{"id":18215,"date":"2025-01-01T21:55:47","date_gmt":"2025-01-01T21:55:47","guid":{"rendered":"https:\/\/www.eccentrix.ca\/?post_type=formation&#038;p=18215"},"modified":"2026-01-28T18:02:35","modified_gmt":"2026-01-28T18:02:35","slug":"configure-secure-access-to-your-workloads-using-azure-networking-az-1002","status":"publish","type":"formation","link":"https:\/\/www.eccentrix.ca\/en\/courses\/microsoft\/azure\/configure-secure-access-to-your-workloads-using-azure-networking-az-1002\/","title":{"rendered":"Configure secure access to your workloads using Azure networking (AZ-1002)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"18215\" class=\"elementor elementor-18215 elementor-18211\" data-elementor-post-type=\"formation\">\n\t\t\t\t<div class=\"elementor-element elementor-element-187a3842 e-flex e-con-boxed e-con e-parent\" data-id=\"187a3842\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4f8bcc88 e-con-full e-flex e-con e-child\" data-id=\"4f8bcc88\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-151f8ed0 elementor-widget elementor-widget-heading\" data-id=\"151f8ed0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Configure Secure Access to Your Workloads Using Azure Networking AZ-1002 Training Plan: Detailed Modules<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ffb4976 elementor-widget elementor-widget-accordion\" data-id=\"5ffb4976\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1611\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1611\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Module 1: Configure virtual networks<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1611\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1611\"><ul><li>Plan virtual networks<\/li><li>Create subnets<\/li><li>Create virtual networks<\/li><li>Plan IP addressing<\/li><li>Create public IP addressing<\/li><li>Associate public IP addresses<\/li><li>Allocate or assign private IP addresses<\/li><li>Interactive lab simulation<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1612\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1612\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Module 2: Configure Azure Virtual Network peering<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1612\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1612\"><ul><li>Introduction<\/li><li>Determine Azure Virtual Network peering uses<\/li><li>Determine gateway transit and connectivity<\/li><li>Create virtual network peering<\/li><li>Extend peering with user-defined routes and service chaining<\/li><li>Interactive lab simulation<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1613\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1613\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Module 3: Manage and control traffic flow in your Azure deployment with routes<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1613\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1613\"><ul><li>Introduction<\/li><li>Identify routing capabilities of an Azure virtual network<\/li><li>Exercise &#8211; Create custom routes<\/li><li>What is an NVA?<\/li><li>Exercise &#8211; Create an NVA and virtual machines<\/li><li>Exercise &#8211; Route traffic through the NVA<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1614\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1614\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Module 4: Host your domain on Azure DNS<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1614\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1614\"><ul><li>Introduction<\/li><li>What is Azure DNS?<\/li><li>Configure Azure DNS to host your domain<\/li><li>Exercise &#8211; Create a DNS zone and an A record by using Azure DNS<\/li><li>Exercise &#8211; Create alias records for Azure DNS<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1615\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1615\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Module 5: Configure network security groups<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1615\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1615\"><ul><li>Introduction<\/li><li>Implement network security groups<\/li><li>Determine network security group rules<\/li><li>Determine network security group effective rules<\/li><li>Create network security group rules<\/li><li>Implement application security groups<\/li><li>Interactive lab simulation<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1616\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1616\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Module 6: Introduction to Azure Firewall<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1616\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1616\"><ul><li>Introduction<\/li><li>What is Azure Firewall?<\/li><li>How Azure Firewall works<\/li><li>When to use Azure Firewall<\/li><li>When to use Azure Firewall Premium<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1617\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1617\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Module 7: Guided Project - Configure secure access to workloads with Azure virtual networking services<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1617\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1617\"><ul><li>Introduction<\/li><li>Exercise &#8211; Provide network isolation and segmentation for the web application<\/li><li>Exercise &#8211; Control the network traffic to and from the web application<\/li><li>Exercise &#8211; Protect the web application from malicious traffic and block unauthorized access<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35cc3827 e-con-full e-flex e-con e-child\" data-id=\"35cc3827\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c657973 elementor-widget elementor-widget-heading\" data-id=\"c657973\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Recommended prerequisite knowledge<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fc2b5ba elementor-widget elementor-widget-text-editor\" data-id=\"7fc2b5ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Experience with Azure and its networking services<\/li><li>Knowledge of networking principles<\/li><li>Understanding of network security concepts<\/li><li>Familiarity with cloud architectures\u00a0<\/li><li>Experience in network administration<\/li><li>Knowledge of routing protocols<\/li><li>Understanding of