• Online, Self-Paced
Course Description

Connection strings are used to allow client applications to interact with Azure SQL databases. This course covers the application connections strings, as well as the Azure Traffic Manager, which is used to control the distribution of incoming user traffic. In addition, this course covers the various types of application patterns available for SQL Server-based applications in an Azure environment. This course is one of a series of courses that cover the objectives for the 70-765: Provisioning SQL Databases exam.

Learning Objectives

Application Connection Strings

  • start the course
  • explain the role of connection strings
  • describe the use of connection strings in Azure
  • discuss how to create connection strings for Azure storage accounts
  • create a connection string using a shared access signature
  • create a connection string to an explicit storage endpoint
  • parse a connection string from a configuration file
  • develop application retry connection logic

Traffic Manager

  • describe the different options for distributing network traffic using Azure
  • describe the traffic manager feature found in Azure
  • explain the priority traffic routing method
  • explain the weighted traffic routing method
  • explain the performance traffic routing method

Application Patterns

  • describe the 1-tier application pattern
  • explain the 3-tier application pattern
  • explain the presentation tier scale out application pattern
  • describe the business tier scale out application pattern
  • describe the 2-tier and 3-tier presentation and business tiers scale out and HADR application pattern
  • describe the 2-tier and 3-tier using the Azure VMs and Cloud services application pattern
  • explain the N-Tier hybrid application pattern

Practice: Creating Traffic Manager Profiles

  • demonstrate how to create a traffic manager profile

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.