Checkout the Latest Courses and Hands-On Labs from Skill Me UP!
Keep your skills sharp and check out the Live Schedule too.
In this lab, you will configure several virtual machines that have been pre-deployed into an Azure subscription. This includes: one domain controller and two SQL Servers. You will thencreate an Azure Storage account that will be used as a Cloud Witness for the cluster, a Windows Failover Cluster across the two SQL Servers with the storage account acting as a witness. You will then create a SQL ServerAvailability Group with an Azure Internal Load Balancer and validate failover works correctly.Note: This lab pre-provisions several virtual machines and may take more than 30 minutes to complete provisioning.
This is course six of seven in the Implementing Azure Governance learning path. Resource organization is critical for organizations using Azure at scale. This course begins by discussing resource organization in Azure, explaining both the technical capability of the platform and best practices you can use to manage resources effectively. The second part of the course focuses on the Azure Resource Graph, showing how you can use this feature to explore your resources in many powerful ways.
This is course five of seven in the Implementing Azure Governance learning path.In this course, you will deep dive into the Azure Blueprints service, which is one of the more advanced governance services in Azure. You will learn what Blueprints are, and the scenarios they are designed to address. The course then takes you on a in-depth journey through each stage of the Blueprints life cycle: creating the Blueprint, adding artifacts, publishing, assigning to a subscription, and managing later updates. The final section of the course provides detailed coverage of Blueprints features not exposed in the Azure portal, such as controlling dependencies and avoiding use of the subscription Owner role. The course include in-depth demos using both the Azure Portal and command-line tools.
This is course one of seven in the Implementing Azure Governance learning path. This short course provides a brief introduction to key governance concepts and technologies in Azure. Students learn about the Azure governance architecture and the importance of good governance to successful enterprise cloud adoption.This course also serves as an introduction to the Azure Governance learning path.
In this collection of hands-on labs, you will learn about several technologies critical to preparing for the exam MS 101 - Mobility and Security. This Real Time Lab consists of seven labs in 1 for a comprehensive training experience.Labs included:LAB 1: Managing Policy and Permission Alerts,LAB 2: Configure Office 365 Message Encryption,LAB 3: Auto Enrollment and Tagging,LAB 4: Managing DLP Policies,LAB 5: Azure and Windows Information Protection,LAB 6: Data Investigation and Requests,LAB 7: Configuring the Microsoft Store. This lab provides the ability to "Pause" the lab. You will have two weeks to complete the lab exercises when utilizing the Pause feature.
In this lab, you will learn the basics of importing CSV files into a Power BI model and adjusting query and column properties to prepare them for your data model. Then you will set table and column properties in the data model and create relationships between tables.
In this lab, you will learn the basics of time intelligence measures to show year-to-date, quarter-to-date, and month-to-date totals. Then you will use DAX to enhance the data model and build a table that lets users choose which measures they want to see.
In this course, students will gain knowledge and skills needed to recommend and design Azure Data Solutions based on requirements. The solution technologies will include both relational and non-relational cloud data stores.
In this lab, you will learn how to use the Azure PowerShell cmdlets to deploy a pre-built Azure Resource Manager template.This template leverages the PowerShell DSC Custom script extension to automatically configure the virtual machines that are defined in the template.
In this lab, you will create an Azure Web App and a SQL Database and configure the popular content management system (CMS) Orchard CMS. You will then configure the web app to automatically scale based on actual CPU usage.
This lab is designed to help you become familiar with several features of Microsoft Azure Log Analytics. You will learn how to setup a Log Analytics workspace and install the agent on several VMs. From there, you will configure data sources from Azure as well as diagnostic data from the VMs and learn the fundamentals of querying data and events using the Log Analytics query language.This lab pre-provisions several resources in Microsoft Azure and will take 15-20 minutes to start before it is ready.
This is the final course of the AI-100 Exam Preparation Learning Path.In this course, we will discuss how to implement various technologies for processing and ingesting your information,we will discuss how to implement Cognitive Services into your application and tie in Cognitive Search to your solution, andwe will discuss tools available for auditing and monitoring plus how to analyze an AI solution and migrate it to another solution if it does not meet requirements.