VPNs and ExpressRoute<\/li><li>Experience with firewalls and NSGs<\/li><li>Familiarity with hybrid connectivity<\/li><li>Knowledge of network segmentation principles<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ac2e67 elementor-widget elementor-widget-heading\" data-id=\"1ac2e67\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Credentials and certification<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a38314 elementor-widget elementor-widget-video\" data-id=\"5a38314\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/CTuSuXW5uVs&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a32ef8e elementor-widget elementor-widget-heading\" data-id=\"a32ef8e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Features<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1af76a6 elementor-widget elementor-widget-text-editor\" data-id=\"1af76a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Preparatory training for obtaining a Microsoft Applied Skills credential.<\/li><li>Performance is assessed through an interactive remote lab.<\/li><li>Duration: 120 minutes<\/li><li>Cost: $0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a58b851 elementor-widget elementor-widget-heading\" data-id=\"a58b851\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Assessment's technical tasks<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b14f9ec elementor-widget elementor-widget-text-editor\" data-id=\"b14f9ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"font-size-sm\">Create and configure virtual networks<\/li><li class=\"font-size-sm\">Configure network routing<\/li><li class=\"font-size-sm\">Create DNS zones and configure DNS settings<\/li><li class=\"font-size-sm\">Create and configure network security groups (NSGs)<\/li><li class=\"font-size-sm\">Create and configure Azure Firewall<\/li><\/ul><p><a href=\"https:\/\/learn.microsoft.com\/en-ca\/credentials\/applied-skills\/configure-secure-workloads-use-azure-virtual-networking\/\" target=\"_blank\" rel=\"noopener\">View all assessment details on Microsoft Learn &gt;&gt;<\/a><\/p><p><a href=\"https:\/\/arch-center.azureedge.net\/Credentials\/microsoft-applied-skills-poster.pdf\" target=\"_blank\" rel=\"noopener\" data-lf-fd-inspected-p1e024bk3xvagb6d=\"true\">Access the Microsoft Applied Skills Poster &gt;&gt;<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-333a24a1 e-flex e-con-boxed e-con e-parent\" data-id=\"333a24a1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74c45863 elementor-widget elementor-widget-heading\" data-id=\"74c45863\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eccentrix Corner Articles: Configure Secure Access Using Azure Networking AZ-1002 Resources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1805368 elementor-widget elementor-widget-text-editor\" data-id=\"1805368\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore our technical articles on Configure Secure Access to Your Workloads Using Azure Networking AZ-1002 published on Eccentrix Corner. These resources dive deeper into key concepts, share best practices, and provide practical guides to maximize your learning and success. Our experts share real-world insights to help you master configuring secure access with Azure networking.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-947ae4c elementor-grid-2 elementor-posts--thumbnail-left elementor-grid-tablet-1 elementor-posts--align-left elementor-grid-mobile-1 load-more-align-center elementor-widget elementor-widget-posts\" data-id=\"947ae4c\" data-element_type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;2&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:25,&quot;sizes&quot;:[]},&quot;pagination_type&quot;:&quot;load_more_on_click&quot;,&quot;classic_columns_tablet&quot;:&quot;1&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;load_more_spinner&quot;:{&quot;value&quot;:&quot;fas fa-spinner&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-32569 post type-post status-publish format-standard has-post-thumbnail hentry category-eccentrix-corner tag-certification\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/microsoft-certifications-vs-applied-skills-the-real-career-impact\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"72\" src=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2025\/03\/2025_03_07_Microsoft_Certifications_Applied_Skills_EccentrixCorner-1-300x72.png\" class=\"attachment-medium size-medium wp-image-31802\" alt=\"Image representing the Microsoft certifications and competencies - Eccentrix\" srcset=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2025\/03\/2025_03_07_Microsoft_Certifications_Applied_Skills_EccentrixCorner-1-300x72.png 300w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2025\/03\/2025_03_07_Microsoft_Certifications_Applied_Skills_EccentrixCorner-1-1024x245.png 1024w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2025\/03\/2025_03_07_Microsoft_Certifications_Applied_Skills_EccentrixCorner-1-768x184.png 768w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2025\/03\/2025_03_07_Microsoft_Certifications_Applied_Skills_EccentrixCorner-1-1536x368.png 1536w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2025\/03\/2025_03_07_Microsoft_Certifications_Applied_Skills_EccentrixCorner-1.png 1922w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/microsoft-certifications-vs-applied-skills-the-real-career-impact\/\">\n\t\t\t\tMicrosoft Certifications vs Applied Skills: The Real Career Impact\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-23871 post type-post status-publish format-standard has-post-thumbnail hentry category-eccentrix-corner tag-compliance-and-governance tag-cloud\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/securing-cloud-networks-a-comprehensive-implementation-guide\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"72\" src=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/12\/Securing-Cloud-Networks-Complete-Guide-300x72.png\" class=\"attachment-medium size-medium wp-image-23868\" alt=\"Image showing securing cloud networks with Zero Trust architectures, access management and advanced defense mechanisms \u2013 Eccentrix\" srcset=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/12\/Securing-Cloud-Networks-Complete-Guide-300x72.png 300w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/12\/Securing-Cloud-Networks-Complete-Guide-1024x245.png 1024w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/12\/Securing-Cloud-Networks-Complete-Guide-768x184.png 768w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/12\/Securing-Cloud-Networks-Complete-Guide-1536x368.png 1536w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/12\/Securing-Cloud-Networks-Complete-Guide.