Curriculum Overview: Azure Compute and Networking Services
Describe Azure compute and networking services
Curriculum Overview: Azure Compute and Networking Services
This document provides a structured roadmap for mastering Skill 2.2 of the AZ-900: Microsoft Azure Fundamentals certification. It focuses on the core infrastructure services that power applications and connectivity in the Azure cloud.
Prerequisites
Before diving into compute and networking, learners should have a foundational understanding of the following:
- Cloud Concepts: Understanding of IaaS, PaaS, and SaaS models, as well as the Shared Responsibility Model.
- Azure Hierarchy: Familiarity with the relationship between Management Groups, Subscriptions, and Resource Groups.
- Basic Virtualization: A general understanding of what a virtual machine is and how it differs from physical hardware.
- Networking Basics: Familiarity with IP addressing, DNS, and the general concept of a firewall.
[!IMPORTANT] You cannot create Azure compute or networking resources without a Resource Group. All resources must reside within a group for management and billing purposes.
Module Breakdown
| Module ID | Topic Area | Focus | Difficulty | Est. Time |
|---|---|---|---|---|
| MOD-01 | Virtual Machines & Desktop | Windows/Linux VMs, Scale Sets, and Azure Virtual Desktop (AVD) | Moderate | 45 mins |
| MOD-02 | Application Hosting | App Service, Containers (ACI/AKS), and Serverless Functions | Moderate | 40 mins |
| MOD-03 | Virtual Networking | VNets, Subnets, and DNS | Complex | 60 mins |
| MOD-04 | Hybrid Connectivity | VPN Gateways, ExpressRoute, and Peering | Complex | 30 mins |
| MOD-05 | Secure Access | Public vs. Private Endpoints | Moderate | 20 mins |
Learning Objectives per Module
MOD-01 & MOD-02: Compute Services
In these modules, you will learn to select the right compute power for specific workloads.
- Compare Compute Types: Differentiate between Virtual Machines (IaaS), App Services (PaaS), and Azure Functions (Serverless).
- Scalability: Understand how Virtual Machine Scale Sets provide automatic scaling and high availability.
- Containerization: Describe the purpose of Azure Container Instances (ACI) and Azure Kubernetes Service (AKS).
MOD-03 & MOD-04: Networking Services
These modules cover how resources talk to each other and the outside world.
- Isolation: Define the role of Virtual Networks (VNets) and Subnets in isolating cloud resources.
- Connectivity: Compare VPN Gateway (encrypted over public internet) vs. ExpressRoute (private, dedicated connection).
- Resolution: Understand how Azure DNS manages domain names within the cloud infrastructure.
MOD-05: Secure Endpoints
- Public Endpoints: Used for resources that need to be accessible from the internet.
- Private Endpoints: Used to provide a private IP address to an Azure service, ensuring traffic never leaves the Microsoft network.
Success Metrics
To verify mastery of this curriculum, the learner should be able to:
- Selection Logic: Explain why a company would choose Azure App Service over a Virtual Machine for a standard web application.
- Architecture Mapping: Diagram a simple VNet with two subnets and explain how they communicate via Peering.
- Connectivity Comparison: List three key differences between a Site-to-Site VPN and ExpressRoute (e.g., speed, security, cost).
- Resiliency Planning: Define how Availability Sets and Scale Sets protect against hardware failure and traffic spikes.
Real-World Application
Understanding these services is critical for several career paths:
- Cloud Administrators: Use these skills to provision resources, manage virtual networks, and ensure secure connectivity between on-premises offices and the cloud.
- Solutions Architects: Use this knowledge to design cost-effective and resilient systems, choosing the right compute tier (e.g., Serverless vs. VMs) to meet business requirements.
- DevOps Engineers: Leverage Azure App Service and Container services to automate the deployment of applications without managing underlying server hardware.
[!TIP] In a real-world production environment, always use Private Endpoints for database access to minimize the attack surface of your application.
Visualizing a Simple Virtual Network
\begin{tikzpicture}[node distance=2cm, every node/.style={rectangle, draw, rounded corners, fill=blue!10, minimum width=3cm, minimum height=1cm, align=center}]
% VNet Boundary
\draw[dashed, thick, blue!50] (-1,-1) rectangle (8,5);
\node[draw=none, fill=none] at (3.5, 4.7) {\textbf{Azure Virtual Network (VNet)}};
% Subnet 1
\node (sub1) at (1.5, 3) {\textbf{Public Subnet}\\10.0.1.0/24};
\node (vm1) [below of=sub1, node distance=1.5cm, fill=green!10] {Web Server (VM)};
% Subnet 2
\node (sub2) at (5.5, 3) {\textbf{Private Subnet}\\10.0.2.0/24};
\node (db1) [below of=sub2, node distance=1.5cm, fill=red!10] {Database (SQL)};
% Connections
\draw[<->, thick] (vm1) -- (db1) node[midway, above] {Internal Traffic};\end{tikzpicture}
Figure 1: High-level overview of a segmented Azure VNet structure using subnets for security isolation.