Table of Contents

    Microsoft Azure Fundamentals: Describe Azure architecture and services

    Describe the core architectural components of Azure

    • Describe Azure regions, region pairs, and sovereign regions

    • Describe availability zones

    • Describe Azure datacenters

    • Describe Azure resources and resource groups

    • Describe subscriptions

    • Describe management groups

    • Describe the hierarchy of resource groups, subscriptions, and management groups

    Describe Azure compute and networking services

    • Compare compute types, including containers, virtual machines, and functions

    • Describe virtual machine options, including Azure virtual machines, Azure Virtual Machine Scale Sets, availability sets, and Azure Virtual Desktop

    • Describe the resources required for virtual machines

    • Describe application hosting options, including web apps, containers, and virtual machines

    • Describe virtual networking, including the purpose of Azure virtual networks, Azure virtual subnets, peering, Azure DNS, Azure VPN Gateway, and ExpressRoute

    • Define public and private endpoints

    Describe Azure storage services

    • Compare Azure Storage services

    • Describe storage tiers

    • Describe redundancy options

    • Describe storage account options and storage types

    • Identify options for moving files, including AzCopy, Azure Storage Explorer, and Azure File Sync

    • Describe migration options, including Azure Migrate and Azure Data Box

    Describe Azure identity, access, and security

    • Describe directory services in Azure, including Microsoft Entra ID and Microsoft Entra Domain Services

    • Describe authentication methods in Azure, including single sign-on (SSO), multi-factor authentication (MFA), and passwordless

    • Describe external identities in Azure, including business-to-business (B2B) and business-to-customer (B2C)

    • Describe Microsoft Entra Conditional Access

    • Describe Azure role-based access control (RBAC)

    • Describe the concept of Zero Trust

    • Describe the purpose of the defense-in-depth model

    • Describe the purpose of Microsoft Defender for Cloud