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/securing-cloud-networks-a-comprehensive-implementation-guide\/\">\n\t\t\t\tSecuring Cloud Networks: A Comprehensive Implementation Guide\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-20789 post type-post status-publish format-standard has-post-thumbnail hentry category-eccentrix-corner\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/the-concept-of-dmz-in-computer-networks\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"72\" src=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/11\/The-Concept-of-DMZ-in-Computer-Networks-300x72.jpg\" class=\"attachment-medium size-medium wp-image-20787\" alt=\"Image repr\u00e9sentant un pare-feu dans le cadre de la compr\u00e9hension du concept de DMZ dans les r\u00e9seaux - Eccentrix\" srcset=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/11\/The-Concept-of-DMZ-in-Computer-Networks-300x72.jpg 300w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/11\/The-Concept-of-DMZ-in-Computer-Networks-1024x245.jpg 1024w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/11\/The-Concept-of-DMZ-in-Computer-Networks-768x184.jpg 768w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/11\/The-Concept-of-DMZ-in-Computer-Networks-1536x368.jpg 1536w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/11\/The-Concept-of-DMZ-in-Computer-Networks.jpg 1922w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/the-concept-of-dmz-in-computer-networks\/\">\n\t\t\t\tThe Concept of DMZ in Computer Networks\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-12398 post type-post status-publish format-standard has-post-thumbnail hentry category-eccentrix-corner tag-cybersecurity tag-computer-networks\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/network-access-control-nac-in-secure-environments\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"72\" src=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/07\/network_access_control_nac_in_secure_environments-300x72.png\" class=\"attachment-medium size-medium wp-image-18116\" alt=\"A visual of a computer with security applied referring to Network Access Control - Eccentrix\" srcset=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/07\/network_access_control_nac_in_secure_environments-300x72.png 300w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/07\/network_access_control_nac_in_secure_environments-1024x245.png 1024w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/07\/network_access_control_nac_in_secure_environments-768x184.png 768w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/07\/network_access_control_nac_in_secure_environments-1536x368.png 1536w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/07\/network_access_control_nac_in_secure_environments.png 1922w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/network-access-control-nac-in-secure-environments\/\">\n\t\t\t\tNetwork Access Control (NAC) in Secure Environments\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-12425 post type-post status-publish format-standard has-post-thumbnail hentry category-eccentrix-corner tag-cloud tag-microsoft-azure tag-computer-networks\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/understanding-the-difference-between-vpn-and-vnet-peering-in-azure\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"72\" src=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/understanding_the_difference_between_vpn_and_vnet_peering_in_azure-300x72.png\" class=\"attachment-medium size-medium wp-image-18194\" alt=\"Image depicting a secure computer connection with VPN and VNet Peering in Azure - Eccentrix\" srcset=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/understanding_the_difference_between_vpn_and_vnet_peering_in_azure-300x72.png 300w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/understanding_the_difference_between_vpn_and_vnet_peering_in_azure-1024x245.png 1024w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/understanding_the_difference_between_vpn_and_vnet_peering_in_azure-768x184.png 768w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/understanding_the_difference_between_vpn_and_vnet_peering_in_azure-1536x368.png 1536w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/understanding_the_difference_between_vpn_and_vnet_peering_in_azure.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/understanding-the-difference-between-vpn-and-vnet-peering-in-azure\/\">\n\t\t\t\tUnderstanding the Difference Between VPN and VNet Peering in Azure\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2036 post type-post status-publish format-standard has-post-thumbnail hentry category-eccentrix-corner tag-cybersecurity tag-microsoft-azure\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/zero-trust-in-azure-security\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"72\" src=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/zero_trust_in_azure_security_image-300x72.png\" class=\"attachment-medium size-medium wp-image-1882\" alt=\"An illustration depicting the concept of Azure Zero Trust in the cloud - Eccentrix\" srcset=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/zero_trust_in_azure_security_image-300x72.png 300w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/zero_trust_in_azure_security_image-1024x245.png 1024w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/zero_trust_in_azure_security_image-768x184.png 768w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/zero_trust_in_azure_security_image-1536x368.png 1536w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/zero_trust_in_azure_security_image-2048x490.