Skip to main content

Infrastructure Management in Application Management

$249.00
How you learn:
Self-paced • Lifetime updates
When you get access:
Course access is prepared after purchase and delivered via email
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Adding to cart… The item has been added

This curriculum spans the technical and operational rigor of a multi-workshop infrastructure transformation program, addressing the same scope of decisions and trade-offs encountered in enterprise-wide virtualization rollouts, cloud migration planning, and compliance-driven operations.

Module 1: Strategic Infrastructure Planning and Alignment

  • Selecting between on-premises, hybrid, and cloud-first deployment models based on regulatory, latency, and data sovereignty requirements.
  • Defining service-level objectives (SLOs) in collaboration with business units to align infrastructure capacity with application performance expectations.
  • Conducting total cost of ownership (TCO) analysis across refresh cycles for hardware, software licensing, and operational staffing.
  • Establishing infrastructure lifecycle management policies, including refresh intervals, end-of-support tracking, and vendor exit strategies.
  • Integrating infrastructure planning with application release roadmaps to avoid bottlenecks during peak deployment periods.
  • Negotiating vendor SLAs for hardware delivery, support response times, and replacement logistics under enterprise contracts.

Module 2: Compute and Virtualization Management

  • Right-sizing virtual machines and containers based on application workload profiling and historical utilization metrics.
  • Implementing live migration and high availability policies in VMware or Hyper-V environments with minimal application disruption.
  • Designing anti-affinity rules to prevent critical workloads from co-residing on the same physical host.
  • Managing firmware and hypervisor patching schedules to balance security compliance with application uptime requirements.
  • Enforcing resource reservations and limits to prevent noisy neighbor scenarios in shared environments.
  • Validating backup and restore procedures for VM templates and golden images used in automated provisioning.

Module 3: Storage Architecture and Data Management

  • Classifying data by performance, retention, and compliance needs to assign appropriate storage tiers (SSD, SAS, SATA, object).
  • Designing RAID configurations and storage redundancy schemes based on application I/O patterns and fault tolerance requirements.
  • Implementing storage quality of service (QoS) policies to prioritize mission-critical application data paths.
  • Managing storage capacity forecasting and auto-tiering policies to prevent performance degradation during growth spikes.
  • Integrating storage snapshots and replication with application-consistent backup processes using VSS or equivalent frameworks.
  • Enforcing data retention and deletion policies in alignment with legal holds and regulatory obligations.

Module 4: Network Infrastructure for Application Delivery

  • Designing VLAN segmentation and subnet allocation to isolate application tiers and enforce least-privilege access.
  • Configuring load balancer persistence and health checks to maintain session integrity during rolling application updates.
  • Implementing DNS failover and traffic routing policies to support geographically distributed application instances.
  • Monitoring network latency and packet loss between application and database tiers to diagnose performance bottlenecks.
  • Enabling jumbo frames and adjusting MTU settings across switches and firewalls to optimize throughput for large data transfers.
  • Coordinating firewall rule changes with change advisory boards (CAB) to minimize exposure windows during maintenance.

Module 5: High Availability and Disaster Recovery

  • Designing active-passive versus active-active failover architectures based on RTO and RPO requirements.
  • Validating failover runbooks through scheduled DR drills without impacting production workloads.
  • Replicating critical databases using synchronous or asynchronous methods depending on distance and consistency needs.
  • Storing backup media offsite or in isolated cloud regions to protect against regional outages or cyberattacks.
  • Documenting dependencies between applications, middleware, and infrastructure components for accurate recovery sequencing.
  • Testing backup integrity by restoring to isolated environments and verifying application functionality post-recovery.

Module 6: Monitoring, Logging, and Performance Tuning

  • Deploying agents or agentless monitoring based on security policies and OS support constraints.
  • Setting dynamic thresholds for CPU, memory, and disk utilization to reduce false alerts during peak loads.
  • Correlating infrastructure metrics with application logs to identify root causes of performance degradation.
  • Managing log retention periods and indexing strategies to balance search performance with storage costs.
  • Integrating monitoring alerts with incident management systems using standardized event formats and deduplication rules.
  • Conducting capacity trend analysis to forecast resource exhaustion and plan scaling actions proactively.

Module 7: Security and Compliance in Infrastructure Operations

  • Hardening OS images using CIS benchmarks and removing unnecessary services before deployment.
  • Implementing role-based access control (RBAC) for infrastructure management tools to enforce segregation of duties.
  • Rotating service account credentials and SSH keys on a defined schedule with automated rotation tools.
  • Conducting vulnerability scans on infrastructure components and prioritizing remediation based on exploitability and exposure.
  • Generating audit trails for configuration changes using version-controlled infrastructure-as-code repositories.
  • Aligning patch management cycles with compliance frameworks such as PCI-DSS, HIPAA, or SOX.

Module 8: Automation and Infrastructure as Code (IaC)

  • Selecting between Terraform, Ansible, or CloudFormation based on multi-cloud needs and team expertise.
  • Designing reusable IaC modules with parameterized inputs for consistent deployment across environments.
  • Implementing CI/CD pipelines for infrastructure changes with automated testing and approval gates.
  • Managing state files securely and enabling state locking to prevent concurrent modification conflicts.
  • Drift detection and remediation strategies to maintain alignment between declared and actual infrastructure state.
  • Versioning infrastructure configurations alongside application code to enable reproducible environments.