication
Active Directory Federation Services
Multi-Factor Authentication
Enabling MFA in the Azure Portal
Azure Active Directory Business to Business
Azure Active Directory Business to Consumer
Administration:
Manage access
Create and Manage Shared Access Signatures
Use Stored Access Policies
Regenerate Keys
Azure Active Directory (Azure AD) with Existing Directories
Implement Azure AD Connect and Single Sign-on
Setup Azure Active Directory
Add Custom Domains
Implement Azure AD Connect
Monitor Azure AD
Azure AD B2C and Azure B2B
Create an Azure AD B2C Directory
Link a Subscription to a B2C Tenant
Register an Application
Implement Social Identity Provider Authentication
Enable Multi-Factor Authentication
Set Up Self-Service Password Reset
Implement B2B Collaboration
Secure your Data
Azure Key Vault
Azure Storage Service Encryption
Azure Disk Encryption
Azure SQL Database Security
Azure Active Directory Managed Service Identity
Life Cycle of Machine Learning Model Development.
Data Extraction
Data Cleansing & Transformations
Data Preparations
Model Selection
Train the Model
Test the Model
Validate the Model
Measure the accuracy of the model
Deploy the model
Tune/Rebuild the model
Governance and Policies:
Azure Role-Based Access Control
Built-in Roles
Custom Roles
Creating a Custom Role
Azure Resource Policies
Azure AD Privileged Identity Management
Azure AD Identity Protection
Azure Security Center
Advanced Threat Detection
Azure Endpoint Protection
Implementing Messaging Solutions
Azure Queue Storage
Azure Service Bus
Azure Event Grid
Routing Events with Azure Event Grid
Notification Hubs
Designing an effective messaging architecture
Application Monitoring and Alerting Strategies
Azure Log Analytics
Creating a Log Analytics Workspace
Azure Monitor
Application Insights
Azure Service Health
Azure Advisor
Address Recommendation from Azure Advisor
Azure Network Watcher
Designing an Operations Automation Strategy
Azure PowerShell
Desired State Configuration
Azure Automation
Deploy Azure Web Apps
Overview of Azure Web Apps
Deployment Slots
Roll Back Deployments
Pre- and Post-Deployment Actions
Implement Packages
App Service Plans
Migrating to Another App Service Plan
Create an App Under an App Service Plan
Configure Web Apps
Configure Azure Web Apps
General Settings
Auto Swap and Debugging Settings
App Settings and Connection Strings
Handlers and Virtual Directories
Custom Domains
Binding the SSL and Runtime Configuration
Scaling Web Apps
Web App Scaling – Changing the Size of an Instance
Web App Scaling – Enable Auto scaling
Configure Traffic Manager
DEVOPS
Model 1: Continues Integration and Continues Delivery by AZURE
• Git
• Jenkins
• Maven
• Jfrog
• SonarQube
Model 2: Configuration Management
• Vagrant
• Ansible
Model 3: Containerization
• Docker
• Kubernetes
Model 4: Infrastructure Automation
• Terraform
Model 5: Monitoring
• Elastic search
• Kibana
• Log stash
• Nagios
Why DevOps:
• Business Perspective
• IT Perspective
• Developer Perspective
• Tester Perspective
• Operations Perspective
What is DevOps:
• Definition
• Stakeholders of DevOps
What is SDLC:
• Phases of SDLC
• Role of Dev in SDLC
• Role of Ops in SDLC
Introduction to DevOps Automation:
• Introduction
• Tools
• DevOps Technology Categories
• Collaboration
• Planning
• Issue Tracking
• Configuration Management
• Source Control
• Dev Environments
• Continuous Integration
• Continuous Testing
• Continuous Deployment
• Monitoring
Linux Essentials:
• History
• Types of OS
• Flavours
• OS Structure
• File system
• All Linux basic commands
• File & directorys persmisions
• User & groups administration
• Accessing Servers with ssh
• How multi user works in Linux
• How make normal user as sudo user.
