TorBT - Torrents and Magnet Links Search Engine

[Tutorialsplanet.NET] Udemy - AZ-301 Azure Architect Design Exam Prep 2020

File Name
Size
1. Quick Start/1. Welcome!.mp4
19 MB
1. Quick Start/1. Welcome!.vtt
5.7 kB
1. Quick Start/2. Meet the Instructor.mp4
14 MB
1. Quick Start/2. Meet the Instructor.vtt
2.5 kB
1. Quick Start/3. Overview of the AZ-301 Exam Requirements.mp4
34 MB
1. Quick Start/3. Overview of the AZ-301 Exam Requirements.vtt
4.5 kB
1. Quick Start/4. Multi-Channel Learning & Other Resources.mp4
22 MB
1. Quick Start/4. Multi-Channel Learning & Other Resources.vtt
4.4 kB
1. Quick Start/5. Dec 2019 Changes to AZ-301.mp4
20 MB
1. Quick Start/5. Dec 2019 Changes to AZ-301.vtt
2.4 kB
1. Quick Start/6. Amazing Azure Resources.html
2.0 kB
10. Design a Data Management Strategy/1. Managed and Unmanaged Data Strategy.mp4
14 MB
10. Design a Data Management Strategy/1. Managed and Unmanaged Data Strategy.vtt
7.4 kB
10. Design a Data Management Strategy/2. Relational and NoSQL Database Strategy.mp4
24 MB
10. Design a Data Management Strategy/2. Relational and NoSQL Database Strategy.vtt
7.9 kB
10. Design a Data Management Strategy/3. Database Auditing Strategy.mp4
9.3 MB
10. Design a Data Management Strategy/3. Database Auditing Strategy.vtt
3.4 kB
10. Design a Data Management Strategy/4. The Concept of DTUs.mp4
12 MB
10. Design a Data Management Strategy/4. The Concept of DTUs.vtt
2.3 kB
10. Design a Data Management Strategy/5. The Concept of RUs.mp4
12 MB
10. Design a Data Management Strategy/5. The Concept of RUs.vtt
2.6 kB
10. Design a Data Management Strategy/6. Data Retention Strategy.mp4
5.9 MB
10. Design a Data Management Strategy/6. Data Retention Strategy.vtt
2.3 kB
10. Design a Data Management Strategy/7. Data Availability, Consistency and Durability.mp4
19 MB
10. Design a Data Management Strategy/7. Data Availability, Consistency and Durability.vtt
5.2 kB
10. Design a Data Management Strategy/8. Data Warehouse Strategy.mp4
4.6 MB
10. Design a Data Management Strategy/8. Data Warehouse Strategy.vtt
1.4 kB
11. Design a Data Protection Strategy/1. Data Geo-Replication.mp4
18 MB
11. Design a Data Protection Strategy/1. Data Geo-Replication.vtt
5.9 kB
11. Design a Data Protection Strategy/2. Data Encryption.mp4
12 MB
11. Design a Data Protection Strategy/2. Data Encryption.vtt
5.2 kB
11. Design a Data Protection Strategy/3. Data Scaling.mp4
15 MB
11. Design a Data Protection Strategy/3. Data Scaling.vtt
5.1 kB
11. Design a Data Protection Strategy/4. Data Security.mp4
17 MB
11. Design a Data Protection Strategy/4. Data Security.vtt
8.0 kB
11. Design a Data Protection Strategy/5. Data Loss Prevention (DLP).mp4
16 MB
11. Design a Data Protection Strategy/5. Data Loss Prevention (DLP).vtt
7.8 kB
12. Design a Monitoring Strategy for the Data Platform/1. Data Monitoring Strategy.mp4
28 MB
12. Design a Monitoring Strategy for the Data Platform/1. Data Monitoring Strategy.vtt
5.8 kB
13. Design a Site Recovery Strategy/1. Introduction to Azure Site Recovery (ASR).mp4
25 MB
13. Design a Site Recovery Strategy/1. Introduction to Azure Site Recovery (ASR).vtt
7.6 kB
13. Design a Site Recovery Strategy/2. Testing Failover and Initiating Failover.mp4