In this lab, you will create an Azure Web App in the portal and add a staging slot. Then, using Visual Studio you will create a .Net application. You will read environmental variables from a file, then remove the dependency on that file with application settings in Azure. You will view default logs using log streaming in Azure and then create custom log messages in the application. You will explore slot deployment by deploying these changes to Stage and then swapping them to Production.
This is the second course of the AI-100 Exam Preparation Learning Path.In this course, we will discuss how to analyze the different business scenarios and translate them into different tools available,we will design a solution using Cognitive Services, we will discuss various use cases related to bot services and LUIS and discuss how to design a solution using these technologies,we will discuss the various High Performance Computing solutions that rely on computer infrastructure within the cloud, on-premises, and within hybrid scenarios, andwe will discuss security, compliance, and governance as it pertains to designing an AI solution in the cloud.
This is course four of seven in the Implementing Azure Governance learning path.Azure Management Groups enable many of Azure’s governance and reporting features to be centrally managed using an organization-wide hierarchy, rather than being managed on each individual subscription. This enables an efficient and reliable approach to implementing governance at scale across an organization.In this class, you will learn how to design and build a management group hierarchy, and how to use management groups to implement governance and reporting across an organization.
Students will learn Plan and implement Windows 10 by using dynamic deployment, plan and implement Windows 10 by using Windows Autopilot, upgrade devices to Windows 10, manage updates and manage device authentication.
The course will educate you on securing data within Office 365, by implement protections used to encrypt data, as well as restrict end user capabilities. The course will also walk-through the implementation and management of Cloud App Security protections.
Today, data is being collected in ever-increasing amounts, at ever-increasing velocities, and in an ever-expanding variety of formats. This explosion of data is colloquially known as the Big Data phenomenon.In order to gain actionable insights into big-data sources, new tools need to be leveraged that allow the data to be cleaned, analyzed, and visualized quickly and efficiently. Azure HDInsight provides a solution to this problem by making it exceedingly simple to create high-performance computing clusters provisioned with Apache Spark and members of the Spark ecosystem. Rather than spend time deploying hardware and installing, configuring, and maintaining software, you can focus on your research and apply your expertise to the data rather than the resources required to analyze that data.Apache Spark is an open-source parallel-processing platform that excels at running large-scale data analytics jobs. Spark’s combined use of in-memory and disk data storage delivers performance improvements that allow it to process some tasks up to 100 times faster than Hadoop. With Microsoft Azure, deploying Apache Spark clusters becomes significantly simpler and gets you working on your data analysis that much sooner.In this lab, you will experience HD Insight with Spark first-hand. After provisioning a Spark cluster, you will use the Microsoft Azure Storage Explorer to upload several Jupyter notebooks to the cluster. You will then use these notebooks to explore, visualize, and build a machine-learning model from food-inspection data — more than 100,000 rows of it — collected by the city of Chicago. The goal is to learn how to create and utilize your own Spark clusters, experience the ease with which they are provisioned in Azure, and, if you're new to Spark, get a working introduction to Spark data analytics.
This is course two of seven in the Implementing Azure Governance learning path. Role-based access control is a fundamental pillar of good governance in Azure. Properly deployed, it enables an organization to control how users access and administer the organization’s Azure resources, implementing a ‘least privilege’ model in which users have only the permissions they need, to only the resources they need. This course provides a deep-dive into role-based access control in Azure. The course starts by explaining how user and system identities are managed in Azure AD, and how Azure roles are defined. It then explains how roles can be assigned, and how multiple role assignments interact. Finally, the course shows how you can implement tailored access control policies by creating and assigning your own custom role definitions.
In this lab, you will learn how to make direct calls to the Azure Resource Manager REST API. There are various different tools available to make these API calls Each exercise focuses on a different tool, and on different features of the REST API.
This is course seven of seven in the Implementing Azure Governance learning path. Cost management and cost optimization are key concerns of all Azure customers. In this class, students will first learn the principles of how Azure accounts are managed and billed. Next, students learn how a variety of commonly-used IaaS and PaaS resources are priced. This is followed by a deep-dive on cost optimization techniques you can to reduce your bill without impacting your applications. Finally, the class includes a deep-dive on Azure Cost Management, which enables you to track, analyze and forecast your Azure spend to providing accurate cost estimates and reduced billing risk.