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/zero-trust-in-azure-security\/\">\n\t\t\t\tZero Trust in Azure Security\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2065 post type-post status-publish format-standard has-post-thumbnail hentry category-eccentrix-corner tag-certification tag-cybersecurity tag-ethical-hacking\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/navigating-the-cybersecurity-frontier-understanding-the-distinct-roles-of-ids-and-firewalls\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"72\" src=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/difference_entrees_ids_et_les_pare_feu_image_selectionnee-300x72.png\" class=\"attachment-medium size-medium wp-image-1853\" alt=\"A visual that helps distinguish between IDS and firewalls to protect the computer network - Eccentrix\" srcset=\"https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/difference_entrees_ids_et_les_pare_feu_image_selectionnee-300x72.png 300w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/difference_entrees_ids_et_les_pare_feu_image_selectionnee-1024x245.png 1024w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/difference_entrees_ids_et_les_pare_feu_image_selectionnee-768x184.png 768w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/difference_entrees_ids_et_les_pare_feu_image_selectionnee-1536x368.png 1536w, https:\/\/www.eccentrix.ca\/wp-content\/uploads\/2024\/06\/difference_entrees_ids_et_les_pare_feu_image_selectionnee-2048x490.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.eccentrix.ca\/en\/eccentrix-corner\/navigating-the-cybersecurity-frontier-understanding-the-distinct-roles-of-ids-and-firewalls\/\">\n\t\t\t\tNavigating the Cybersecurity Frontier: Understanding the Distinct Roles of IDS and Firewalls\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t<span class=\"e-load-more-spinner\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-spinner\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M304 48c0 26.51-21.49 48-48 48s-48-21.49-48-48 21.49-48 48-48 48 21.49 48 48zm-48 368c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zm208-208c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zM96 256c0-26.51-21.49-48-48-48S0 229.49 0 256s21.49 48 48 48 48-21.49 48-48zm12.922 99.078c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.491-48-48-48zm294.156 0c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.49-48-48-48zM108.922 60.922c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.491-48-48-48z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd656e2 e-flex e-con-boxed e-con e-parent\" data-id=\"bd656e2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dff19c elementor-widget elementor-widget-heading\" data-id=\"5dff19c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Networking Security Training<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-081779d elementor-widget elementor-widget-text-editor\" data-id=\"081779d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Azure Networking Security training is designed for IT professionals aiming to master network management in Azure to effectively secure their workloads. This hands-on course covers essential concepts such as creating virtual networks, configuring security rules, and integrating Azure&#8217;s native protection solutions.<\/p><p>By participating in this training, professionals will gain the necessary skills to optimize network connectivity while ensuring advanced protection for their cloud infrastructures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4102fc2 elementor-widget elementor-widget-heading\" data-id=\"4102fc2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why Take This Training?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2498eed elementor-widget elementor-widget-text-editor\" data-id=\"2498eed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a world where cybersecurity is a top priority, managing secure networks is crucial to ensure operational continuity and data protection. Azure provides a comprehensive range of networking tools to meet the needs of modern businesses. This course enables you to understand how to configure, manage, and secure your Azure networks to ensure reliable and secure connectivity.<\/p><p>This training will help you integrate advanced network security practices while maximizing the performance of your cloud workloads.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f21d092 elementor-widget elementor-widget-heading\" data-id=\"f21d092\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Skills Developed During the Training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bbfa99 elementor-widget elementor-widget-text-editor\" data-id=\"1bbfa99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><p>Creating and Configuring Azure Virtual Networks<br \/>Learn how to design virtual networks tailored to your organization&#8217;s needs.<\/p><\/li><li><p>Managing Subnets and IP Addresses<br \/>Discover how to assign, configure, and manage subnets to optimize network efficiency.<\/p><\/li><li><p>Configuring Network Security Groups (NSGs)<br \/>Learn how to define and apply network security rules to protect your workloads.<\/p><\/li><li><p>Implementing Hybrid Connections<br \/>Explore connectivity solutions such as VPN gateways and Azure ExpressRoute.<\/p><\/li><li><p>Monitoring and Managing Networks<br \/>Use Azure&#8217;s native tools to monitor network performance and diagnose issues.<\/p><\/li><li><p>Protecting Workloads with Advanced Solutions<br \/>Integrate Azure Firewall, Azure Bastion, and other services for enhanced network security.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a6935e elementor-widget elementor-widget-heading\" data-id=\"1a6935e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A Practical and Results-Oriented Training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5be15ab elementor-widget elementor-widget-text-editor\" data-id=\"5be15ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Led by Azure-certified experts, this course provides a balance between theory and practice. Through real-world case studies and interactive exercises, you will learn to apply your knowledge to solve complex network management challenges in Azure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de3e633 elementor-widget elementor-widget-heading\" data-id=\"de3e633\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Who Should Attend?