ARCHWIKI
about
go to courses
Search Term
Course Catalog | IT Architecture Wiki
Course Catalog
A comprehensive roadmap for modern IT Architect
Architecture Practice
Modern Enterprise Architecture
Enterprise Architecture Frameworks
Architecture Governance and Decision-Making
Stakeholder Management and Communication
Architecture Documentation Standards
Enterprise Architecture Tools
Business-IT Alignment Principles
Architecture Maturity Models
ITSM Essentials for Architects
Governance & Decisions
Architecture Review Boards (ARB)
Architecture Decision Records (ADR)
Reference Architecture Development
Standards and Guidelines
Technology Radar
Architecture Debt Management
Innovation vs Standardization Balance
Global Architecture Coordination
Cost Management & FinOps
Cloud Cost Optimization Strategies
FinOps Framework Implementation
Total Cost of Ownership (TCO)
Resource Tagging and Chargeback
Green IT and Sustainability
Skills & Team Building
Architecture Skills Framework
Architecture Community of Practice
Mentoring and Career Development
Cross-Functional Collaboration
Core Infrastructure
Servers
Hardware Specifications and Sizing
Server Operating Systems
Virtualization Technologies
Server Hardening & Security
Lifecycle Management
Networking
Network Topologies
Modern Data Center Topologies
Network Security Architecture
SDN and Microsegmentation
Network Automation
Storage
Storage Technologies (SAN/NAS/DAS)
Data Protection Strategies
Performance Optimization & Tiering
Software-Defined Storage (SDS)
Deduplication & Compression
Cloud Computing
Service Models
IaaS, PaaS, SaaS Patterns
FaaS and Serverless Computing
Container as a Service (CaaS)
DaaS and VDI
Deployment Strategy
Public, Private, Hybrid Cloud
Multi-Cloud Strategy
Cloud Native Principles
12-Factor App Methodology
Cloud Migration Strategies
Major Providers
AWS Services Overview
Azure Platform Services
GCP Services Overview
Provider Selection & Lock-in Prevention
Security Architecture
Frameworks
Zero Trust Architecture
IAM and PAM
SIEM & SOAR Integration
Vulnerability Management
Threat Management
Threat Intelligence
Ransomware Mitigation
AppSec (SAST/DAST/RASP)
Supply Chain Security
Compliance
GDPR & Data Privacy
PCI DSS & HIPAA
SOC 2 & FedRAMP
DLP Architecture
IaC & Platform Eng
Infrastructure as Code
Terraform, Ansible, Bicep
Pulumi Modern IaC
GitOps Pipeline Integration
Config Mgmt & GitOps
Git-based Configuration
CI/CD Automated Testing
Environment Management
SRE Principles
Platform Engineering
Internal Developer Platform (IDP)
Kubernetes & Docker
Service Mesh Architecture
Container Security
Observability
Monitoring
Three Pillars of Observability
APM and Synthetic Monitoring
Distributed Tracing
Logging
ELK & Splunk Architecture
Log Analysis & Correlation
Retention Policies
Alerting
Alerting Strategy & Thresholds
Incident Response Automation
SLOs and Error Budgets
Resilience & BC
High Availability
SLA Design & Load Balancing
Clustering Strategies
Chaos Engineering
Scalability Patterns
Vertical vs Horizontal Scaling
Caching Architectures
Database Sharding
Disaster Recovery
RTO/RPO Development
Backup 3-2-1 Rule
Cross-Region DR
Business Impact Analysis
Microservices
Design & Patterns
DDD and Bounded Contexts
API Gateway Patterns
REST, gRPC, GraphQL
Event-Driven Architecture
Container Security
Image Scanning
Runtime Security
Network Policies
Edge Computing
Edge Design Patterns
IoT Architecture
5G Integration
Data Architecture
Strategy & Gov
Master Data Management (MDM)
Data Cataloging
DataOps
Operational DBs
Relational vs NoSQL
Polyglot Persistence
Distributed SQL
Modern Data Platforms
Lakehouse vs Data Mesh
Real-Time Streaming
Feature Stores for ML
Analytics & AI
MLOps Architecture
Real-Time Analytics
Responsible AI
Next-Gen Tech
AI Infrastructure
GPU Computing
LLM Infrastructure
Federated Learning
AI Ethics & Governance
Emerging Tech
Enterprise Blockchain
Quantum-Safe Cryptography
Quantum Cloud Services