In this lab, you will learn how to manage Users and Groups using both MSOnline and AzureAD PowerShell Modules. You will create, manage and remove both users and groups, followed by managing permissions within Azure Active Directory.
This course will provide an overview of how to use features within Teams such as chat, online meetings, calls and more. Learn the core features of Teams and how it relates to other Office 365 apps to make your team more productive.
Students will learn the fundamentals about Cloud App Security to gain visibility around all your cloud apps and services.Security is a primary goal for any organization, in this course the attendees will learn about the threat management to protect their environment and to monitor it using the cloud platform tools. This training will prepare it's audiences for, MS-101: Microsoft 365 Mobility and Security exam.
Students will learn about the modern workplace philosophy and how to embrace it, evolving the company paradigm into a flexible environment which allows collaboration while maintaining the security principals and improving the business through the adoption of the new platforms and concepts.
Students will learn how to prevent scenarios where leaked information could cause damage to their organizations, by gaining the ability to create, publish, and apply labels to documents. Students will learn to set the retention policies to those documents to be compliant with regulations that apply to their organizations.This training will prepare it's audiences for, MS-101: Microsoft 365 Mobility and Security exam.
This course introduces you to the key components of Office 365 and then focuses on what it takes to move your organization to Office 365. You will spend time learning how to plan an Office 365 deployment.It will also cover the design and planning tools and top to handle on-prem and cloud workloads and have a whole support platform to work based on the business requirements.
This course will cover the management of authentication and authorization services in Azure Active Directory and Microsoft 365. It will include concepts of authentication process on-prem and the design best practices for a successful business migration.Multi-Factor Authentication and Application access will also be part of the content to provide a complete picture of these features and their usage on authentication and authorization, covering internal and external requests and providing a full understanding of the service.
In this course, you will learn learn how to manage user security groups and licenses for cloud identities, and how to plan and implement identity synchronization, federated identities, applications, and external access.This course focuses on the management tasks for identity and role administration from the Microsoft 365 platform perspective to cover security, compliance and supporting roles; it will also elaborate on tips for monitoring the integration and hybrid services used on identity management.
In this lab, you will learn about the agile planning and portfolio management tools and processes provided by Azure Boards and how they can help you quickly plan, manage, and track work across your entire team. You will explore the product backlog, sprint backlog, and task boards which can be used to track the flow of work during the course of an iteration.
In this hands-on lab, you will learn how to configure client and end-user devices for Office 365. You will learn how to set device access rules using the Microsoft Online Services PowerShell module, plus learn how to perform an automated installation of Office 365 ProPlus. The lab wraps up on installing the Microsoft Support and Recovery assistant so you understand how to trouble shoot common deployment issues.
In this lab, you will verify the networking configuration of an Ubuntu VM. You will login to a live virtual machine running Ubuntu Linux and explore several networking commands to provide more insight into the virtual machine's network configuration.
In this lab, you will learn how to install the Microsoft Teams application, create your first Team, and then explore the Microsoft Team's Admin Center. From there, you will get some hands-on practice managing Teams and Channels.
This course will mainly cover connectivity. You will learn all about the main protocol that makes networking on the internet and most organizations work. TCP/IP isn’t the only protocol, but it is the most important and most often used. It’s also the main protocol used in in the Network+ certification exam.
This course covers LAN and WAN topics, we will discuss what happens to packets as they traverse the network. We will also cover TCP/IP classes and what they mean to connectivity. We will finish with discussing WAN technologies both past and present. We will discuss analog and digital connectivity and the various ways ISP’s connect us to the internet.
This course dives into the Presentation layer of the OSI model and discusses port traffic. Ports are also known as doors and act as doorways in and out of a network. Understanding how to open or close a port and why is a great asset to have in your knowledge of networking.
This course covers wireless networking also described as WIFI. We will learn about the wireless standards and protocols, and types of security that wireless entails.
