Cloud Adoptation Framework

English Intermediate Other

Plan your cloud journey with assessments that help you measure the difference between your current state and cloud adoption goals. Assessment results provide curated technical guidance to help you reach your goals.


Sabbir Rubayat

Contessa Solutions and Consultant Limited

An experienced Cloud Solutions Architect, responsible for design and developing cloud and cyber security strategic plans to enhance the organizational key information security objectives and control frameworks to maximize productivity. My objective is to obtain a challenging position in an organization where innovation is required. I want to work on a position where solution to a problem is encouraged from concept to implementation. I want to work at such a workplace where passion can drive my working and where I can contribute with my best. Highlights: Microsoft Modern Workplace Enterprise Mobility + Security • Microsoft 365 • Exchange Online • Microsoft Team • SharePoint Online • Hybrid Exchange • Defender for O365 • Yammer • Stream • Microsoft Intune • Endpoint Manager • Microsoft Defender for Endpoint • Microsoft Information Protection • Conditional Access Policy • Microsoft Identity Protection • Advanced Threat Analytics Operating System Cyber Security • Windows Server 2022 • Windows Server 2019 • Windows Server 2016 • Windows Server 2012 • Windows Server 2008 • Red Hat Enterprise Linux 6, 7 • Ubuntu 14, 16, • Kali Linux • Windows XP, 7, 8, 10, 11 • Vulnerability Assessment & Penetration Testing (VAPT) • Privileged Access Management (PAM), • Endpoint Security Management (Defender, WithSecure, TrendMicro) • SIEM & SOC (Splunk and Azure Sentinel) • Advanced Threat Protection • Cyber Security Risk Assessment (CSRA) • IT policy and Flamework development Log Analysis Analyzer Tools • Fiddler Logs, • netmon logs, • PSR Logs, • Message Header, • Message Trace, • Debug logs, • Media logs, • Desktop logs • Audit logs • Telerik® Fiddler • Microsoft Remote Connectivity Analyzer • Nessus • WithSecure™ Elements • Nmap • Wireshark • John the Ripper • Burp Suite • Metasploit (Rapid7) • OWASP-ZAP • Sqlmap • Hydra • Aircrack-ng

Code of Conduct

We seek to provide a respectful, friendly, professional experience for everyone, regardless of gender, sexual orientation, physical appearance, disability, age, race or religion. We do not tolerate any behavior that is harassing or degrading to any individual, in any form. The Code of Conduct will be enforced.

Who does this Code of Conduct apply to?

All live stream organizers using the Global Azure brand and Global Azure speakers are responsible for knowing and abiding by these standards. Each speaker who wishes to submit through our Call for Presentations needs to read and accept the Code of Conduct. We encourage every organizer and attendee to assist in creating a welcoming and safe environment. Live stream organizers are required to inform and enforce the Code of Conduct if they accept community content to their stream.

Where can I get help?

If you are being harassed, notice that someone else is being harassed, or have any other concerns, report it. Please report any concerns, suspicious or disruptive activity or behavior directly to any of the live stream organizers, or directly to the Global Azure admins at All reports to the Global admin team will remain confidential.

Code of Conduct for local live streams

We expect local organizers to set up and enforce a Code of Conduct for all Global Azure live stream.

A good template can be found at, including internationalized versions at An excellent version of a Code of Conduct, not a template, is built by the DDD Europe conference at