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3484096 elementor-widget elementor-widget-text-editor\" data-id=\"3484096\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Network administrators looking to enhance their Azure management skills<\/li><li>IT professionals responsible for network security and connectivity<\/li><li>Cloud specialists managing Azure infrastructures<\/li><li>Anyone interested in cloud network security and management<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-030a03d elementor-widget elementor-widget-heading\" data-id=\"030a03d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Optimize Your Azure Network Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05a3226 elementor-widget elementor-widget-text-editor\" data-id=\"05a3226\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Configure Secure Access to Your Workloads Using Azure Networks (AZ-1002) training is ideal for developing your skills in network management and cloud security. Join us today to learn how to protect your workloads and ensure reliable connectivity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-adff388 e-flex e-con-boxed e-con e-parent\" data-id=\"adff388\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d193f32 elementor-widget elementor-widget-heading\" data-id=\"d193f32\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently asked questions - Azure network security training (FAQ)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a4fe42 e-flex e-con-boxed e-con e-parent\" data-id=\"6a4fe42\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9cec2e4 elementor-widget elementor-widget-accordion\" data-id=\"9cec2e4\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1641\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1641\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What topics are covered in this training?<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1641\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1641\"><p>Creating virtual networks, configuring security rules, managing hybrid connections, and advanced protection solutions.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1642\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1642\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Are prior Azure skills required?<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1642\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1642\"><p>A basic understanding of Azure and networking concepts is recommended.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1643\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1643\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Does the training include practical exercises?<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1643\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1643\"><p>Yes, interactive scenarios and case studies are included throughout the course.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1644\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1644\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What Azure tools will be covered?<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1644\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1644\"><p>Azure Portal, Azure Network Watcher, Azure Firewall, and other native tools.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1645\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1645\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Does this training help reduce security risks?<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1645\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1645\"><p>Absolutely, it focuses on best practices and solutions to strengthen network security.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1646\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1646\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Is it suitable for hybrid environments?<\/a>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\t<div id=\"elementor-tab-content-1646\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1646\"><p>Yes, the training includes solutions to integrate Azure networks with on-premises infrastructures.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What topics are covered in this training?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Creating virtual networks, configuring security rules, managing hybrid connections, and advanced protection solutions.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Are prior Azure skills required?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A basic understanding of Azure and networking concepts is recommended.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Does the training include practical exercises?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Yes, interactive scenarios and case studies are included throughout the course.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What Azure tools will be covered?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Azure Portal, Azure Network Watcher, Azure Firewall, and other native tools.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Does this training help reduce security risks?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Absolutely, it focuses on best practices and solutions to strengthen network security.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Is it suitable for hybrid environments?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Yes, the training includes solutions to integrate Azure networks with on-premises infrastructures.<\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"template":"","role":[127,138,129],"formations":[115,194,114,187],"class_list":["post-18215","formation","type-formation","status-publish","hentry","role-systems-and-networks-specialist","role-cloud-security-specialist","role-cloud-administrator","formations-azure","formations-microsoft-applied-skills","formations-microsoft","formations-cloud"],"_links":{"self":[{"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/formation\/18215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/formation"}],"about":[{"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/types\/formation"}],"version-history":[{"count":39,"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/formation\/18215\/revisions"}],"predecessor-version":[{"id":52932,"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/formation\/18215\/revisions\/52932"}],"wp:attachment":[{"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/media?parent=18215"}],"wp:term":[{"taxonomy":"role","embeddable":true,"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/role?post=18215"},{"taxonomy":"formations","embeddable":true,"href":"https:\/\/www.eccentrix.ca\/en\/wp-json\/wp\/v2\/formations?post=18215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}