19 MB
13. Design a Site Recovery Strategy/2. Testing Failover and Initiating Failover.vtt
6.3 kB
13. Design a Site Recovery Strategy/3. Crash Consistent vs App Consistent Backups.mp4
7.5 MB
13. Design a Site Recovery Strategy/3. Crash Consistent vs App Consistent Backups.vtt
3.1 kB
13. Design a Site Recovery Strategy/4. ASR Workloads.mp4
12 MB
13. Design a Site Recovery Strategy/4. ASR Workloads.vtt
3.1 kB
13. Design a Site Recovery Strategy/5. ASR Geographies and Paired Regions.mp4
16 MB
13. Design a Site Recovery Strategy/5. ASR Geographies and Paired Regions.vtt
4.7 kB
14. Design for High Availability/1. Application Redundancy.mp4
13 MB
14. Design for High Availability/1. Application Redundancy.vtt
6.9 kB
14. Design for High Availability/2. High Availability for Essential Components.mp4
12 MB
14. Design for High Availability/2. High Availability for Essential Components.vtt
4.7 kB
14. Design for High Availability/3. Storage Types for High Availability.mp4
13 MB
14. Design for High Availability/3. Storage Types for High Availability.vtt
4.3 kB
15. Design a Data Archiving Strategy/1. Storage Account - Access Tiers.mp4
15 MB
15. Design a Data Archiving Strategy/1. Storage Account - Access Tiers.vtt
5.4 kB
15. Design a Data Archiving Strategy/2. Access Tier Requirements.mp4
20 MB
15. Design a Data Archiving Strategy/2. Access Tier Requirements.vtt
7.6 kB
15. Design a Data Archiving Strategy/3. Access Tier Service Level Agreements (SLAs).mp4
10 MB
15. Design a Data Archiving Strategy/3. Access Tier Service Level Agreements (SLAs).vtt
4.0 kB
16. Design Deployments/1. Compute Deployments.mp4
14 MB
16. Design Deployments/1. Compute Deployments.vtt
5.8 kB
16. Design Deployments/2. Container Deployments.mp4
11 MB
16. Design Deployments/2. Container Deployments.vtt
4.7 kB
16. Design Deployments/3. Database Deployments.mp4
5.6 MB
16. Design Deployments/3. Database Deployments.vtt
2.0 kB
16. Design Deployments/4. Storage Deployments.mp4
6.3 MB
16. Design Deployments/4. Storage Deployments.vtt
2.7 kB
16. Design Deployments/5. Web App Deployments.mp4
5.9 MB
16. Design Deployments/5. Web App Deployments.vtt
2.6 kB
16. Design Deployments/6. Service Fabric Deployments.mp4
12 MB
16. Design Deployments/6. Service Fabric Deployments.vtt
3.0 kB
17. Design Migrations/1. Azure Migration Strategy.mp4
15 MB
17. Design Migrations/1. Azure Migration Strategy.vtt
6.7 kB
17. Design Migrations/2. Data Migration Strategy.mp4
32 MB
17. Design Migrations/2. Data Migration Strategy.vtt
8.3 kB
17. Design Migrations/3. Application Migration Strategy.mp4
11 MB
17. Design Migrations/3. Application Migration Strategy.vtt
6.1 kB
17. Design Migrations/4. Useful Resources.html
446 B
18. Design an API Integration Strategy/1. API Management.mp4
22 MB
18. Design an API Integration Strategy/1. API Management.vtt
6.7 kB
18. Design an API Integration Strategy/2. API Policies.mp4
17 MB
18. Design an API Integration Strategy/2. API Policies.vtt
5.5 kB
19. Design a Storage Strategy/1. Storage Account Strategy Overview.mp4
18 MB
19. Design a Storage Strategy/1. Storage Account Strategy Overview.vtt
7.7 kB
19. Design a Storage Strategy/2. Setting Access Tiers.mp4
