Skip to main content

Infrastructure Management in Technical management

$249.00
Your guarantee:
30-day money-back guarantee — no questions asked
How you learn:
Self-paced • Lifetime updates
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
When you get access:
Course access is prepared after purchase and delivered via email
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

This curriculum spans the full lifecycle of enterprise infrastructure management, comparable in scope to a multi-workshop operational readiness program, addressing strategic planning, physical and cloud operations, network and storage architecture, change governance, and audit-aligned security practices across complex, distributed environments.

Module 1: Strategic Infrastructure Planning and Alignment

  • Define infrastructure capacity thresholds based on business growth projections and peak workload analysis to avoid overprovisioning or performance bottlenecks.
  • Select between on-premises, hybrid, and cloud-first deployment models by evaluating data sovereignty requirements, latency constraints, and long-term TCO.
  • Negotiate SLAs with internal stakeholders to align infrastructure availability targets with business-critical application uptime needs.
  • Develop a technology refresh roadmap that balances vendor end-of-life timelines with capital expenditure cycles and security compliance.
  • Integrate infrastructure planning with enterprise architecture governance to ensure adherence to approved technology standards and interoperability.
  • Conduct risk impact assessments for single points of failure in core infrastructure components, including network backbones and power distribution.

Module 2: Data Center Operations and Physical Infrastructure

  • Implement power usage effectiveness (PUE) monitoring to optimize cooling and electrical load distribution across server racks.
  • Design cable management and rack layout standards to support rapid hardware replacement and minimize airflow obstruction.
  • Enforce change control procedures for physical access to data center floors, including biometric logging and escort requirements.
  • Coordinate scheduled maintenance windows with application teams to minimize disruption during hardware firmware updates or UPS testing.
  • Deploy environmental sensors for real-time monitoring of temperature, humidity, and water leakage in critical zones.
  • Establish asset tagging and lifecycle tracking for all physical devices to support warranty claims and decommissioning audits.

Module 3: Cloud and Virtualization Management

  • Configure VM density ratios based on host memory, CPU contention, and I/O throughput to maintain performance isolation across tenants.
  • Implement tagging policies for cloud resources to enable accurate cost allocation and identify orphaned instances.
  • Enforce network segmentation in virtual environments using VLANs or micro-segmentation to limit lateral threat movement.
  • Define auto-scaling policies using performance baselines and forecasted demand to balance responsiveness with cost.
  • Select storage tiering strategies (e.g., SSD vs. HDD, cold vs. hot blob) based on access frequency and recovery time objectives.
  • Manage hypervisor patching cycles with live migration to avoid unplanned VM downtime during maintenance.

Module 4: Network Infrastructure and Connectivity

  • Design redundant WAN links with failover routing protocols (e.g., BGP) to maintain connectivity during ISP outages.
  • Implement QoS policies to prioritize VoIP and video conferencing traffic over bulk data transfers.
  • Configure firewall rule sets using least-privilege access and conduct quarterly rule reviews to remove obsolete entries.
  • Deploy network performance monitoring tools to detect latency spikes and jitter in real time across distributed sites.
  • Standardize VLAN and IP address allocation across sites to support consistent policy enforcement and troubleshooting.
  • Negotiate circuit provisioning lead times with carriers to meet infrastructure deployment timelines for new offices.

Module 5: Storage and Data Management

  • Design backup retention schedules based on regulatory requirements, RPOs, and available storage capacity.
  • Implement tiered storage architectures using automated data migration between high-performance and archival systems.
  • Configure multipathing for SAN connectivity to ensure path redundancy and load balancing during HBA failures.
  • Validate snapshot consistency for database workloads by coordinating with application teams during backup execution.
  • Monitor storage array performance metrics such as IOPS, latency, and queue depth to identify bottlenecks.
  • Enforce encryption for data at rest on NAS and SAN systems using FIPS-compliant key management practices.

Module 6: Monitoring, Alerting, and Incident Response

  • Define alert severity levels and escalation paths to prevent alert fatigue and ensure timely response to critical events.
  • Integrate infrastructure monitoring tools with ticketing systems to automate incident creation for threshold breaches.
  • Establish baseline performance metrics for CPU, memory, disk, and network to detect anomalous behavior.
  • Configure synthetic transaction monitoring to simulate user activity and proactively identify application degradation.
  • Conduct post-incident reviews to document root cause and update runbooks for recurring infrastructure failures.
  • Validate monitoring coverage across all critical systems, including third-party SaaS platforms with API-based checks.

Module 7: Change and Configuration Management

  • Enforce change advisory board (CAB) review for all infrastructure changes impacting production environments.
  • Maintain a configuration management database (CMDB) with automated discovery tools to track system dependencies.
  • Implement rollback procedures for failed firmware or driver updates on core networking and storage devices.
  • Use infrastructure-as-code (IaC) templates to standardize provisioning and reduce configuration drift.
  • Track configuration changes using version control to support audit compliance and forensic investigations.
  • Coordinate change windows with business units to avoid conflicts with peak transaction periods or reporting cycles.

Module 8: Compliance, Security, and Audit Readiness

  • Conduct periodic access reviews for administrative accounts on servers, network devices, and cloud platforms.
  • Implement secure configuration baselines (e.g., CIS benchmarks) for all infrastructure components.
  • Preserve system logs for required retention periods and ensure log integrity using write-once storage or hashing.
  • Prepare infrastructure documentation for external audits, including network diagrams and data flow maps.
  • Enforce multi-factor authentication for remote access to infrastructure management interfaces.
  • Validate physical and logical segregation of duties between operations, security, and development teams.