Data Factory & Synapse
Use ADLS, SQL Server, and Azure Data Factory with managed identity, along with Synapse Serverless SQL, to securely store, process, and query data and analytics workflows.
View
Loading...
Explore our Azure Cloud projects below, each designed to demonstrate real-world deployments with clear, step-by-step instructions.
Use ADLS, SQL Server, and Azure Data Factory with managed identity, along with Synapse Serverless SQL, to securely store, process, and query data and analytics workflows.
View
Build a secure and automated Azure data pipeline that efficiently ingests data to ADLS with Data Factory, transforms it with Databricks, and analyzes it in Synapse.
View
Securing Azure SQL Database with Microsoft Defender, Dynamic Data Masking, Always Encrypted, Data Discovery & Classification, and Auditing.
View
Deploy Sentinel with Log Analytics, connect VMs via AMA, enable detections, automate RDP and PowerShell responses, and optionally block Entra ID users.
View
Visualize SQL data with Pie and Map charts in Power BI to identify top sellers and regions, and connect to Azure Log Analytics via the Kusto connector to display security alerts by severity with a Donut chart.
View
Azure AD Connect serves as the essential bridge between your on-premises AD and Microsoft Entra ID. This allows a seamless single sign-on experience without creating separate cloud passwords.
View
In this section, we will build a Site-to-Site (S2S) VPN between Azure and an on-premises environment using Azure VPN Gateway and Windows Server RRAS.
View
This guide shows how to configure end-to-end connectivity in a hybrid hub-and-spoke topology using Azure Virtual networks and an on-premises network.
View
This guide demonstrates how to deploy a secure Azure Point-to-Site (P2S) VPN using Microsoft Entra ID authentication.
View
Configuring a VNet-to-VNet VPN in Azure using route-based gateways, shared keys, redundant connection setups, and testing secure cross-region connectivity.
View
Securing Azure Storage and VM access using private endpoints, IP restrictions, VM managed identity with Key Vault, and accessing storage via Azure Storage Explorer.
View
Creating a DNS zone in Azure, adding DNS records efficiently and securely, managing DNS settings effectively, and validating global name resolution.
View
Creating a secure Azure environment with a virtual network, availability set, Bastion, NSGs, ASGs, IIS installation, and a load balancer for high availability and RDP protection.
View
Deploying a segmented Azure virtual network with a firewall-enforced outbound path, using custom routes, DNS rules, and application rule restrictions.
View
Building Docker images on an Azure Linux VM, installing Docker, configuring containers seamlessly, and securely pushing images to a private Azure Container Registry.
View
Configure PIM to assign a User Administrator role, set up a Log Analytics workspace, enable PIM audit logs, integrate Monitor and Entra ID logs, and verify them in Log Analytics.
View
Configure MFA with Conditional Access, bypass settings, enable SSPR and Identity Protection, and optionally create groups with role assignments and P2 license assignment.
View
Deploy Microsoft Defender for Cloud with tailored security policies, Just-In-Time (JIT) access, advanced malware detection, and additional cloud security protections.
View
Deploying an ASP.NET Framework 4.8 application to Azure using Visual Studio, configuring deployment settings efficiently, and testing it on a live Azure Web App.
View
Deploying Azure File Sync by connecting an SMB file share with two Windows Servers using the Storage Sync Service, sync groups, and endpoint validation.
View
Securely Build and Deploy Intelligent Azure AI Applications in Visual Studio by Integrating Azure Key Vault for Credential, Secret Management and output verification.
View
Provision, Configure, Deploy, and Fully Manage a Secure and Highly Available Azure Storage Account End-to-End Using Terraform Infrastructure as Code.
View
Create a virtual machine, load balancer, Azure Static Web Apps, Batch account, Azure DNS zone and record using an Azure ARM (Azure Resource Manager) template.
View
Create a Windows Virtual Machine, NIC, Subnet, Storage Account, Public IP, NSG, Azure DNS Zone and Record, and VNet fully provisioned using a Bicep file.
View
use Visual Studio Code to deploy and manage Azure resources, set up disaster recovery to another region, test failover, and assign a public IP to the replicated VM.
View
Building a Windows Active Directory Lab with Internet Access. This lab simulates a minimal on-premises Active Directory environment required for hybrid Azure and identity security scenarios.
View
Deploying an ASP.NET Framework 4.8 application to Azure using Visual Studio, configuring deployment settings efficiently, and testing it on a live Azure Web App.
View
A complete DevOps setup for configuring self-hosted agents, running YAML pipelines, managing secrets, and sending secure notifications via SendGrid.
View
Deploy and manage Azure resources using IaC with Azure DevOps. Learn to run pipelines, use Bicep templates, and manage updates via pull requests.
View
Preparing data for analysis is a critical first step in any data project. It ensures that the data is clean, consistent, and structured in a way that makes analysis accurate and efficient.
View
Optimized a data model with relationships, Date tables, and DAX measures; drove YTD revenue analysis using Time Intelligence, leveraged CALCULATE for complex filters, and enhanced performance via Performance Analyzer.
View
This guide covers creating and customizing visuals, applying filters and slicers, using themes consistently, and implementing page navigation to build interactive, professional reports.
View
By following these steps, you will have a fully configured Power BI environment that is secure, collaborative, and insight-driven. Users can interact with dashboards, receive timely alerts, and view only the data they are authorized to access.
View
This project demonstrates an end-to-end Microsoft Fabric implementation.
View