23 MB
19. Design a Storage Strategy/2. Setting Access Tiers.vtt
8.4 kB
19. Design a Storage Strategy/3. Storage Requirements.mp4
18 MB
19. Design a Storage Strategy/3. Storage Requirements.vtt
7.0 kB
19. Design a Storage Strategy/4. Storage Management.mp4
15 MB
19. Design a Storage Strategy/4. Storage Management.vtt
4.6 kB
2. Gather Information and Requirements/1. Identify Compliance Requirements.mp4
18 MB
2. Gather Information and Requirements/1. Identify Compliance Requirements.vtt
6.5 kB
2. Gather Information and Requirements/10. Identify Sizing Requirements.mp4
17 MB
2. Gather Information and Requirements/10. Identify Sizing Requirements.vtt
8.8 kB
2. Gather Information and Requirements/11. Identify Change Request Requirements.mp4
24 MB
2. Gather Information and Requirements/11. Identify Change Request Requirements.vtt
7.6 kB
2. Gather Information and Requirements/12. Handling Workloads.mp4
12 MB
2. Gather Information and Requirements/12. Handling Workloads.vtt
5.2 kB
2. Gather Information and Requirements/13. Identify Testing Requirements.mp4
6.2 MB
2. Gather Information and Requirements/13. Identify Testing Requirements.vtt
3.8 kB
2. Gather Information and Requirements/2. Identify Accessibility Requirements.mp4
16 MB
2. Gather Information and Requirements/2. Identify Accessibility Requirements.vtt
5.1 kB
2. Gather Information and Requirements/3. Identify Availability Requirements.mp4
43 MB
2. Gather Information and Requirements/3. Identify Availability Requirements.vtt
8.8 kB
2. Gather Information and Requirements/4. Identify Capacity and Scaling Requirements.mp4
20 MB
2. Gather Information and Requirements/4. Identify Capacity and Scaling Requirements.vtt
8.1 kB
2. Gather Information and Requirements/5. Identify Deploy-ability Requirements.mp4
9.1 MB
2. Gather Information and Requirements/5. Identify Deploy-ability Requirements.vtt
4.3 kB
2. Gather Information and Requirements/6. Identify Configurability Requirements.mp4
12 MB
2. Gather Information and Requirements/6. Identify Configurability Requirements.vtt
4.0 kB
2. Gather Information and Requirements/7. Identify Governance Requirements.mp4
9.9 MB
2. Gather Information and Requirements/7. Identify Governance Requirements.vtt
4.4 kB
2. Gather Information and Requirements/8. Identify Maintainability Requirements.mp4
13 MB
2. Gather Information and Requirements/8. Identify Maintainability Requirements.vtt
6.0 kB
2. Gather Information and Requirements/9. Identify Security Requirements.mp4
10 MB
2. Gather Information and Requirements/9. Identify Security Requirements.vtt
4.9 kB
20. Design a Compute Strategy/1. Overview of Compute.mp4
14 MB
20. Design a Compute Strategy/1. Overview of Compute.vtt
3.7 kB
20. Design a Compute Strategy/2. Compute Options.mp4
14 MB
20. Design a Compute Strategy/2. Compute Options.vtt
9.6 kB
20. Design a Compute Strategy/3. High Performance Compute (HPC).mp4
25 MB
20. Design a Compute Strategy/3. High Performance Compute (HPC).vtt
4.9 kB
21. Thank You!/1. Congratulations and thank you.html
84 B
21. Thank You!/2. BONUS Lecture - Discounts.html
226 B
21. Thank You!/2.1 Udemy-Bonus-Lecture-Jan-2020-v2.pdf.pdf
50 kB
