AZ-305 Certification: A Comprehensive Study Plan
Embark on a focused journey to master Azure infrastructure design, leveraging study guides and lab resources, including VPN and peering topologies for optimal exam preparation.

Overview of the AZ-305 Exam
The AZ-305 certification validates your expertise in architecting robust and scalable solutions on Microsoft Azure. This exam assesses your ability to translate business requirements into well-designed Azure infrastructures, encompassing compute, networking, identity, governance, security, and monitoring. Candidates should demonstrate a deep understanding of core Azure services and cloud architecture principles.
Preparation involves mastering the design and implementation of high-availability and disaster recovery strategies, alongside secure networking configurations. The exam focuses on integrating these services to meet modern business demands and facilitate seamless migrations. Numerous study guides and resources, often available in PDF format, are designed to help you prepare effectively. Success requires proving subject matter expertise in both cloud and hybrid solution design.
Target Audience and Prerequisites
This AZ-305 certification is ideally suited for cloud engineers, IT professionals, and solutions architects aiming to earn the Microsoft Certified: Azure Solutions Architect Expert credential. Individuals responsible for designing and implementing Azure infrastructure solutions will greatly benefit from this certification path. While formal prerequisites aren’t strictly enforced, a foundational understanding of cloud concepts and experience with Azure services are highly recommended.
Beneficial experience includes working with compute, networking, storage, and security within Azure. Familiarity with identity and governance solutions, such as Azure Active Directory and RBAC, is also crucial. Many preparation resources, including comprehensive PDF study guides, assume a basic level of Azure knowledge. Prior experience with related Microsoft certifications can be advantageous, but isn’t mandatory for success.

Designing Azure Infrastructure Solutions
Master core service integration – compute, networking, identity, and governance – to build highly available, seamlessly migrating enterprise infrastructures within the Azure ecosystem.
Compute Solutions Design
Designing robust compute solutions for Azure requires a deep understanding of virtual machines, Azure Kubernetes Service (AKS), Azure Functions, and Azure Container Instances. Candidates must be proficient in selecting the appropriate compute service based on application requirements, considering factors like scalability, cost, and performance.
This includes architecting solutions for high availability, utilizing availability zones and virtual machine scale sets. Furthermore, understanding containerization strategies and serverless computing paradigms is crucial. The AZ-305 exam assesses your ability to design solutions that optimize resource utilization and minimize costs, while meeting specific business needs.
Properly configuring auto-scaling and implementing effective monitoring strategies are also key components of successful compute solutions design within the Azure environment.
Networking Solutions Design
Effective networking is foundational to any Azure solution. The AZ-305 exam heavily emphasizes designing and implementing secure and scalable network architectures. This includes mastery of virtual networks, subnets, network security groups (NSGs), and Azure Firewall. Candidates should understand how to connect on-premises networks to Azure using VPN and ExpressRoute, establishing hybrid connectivity.
Designing for high availability necessitates utilizing Azure Load Balancer and Application Gateway. Knowledge of traffic management, DNS configuration, and network peering is also critical. Furthermore, understanding how to segment networks for security and compliance is paramount.
The ability to design solutions that optimize network performance and minimize latency is a key skill assessed during the certification process.
Storage Solutions Design
Strategic storage design is crucial for performance, cost-effectiveness, and data durability within Azure. The AZ-305 exam expects candidates to demonstrate proficiency in selecting the appropriate Azure storage service – Blob Storage, File Storage, Queue Storage, or Disk Storage – based on specific application requirements. Understanding storage tiers (Hot, Cool, Archive) and their associated cost implications is vital.
Designing for redundancy, utilizing features like geo-redundant storage (GRS) and read-access geo-redundant storage (RA-GRS), is essential for disaster recovery. Knowledge of Azure Data Lake Storage Gen2 for big data analytics is also important.
Furthermore, candidates must grasp concepts like storage account networking and data lifecycle management policies.

Identity and Governance in Azure
Master Azure Active Directory, Role-Based Access Control, and Azure Policy for secure, compliant cloud solutions, aligning with enterprise governance standards.
Azure Active Directory Design
Designing robust Azure Active Directory (Azure AD) solutions is crucial for secure access and identity management within your Azure infrastructure. This involves carefully planning user authentication and authorization mechanisms, leveraging features like multi-factor authentication (MFA) to enhance security posture. Understanding how to integrate on-premises Active Directory with Azure AD using Azure AD Connect is paramount for hybrid environments.
Furthermore, you must grasp the concepts of custom security attributes, dynamic groups, and conditional access policies to tailor access controls to specific user roles and scenarios. Proper design also includes considerations for guest access, B2C integration, and privileged identity management (PIM) to minimize the risk of unauthorized access. A well-designed Azure AD implementation forms the foundation for a secure and manageable cloud environment, directly impacting the success of your AZ-305 certification.
Role-Based Access Control (RBAC) Implementation
Effective Role-Based Access Control (RBAC) is fundamental to securing Azure resources and adhering to the principle of least privilege. Implementing RBAC involves defining custom roles with granular permissions tailored to specific job functions, rather than granting broad administrative access. Understanding built-in roles and their associated permissions is a key starting point, but the ability to create and manage custom roles is essential for complex environments.
Proper RBAC implementation extends to utilizing Azure AD groups for role assignments, simplifying management and ensuring consistency. You should also be proficient in assigning roles at different scopes – subscription, resource group, or individual resource – to control access precisely. Regularly reviewing and refining role assignments is crucial to maintain a secure and compliant infrastructure, directly contributing to success on the AZ-305 exam.
Azure Policy Implementation
Azure Policy is a powerful governance tool enabling organizations to establish and enforce standards across their Azure environments. Implementing Azure Policy involves defining policies that evaluate resource compliance and trigger remediation actions. Understanding built-in policies and the ability to create custom policies are vital for controlling resource types, locations, and configurations.
Effective policy implementation requires defining policy definitions, assigning policies to scopes (subscriptions or resource groups), and monitoring compliance results. Utilizing policy initiatives to group related policies streamlines management and ensures consistent enforcement. Furthermore, understanding how to use policy exemptions allows for controlled deviations from established standards. Mastering Azure Policy is crucial for maintaining governance and achieving a passing score on the AZ-305 certification.

