Course

Course Summary
Credit Type:
Exam
ACE ID:
MLS-0058
Organization's ID:
AZ-104
Organization:
Location:
Worldwide through Pearson Vue test centers (and online proctoring through VUE)
Length:
2
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 cloud computing
Competency Framework Statement
Information Technology Competency Model 4.1 Principles of Information Technology: 4.1.1 Fundamental IT Concepts: 4.1.1.5 Understand concepts of server, desktop, application, and virtualization
Information Technology Competency Model 4.2 Databases and Applications: 4.2.9 Understand purpose and process of coding and tagging information
Information Technology Competency Model 4.2 Databases and Applications: 4.2.10 Demonstrate ability to find and select the information, appropriate tools, and processing techniques needed for a task
Information Technology Competency Model 4.2 Databases and Applications: 4.2.11 Understand logical and physical components of an information storage infrastructure
Information Technology Competency Model 4.2 Databases and Applications: 4.2.12 Explain the role and relationships of data, information, and databases in organizations, specifically their role in in business intelligence
Information Technology Competency Model 4.2 Databases and Applications: 4.2.13 Describe mechanisms for data collection and management, e.g., automated data collection, input forms, source documents, external devices, interfaces, relational characteristics, and dependencies
Information Technology Competency Model 4.2 Databases and Applications: 4.2.14 Assess the quality, accuracy, and timeliness of given data
Information Technology Competency Model 4.2 Databases and Applications: 4.2.18 Understand how other applications interact with databases to create and retrieve data
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.1 Identify and describe differences between Local Area Networks (LAN), Wide Area Networks (WAN), Virtual Private Networks (VPN), Internet, intranets, extranets, telephony, Voice over IP (VoIP), and other networks
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.5 Explain the purpose and properties of routing and switching
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.11 Describe the purpose of network configuration documentation
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.13 Explain the functionality, integrity, accessibility, and security of internet services
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.14 Explain different server roles, their purpose, and how they interact in a network context
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.15 Differentiate between Cloud-based applications, local server-based applications, and applications installed on a local computer, and know when to choose between them
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.17 Identify common network infrastructure troubleshooting techniques
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.1 Recognize and describe threats to networked computer systems, including malware (viruses, spyware, adware)
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.2 Understand the purpose and basic features of a firewall, Intrusion Detection System (IDS), and Intrusion Protection System (IPS)
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.3 Recognize methods of network access security
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.4 Explain the importance of user authentication and recognize examples
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.1 Understand virtualization concepts, features, benefits, and considerations
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.2 Differentiate types of “cloud services”, including Infrastructure as a service (IaaS); Platform as a service (PaaS); and Software as a service (SaaS)
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.3 Differentiate between public, hybrid, and private clouds
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.4 Understand the following characteristics of clouds and clouds services from a business perspective: Distribution over the Internet
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.6 Describe the impact of cloud computing on application architecture and the application-development process
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.2 Understand the rapid expansion of data and the challenge that places on IT systems
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.3 Explain the concepts of data backup, disaster recovery, data mirroring, and off-site storage
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.4 Describe different types of data storage solutions (e.g., RAID)
Information Technology Competency Model 4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.5 Describe common data backup and storage networking solutions (e.g., SAN, NAS, iSCSI)
Information Technology Competency Model 4.4 Software Development and Management: 4.4.3 Software acquisition, management, and maintenance: 4.4.3.5 Understand differences between enterprise hosted and outsourced software solutions, e.g., cloud
Information Technology Competency Model 4.4 Software Development and Management: 4.4.3 Software acquisition, management, and maintenance: 4.4.3.8 Be able to interact with software vendors and manage vendor relationships
Information Technology Competency Model 4.4 Software Development and Management: 4.4.3 Software acquisition, management, and maintenance: 4.4.3.10 Understand common business processes for installing, managing and maintaining enterprise software
Information Technology Competency Model 4.5 User and Customer Support: 4.5.1 Describe the importance of understanding different user groups and their perspectives, concerns, and technology uses
Information Technology Competency Model 4.5 User and Customer Support: 4.5.2 Demonstrate ability to communicate with users/customers for the purpose of assessing their needs and helping them solve problems
Information Technology Competency Model 4.5 User and Customer Support: 4.5.9 Demonstrate ability to troubleshoot problems in person or remotely
Information Technology Competency Model 4.5 User and Customer Support: 4.5.9 Demonstrate ability to troubleshoot problems in person or remotely
Information Technology Competency Model 4.5 User and Customer Support: 4.5.10 Analyze symptoms to identify broad area of user error or technical failure
Information Technology Competency Model 4.5 User and Customer Support: 4.5.11 Identify measurement techniques for increased productivity due to information support implementation
Information Technology Competency Model 4.5 User and Customer Support: 4.5.12 Identify and describe quality assurance concepts
Information Technology Competency Model 4.5 User and Customer Support: 4.5.13 Implements and provides guidance for the evolution of an IT solution (upgrades)
Information Technology Competency Model 4.7 Compliance: 4.7.3 Follow governance, risk management, and compliance procedures
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.2.6 Understand the importance of protecting data and information systems from accidental disclosure or destruction, unauthorized access or modification, and inappropriate use or malicious compromise
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.2.9 Explain importance of configuration management to security operations
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.2.11 Understand the need for controls and privileges based on an individual’s job duties
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.1 Describe major access control systems and their function
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.9 Demonstrate knowledge of system protection services like intrusion detection/prevention, communications filtering, firewall management, malware detection
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.11 Demonstrate knowledge of methods to protect web services
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.12 Demonstrate knowledge of security concepts for cloud services
Information Technology Competency Model 4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.13 Explain use of encryption technology, e.g., PKI, hard drive encryption, data encryption, encryption-at-rest, and secure communications protocols
Description

Objective:

This exam measures the learner's ability to accomplish the following technical tasks: manage Azure identities and governance; implement and manage storage; deploy and manage Azure compute resources; configure and manage virtual networking; and monitor and back up Azure resources.

Skills Measured:

Manage Azure identities and governance (15-20%)
Implement and manage storage (15-20%)
Deploy and manage Azure compute resources (20-25%)
Configure and manage virtual networking (25-30%)
Monitor and back up Azure resources (10-15%)
Instruction & Assessment
Supplemental Materials