3. Optimize Consumption Strategy/1. The Challenges of Cost Optimization in Cloud Apps.mp4
17 MB
3. Optimize Consumption Strategy/1. The Challenges of Cost Optimization in Cloud Apps.vtt
4.2 kB
3. Optimize Consumption Strategy/2. Options for Predicting or Managing Costs.mp4
24 MB
3. Optimize Consumption Strategy/2. Options for Predicting or Managing Costs.vtt
6.3 kB
3. Optimize Consumption Strategy/3. Other Options for Managing Costs.mp4
51 MB
3. Optimize Consumption Strategy/3. Other Options for Managing Costs.vtt
14 kB
4. Design an Auditing and Monitoring Strategy/1. Group Resources Using Tags.mp4
37 MB
4. Design an Auditing and Monitoring Strategy/1. Group Resources Using Tags.vtt
9.6 kB
4. Design an Auditing and Monitoring Strategy/2. Using Resource Diagnostics.mp4
44 MB
4. Design an Auditing and Monitoring Strategy/2. Using Resource Diagnostics.vtt
9.6 kB
5. Design Identity Management/1. Intro to Azure Active Directory.mp4
12 MB
5. Design Identity Management/1. Intro to Azure Active Directory.vtt
2.1 kB
5. Design Identity Management/2. Create a New Azure Active Directory.mp4
8.1 MB
5. Design Identity Management/2. Create a New Azure Active Directory.vtt
2.3 kB
5. Design Identity Management/3. Create a Custom Azure AD Domain.mp4
45 MB
5. Design Identity Management/3. Create a Custom Azure AD Domain.vtt
8.1 kB
5. Design Identity Management/4. Create Azure AD Users.mp4
18 MB
5. Design Identity Management/4. Create Azure AD Users.vtt
4.2 kB
5. Design Identity Management/5. Self-Service Password Reset.mp4
34 MB
5. Design Identity Management/5. Self-Service Password Reset.vtt
7.3 kB
6. Design Authentication/1. Intro to Authentication.mp4
26 MB
6. Design Authentication/1. Intro to Authentication.vtt
8.2 kB
6. Design Authentication/2. AD Synchronization.mp4
7.2 MB
6. Design Authentication/2. AD Synchronization.vtt
1.9 kB
6. Design Authentication/3. Protecting Authentication.mp4
16 MB
6. Design Authentication/3. Protecting Authentication.vtt
5.0 kB
7. Design Authorization/1. Introduction to Authorization.mp4
13 MB
7. Design Authorization/1. Introduction to Authorization.vtt
6.4 kB
7. Design Authorization/2. Approach to Authorization.mp4
27 MB
7. Design Authorization/2. Approach to Authorization.vtt
12 kB
7. Design Authorization/3. Azure AD Groups and Roles.mp4
22 MB
7. Design Authorization/3. Azure AD Groups and Roles.vtt
6.1 kB
8. Design for Risk Prevention for Identity/1. What is Risk.mp4
25 MB
8. Design for Risk Prevention for Identity/1. What is Risk.vtt
12 kB
8. Design for Risk Prevention for Identity/2. Mitigating Risks with Identity.mp4
36 MB
8. Design for Risk Prevention for Identity/2. Mitigating Risks with Identity.vtt
13 kB
9. Design a Monitoring Strategy for Identity and Security/1. Using Privileged Identity Management Alerts.mp4
10 MB
9. Design a Monitoring Strategy for Identity and Security/1. Using Privileged Identity Management Alerts.vtt
3.1 kB
9. Design a Monitoring Strategy for Identity and Security/2. Other Ways to Monitor the Security of Identity.mp4
9.5 MB
9. Design a Monitoring Strategy for Identity and Security/2. Other Ways to Monitor the Security of Identity.vtt
4.1 kB
[Tutorialsplanet.NET].url
128 B