Shell Script:
• Introduction
• Type of shells
• Variables
• Types of variables
• Operators
• Input arguments
• String comparison
• Athematic comparison
• File conditions
• If, loops, case, functions
• Examples
Virtualization:
• Introduction
• What is Virtualization
• Server Virtualization
• Desktop Virtualization
• Application Virtualization
Apache Webserver:
• Installations
• Configuration
Tomcat Application Server:
• Installation, configuration
• Tomcat Manager
• Application Management
• Application Deployment
DevOps Tools
Model 1: Continues Integration and Continues Delivery by Azure
Source Code Management:
What is Version Control System?
Git:
• Source Code Management
• SCM Tools
• What is Git
• Installation
• Work space/ work dir/ work tree
• Configuration
• Commit/check-in
• Version/version-ID/commit-ID,
• Work space, staging area, buffer area
• Local Repo/remote repo
• Customer Branching
• Release Branching
• Merge, stash, fast-forwarding, rebase
• Chery-pick, cat-file and hocks
• Repositories and Tracking
• Git Commands: add, commit, log, push, status, ignore, branch, checkout merge, confict, stash, reset, revert
• Git GUI
Automate Build Process:
Maven:
• Introduction, Maven Structure
• Maven Dependenciess
• Maven Repositories
• Maven Plugins and goals
• Integrated Maven Build
• Maven project
Jenkins:
What is Jenkins?
Installation and configuration
• Prerequisitesd
• Download and installation
• Configuration.
Managing Jenkins
• Securing Jenkins, Managing Credentials, Plugin Management
• Jenkins Backup, Create a Build Slave
Creating Application Builds
• Manual compilation with Maven
• Manually Testing, Packaging and Running the App
• Creating a Jenkins Job and configuring a Git Repo
• Compiling in Jenkins
• App Packaging in Jenkins
• Archiving artifacts
• Cleaning up Past Builds
• Build time trend
• The jenkins Dashboard
• Troubleshooting build failures
• Build linking upstream and downstream
Plugins
• Introduction
• Plugin Architecture
• Extension Points
• Getting Plugins
• Useful Plugins Overview
• Build Tool Plugins
• Installing a plugin
• Plugin configuration
• Security Overview
Continuous Testing and Continuous Integration and Testing
• Adding steps to Freestyle Project
• Creating a Pipeline job to execute Maven
• Archiving in a Pipeline
• Checking out git repository in pipeline
• The Master Agent Model
• Allocating a node and workspace in Pipeline
• Triggering Automated Builds
• Configuring an Email Server
• Notifications when a build fails
• Executing unit tests
Finding and Managing Plugins
• The need for plugins
• Integrated Code Coverage
• Assessing a plugin
• Testing Plugins and Plugin Types
Building Continuous Delivery Pipeline
• Continuous Delivery
• Backup and Restore
• A Second Node Allocation
• Adding an Agent Node
• Setup parallel integration testing in a pipeline
• Executing and Monitoring Parallel pipelines
• Setup Deployment to staging
• Executing a Deployment pipeline
• Checkin pipeline script to Git
Master and Slave Configuration
Integrating Jenkins with jfrog and sonarqube
Vagrant:
Introduction
• What is Vagrant
• Virtualization Overview
Setting Up Vagrant
• Virtual Box Installation
• Vagrant Installation
Using Vagrant
• Vagrant Machine
• Vagrant Files
• Boxes
• Running Vagrant Machines
• SSH to Vagrant Machine
• Synced Folders
• Environment Management
Automated Provisioning
• Provisioning
• Installing Apache /Shell Script
Networking
• Private Networking
• Public Networking
Model 2: Configuration / Provisioning
Ansible:
Introduction
• What is Ansible
• Change Management
• Provisioning
• Automation
• Orchestration
• Why use Ansible
• YAML
• Built in Security
• Extendable
• Conclusion
Architecture and Process Flow
• Architecture Introduction
• System Requirement
• Components Overview
• Process of Execution
• Conclusion
Setup and Configuration
• Test Environment Setup
• Download and Installation
• Ansible Configuration File
• The HOSTS File
• Overriding the Default HOSTS File
• Overriding the Default System Ansible.Cfg File
• Overriding the Default Roles Path
• Understanding the core components of Ansible
• Ad-hoc commands in Ansible
Ansible Inventory and Configuration
• Introduction to Inventory &Configuration
• Inventory Fundamentals
• Scaling out with Multiple Files
• Ansible Configuration Basics
Ansible Playbooks
• Ansible Command Line
• Our First Playbook
• Variables: Inclusion Types
• Target Section
• Variable Section
• Task Section
• Handler Section
• Outlining Playbook
• Create a Playbook from Outline
• Optimizing Playbook
• Taking Playbook for a Dry Run
• Simple Variable Substitution
• Loops
• Conditionals
• Vault
• Basic Include Statements
• Tags
• Basic Error Handling
• Includes - Breaking Your Playbook Into Discrete Plays
• Starting At Task or Stepping Through All Tasks
• Passing Variables Into Playbooks at the Command Line
• Using Jinja2 Templates
• Use a playbook to copy a program and customize it for the target host.