This course answers questions on encryption. What encryption is and the different forms it takes in networking. We also discuss certificates and what roles they play in TCP/IP. By encrypting our data, we secure our data. Security plays an ever-important roles in networking today.
This course will cover advanced networking a high-end consultant might implement in their day to day job in networks and security. We cover splitting up networks into virtual LANs, encrypting the stream using virtual private networks, and devices that can inform us of an impending intrusion.
This course will discuss cloud and mobile devices. Many companies are moving their data to the cloud and networking is essential to that process. Questions about what the cloud is and how it works are answered in this course, along with mobile connectivity using cellular networks and security.
This course gives you a working demonstration of setting up a real-world network using computers, switches and servers. We will discuss the different ways that the networks can be connected to the host devices and show how they communicate.
This course covers physical connectivity of networking. Cables need to plug in both sides, but there’s many types of cables, standards, and ways to connect. This course will review these various ways to connect your network using physical cabling.
In this course, we discusses real world tools both software and hardware. These tools help to connect and troubleshoot networks, so data runs smoothly, and we will discuss repairs when they don’t.
This course covers the track contents and how it is organized. It also introduces you to the AWS certification and how it is organized.
This course gives a high-level introduction to CloudWatch, monitoring EC2, EBS, ELB and Elasticache and services with a brief description for each service to get you acquainted to the offerings.
This course covers Elasticity vs Scalability and the core concepts behind both. In addition, it explores various cost optimization methods, as well as scaling up vs scaling out.
This course covers the entirety of the High Availability question domain. We will go through several services and explain how they can be used as HA design elements, and discuss the operations required to implement each service. Understanding trade-offs is an important element of HA design and we cover few examples of service and feature choice based on requirement.
This course is a comprehensive coverage of S3 Lifecycle and Encryption. The course also covers AWS Security Token Service and shared responsibility model.
This course will go over security assessment services and how to ensure compliance from a security perspective.
This course covers different network services in AWS and cover the operations required over time for each.
This course covers building your own custom VPC.
This course covers the concept of automation in AWS. There are several ways to automate tasks in the AWS ecosystem. We go over each of these services and describe how each can be used to implement frequently-performed tasks.
In this lab we'll guide you through the steps to deploy a request splitting ambassador that will split 10% of the incoming HTTP requests to an experimental server and the rest to a primary web server using Azure Kubernetes Service (AKS). This pattern is commonly used for testing new features or user experience to a small subset of users.
In this lab, you will learn to use a Managed Identity with Azure PowerShell by creating a virtual machine with a system managed identity. You will then assign the identity to a resource group using role-based access control (RBAC).
In this lab, you will provision an Azure Web App and App Service Plan. Then, you will configure a "Staging" Deployment Slot and deploy source code to it from a Github repository. Finally, you will perform a deployment slot swap to push the code deployment from Staging into Production.
This is course three of seven in the Implementing Azure Governance learning path.In this course, you will deep dive into the Azure Policy service, which is one of the fundamental governance services in Azure. You will learn how to apply Azure Policy to your subscriptions and the wide range of scenarios it supports. You will also deep dive on the policy definition language, so you can fully understand built-in policies and create your own custom policies. You will also learn how to use Azure Policy compliance reports, and how to investigate and re-mediate non-compliant resources. The course closes with an overview of Azure VM guest policy and overall policy management best practices.
In this lab, you will create a Linux virtual machine running in Azure, and connect to it using SSH. You will then delete the virtual machine, and clean up associated resources.
In this lab, you will create a Windows virtual machine running in Azure, and connect to it using Remote Desktop. You will then delete the virtual machine, and clean up associated resources.
In this lab, you will get started with Azure Key Vault to create a hardened container (a vault) in Azure, to store and manage cryptographic keys and secrets in Azure. First you will use Azure PowerShell. Then you will store a password as a secret that could then be used with an Azure application.
In this lab, you will create a virtual network that will allow the virtual machines you create to securely connect with each other. You will then create two virtual machines and specify the virtual network configuration and the availability set configuration along with storage for the virtual machine.
In this lab, you learn how to configure virtual networking peering.Virtual network peering enables you to seemlessly connect two Azure virtual networks. Once peered, the virtual networks appear as one, for connectivity purposes. The traffic between virtual machines in the peered virtual networks is routed through the Microsoft backbone infrastructure, much like traffic is routed between virtual machines in the same virtual network, through private IP addresses only.Note 1: This lab will connect two virtual networks within the same region. Peering across regions is currently in preview.Note 2: If you want a more in-depth view of virtual network connectivity (including site-to-site and point-to-site) try the Introduction to Virtual Network Connectivity lab.
The course will educate you implementing and managing identity and access within Microsoft 365. Starting with securing a Hybrid configuration, which focuses on selecting the correct authentication option and user account controls. It will also walk-through implementing conditional access policies for allowing and controlling access to the Microsoft 365 services, to implementing identity and privileged account protections using Azure Active Directory Privileged Identity Management and Azure Active Directory Identity Protection.
You are the leader of a group of climate scientists who are concerned about the dwindling polar-bear population in the Arctic. As such, your team has placed hundreds of motion-activated cameras at strategic locations throughout the region. Rather than manually examine each photograph to determine whether it contains a polar bear, you have been challenged to devise an automated system that processes data from these cameras in real time and displays an alert on a map when a polar bear is photographed. You need a solution that incorporates real-time stream processing to analyze raw data for potential sightings, and one that incorporates artificial intelligence (AI) and machine learning to determine with a high degree of accuracy whether a photo contains a polar bear. And you need it fast, because climate change won’t wait.In this lab, you will build such a system using Microsoft Azure and Microsoft Cognitive Services. Specifically, you will use an Azure IoT hub to ingest streaming data from simulated cameras, Azure Storage to store photographs, Azure Stream Analytics to process real-time data streams, Azure Functions to process output from Stream Analytics, Microsoft’s Custom Vision Service to analyze photographs for polar pears, Microsoft Power BI to build a dashboard for visualizing results, and Azure SQL Database as a data source for Power BI.
In this course, you will learn how to get started using the Azure PowerShell cmdlets to perform common management tasks with Azure Infrastructure as a Service. This course will teach you the foundations of interacting with Azure networking services such as virtual networks, network security groups, and the Azure load balancer as well as virtual machines. You will learn how to configure VM storage, networking and compute as well as automatic configuration using the Custom Script Extension and the PowerShell Desired State Configuration extension.
In this lab you will learn how to work with Azure Storage using Azure Storage Explorer. All aspects of Azure Storage will be explored including: Blobs, Files, Tables and Queues.
Azure Container Instances enables deployment of Docker containers onto Azure infrastructure without provisioning any virtual machines or adopting any higher-level service. In this tutorial, you build a small web application in Node.js and package it in a container that can be run using Azure Container Instances.
In this lab, you will build and run container based on IIS Server, ASP.NET 4.5 and ASP.Net Core Frameworks. You will use Dockerfile to create container image and then use Docker CLI commands to launch thecontainers. Finally, you will work work with docker commands to access container logs and stats including CPU and memory.
In this lab, you will practice using Azure Policy and Azure Role-Based Access Control (RBAC) to implement some simple governance scenarios in Azure. You will use Azure Policy to apply a permitted locations rule to the Azure subscription, and RBAC to grant permissions to a new user.
In this lab, you will learn the fundamentals of configuring and managing virtual machine diagnostics and alerts as well as learn some useful troubleshooting techniques for Azure Virtual Machines.This lab pre-provisions an environment that you will use for testing diagnostics capabilities and may take up to 30 minutes before it's ready.
In this lab, you will use Azure's Update Management solution to manage patches and updates for virtual machines. This involves enabling update management for a VM, assessing the status of updates, configuring alerts, scheduling update deployments, and finally viewing the results of update deployments.
In this lab, you will use the Azure PowerShell cmdlets to manage common tasks with Azure Blob Storage.You will learn how to create an Azure Storage Account, create and manage containers, upload and download blobs, and manage leases and snapshots.
In this lab, you will create a virtual network, network security groups and an application security group. From there you will associate several security rules and then create several virtual machines associated with them to test filtering network traffic.