• Wiring Play books for java, webservers and applications server
Ansible Modules
• Introduction
• Ansible Modules Fundamentals
• Module Docs
• Yum Module
• Setup Module
• Other modules
Create and use templates to create customized configuration files
• Introduction
• Templates
Working with Ansible facts and variables.
• Let see how we get ansible facts and how we use facts
• Using Ansible facts
• Using variables to gather server info
Roles
• Introduction to Roles
• Role Basics
• Creating Role
• Ansible Galaxy
• Roles - The Directory Structure
• Role Based Tasks
• Task Order - Pre and Post Tasks
• Roles - Conditional Execution
• Roles - Variable Substitution
• Roles - Handlers
• Roles - Configuring Alternate Roles Paths
• Roles - Conditional Include Statements
• Roles - Waiting For Events
• Roles - Executing a Task Until
• Roles - Using Tags
• Roles - Breaking a Playbook Into a Role
• Roles - Passing Variables from Command Line
• Roles - Using Jinja2 Templates
• Roles - LocalAction
• Roles - Lets create a role to install apache.
• Lets use the previous role and add a new one.
• Lets build on the previous role
• Create Role for installing tomcat on multiple nodes
• Create Role for deployapplication on multiple nodes
Model 3: Containerization
Docker:
• Introduction
• What is Docker
• Docker Life Cycle
• How Docker Containers working
Installing Docker
• Installing Docker on Linux
Working with Containers
• How to create the containers
• Docker commands
• Theory of pulling and Running Containers
• Working with images
• Container Life cycle
• Dockerfile
• Build Docker images
• Docker push
• Docker compose
• Docker volumes
• Docker cpu
• Docker memory
• Docker Networking
Kubernetes
• What is kubernets
• Purpose of Kubernets
• How kubernets works
• Master components, how works
• Node Compenents, how works
• How pods works
• Installations and configuration kubernets cluster
• Pod lifecycle
• Work with pods
• Work with Services
• Work with Replica controller
• Work with Deployment
• How to Releases java application by using RC and Deploy
• AKS
Model 4: Terraform
Infrastructure Automation
• What is Infrastructure as Code and why is it needed?
• Declarative vs Procedural tools for Infrastructure as Code
• Infrastructure as Code in the Cloud
• Requirements for infrastructure provisioner
• Deploying First Server
• Preparing work environment
• Terraform providers
• Configuring AWS provider e. Creating EC2 instance with Terraform
• Working with state
• Handling resource updates
Resource Dependencies and Modules
• Creating AWS Virtual Private Cloud
• Controlling dependencies with depends_on and ignore_changes
• Making sense of our template
Storing and Supplying Configuration
• Understanding variables
• Configuring data sources
• Exploring Terraform configuration resources
Model 5: Monitoring
System Monitoring: Nagios
• Installation of Nagios
• Configuring Nagios
• Monitoring with Nagios
Application Monitoring: ELK
• Installation of Elasticsearch, logstash, Kiban stack
• Configuring the ELK Stack
• Monitoring logs with ELK