Security Considerations for Azure Infrastructure

Prioritize robust security measures, encompassing network security groups, Azure Firewall, Security Center, and Sentinel, alongside data encryption for comprehensive protection.
Network Security Groups (NSGs) and Azure Firewall
Network Security Groups (NSGs) function as fundamental filtering rules for network traffic, controlling inbound and outbound communications at the subnet or network interface level. Mastering NSG configuration, including security rules and prioritization, is crucial for establishing a secure perimeter. Azure Firewall, a cloud-native stateful firewall, provides advanced threat protection and centralized network security policies.
Understanding the differences between NSGs and Azure Firewall is key; NSGs offer basic filtering, while Azure Firewall delivers deeper inspection and threat intelligence. Implementing both in a layered approach enhances overall security posture. Configuration involves defining rules based on source/destination IP addresses, ports, and protocols. Proper logging and monitoring of both NSGs and Azure Firewall are essential for identifying and responding to potential security incidents, aligning with AZ-305 exam objectives.
Azure Security Center and Azure Sentinel
Azure Security Center provides unified security management and advanced threat protection across your Azure and hybrid environments. It continuously assesses your security posture, identifies vulnerabilities, and offers actionable recommendations to improve your security. Azure Sentinel, a cloud-native SIEM (Security Information and Event Management) system, ingests data from various sources, enabling intelligent security analytics and threat detection.
Integrating Security Center and Sentinel delivers a comprehensive security solution. Security Center’s recommendations feed into Sentinel for proactive threat hunting and incident response. Understanding data connectors, analytics rules, and workbooks within Sentinel is vital. Proficiency in configuring alerts, investigations, and automated responses is crucial for the AZ-305 exam, demonstrating expertise in securing Azure infrastructure and responding to security incidents effectively.
Data Encryption at Rest and in Transit
Data encryption is paramount for securing sensitive information within Azure. Encryption at rest utilizes Azure Key Vault to manage cryptographic keys, protecting data stored in services like Azure Storage and Azure SQL Database. Understanding different encryption types – service-managed keys, customer-managed keys, and hardware security modules (HSMs) – is essential for the AZ-305 exam.
Encryption in transit secures data as it moves between services and users, typically achieved through TLS/SSL. Configuring HTTPS for web applications and utilizing Azure Private Link to establish private connections are key practices. Mastering the implementation of encryption solutions, including key rotation and compliance requirements, demonstrates a strong understanding of data protection principles and Azure security best practices, vital for a solutions architect.

Monitoring and Management of Azure Resources
Effectively utilize Azure Monitor, Log Analytics, and ARM templates for proactive resource management, automation, and ensuring high availability and disaster recovery.
Azure Monitor and Azure Log Analytics
Azure Monitor provides comprehensive monitoring capabilities for Azure resources, collecting telemetry data like metrics and logs. This data is crucial for understanding resource performance, identifying potential issues, and proactively addressing them before they impact users.
Azure Log Analytics, integrated with Azure Monitor, enables powerful log searching, analysis, and visualization. You can use Kusto Query Language (KQL) to query logs, create custom dashboards, and set up alerts based on specific log patterns.
For the AZ-305 exam, understanding how to configure diagnostic settings to send logs to Log Analytics workspaces is vital. Furthermore, mastering the creation of alerts based on metric thresholds and log queries will demonstrate your ability to proactively manage Azure environments. Effectively utilizing these tools ensures optimal performance and reliability.
Azure Automation and Azure Resource Manager (ARM) Templates
Azure Automation streamlines repetitive tasks through runbooks, enabling efficient management of Azure resources. These runbooks, written in PowerShell or Python, automate processes like starting/stopping VMs, patching systems, and responding to alerts. Understanding how to schedule and trigger runbooks is key for the AZ-305 exam.
Azure Resource Manager (ARM) templates define infrastructure as code, allowing for consistent and repeatable deployments. These JSON files describe the resources needed for your solution, ensuring infrastructure parity across environments.
For exam success, practice creating and deploying ARM templates, and learn how to parameterize them for flexibility. Combining Azure Automation with ARM templates enables fully automated infrastructure provisioning and configuration, demonstrating a strong understanding of DevOps principles within Azure.

High Availability and Disaster Recovery Strategies
Designing for resilience is crucial in Azure. High Availability (HA) focuses on minimizing downtime through redundancy and failover mechanisms, like Availability Sets and Availability Zones. Understanding the differences and appropriate use cases for each is vital for the AZ-305 exam.
Disaster Recovery (DR) plans address scenarios involving regional outages. Strategies include Azure Site Recovery for replicating VMs to a secondary region, and utilizing backup and restore solutions.
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are key concepts. Selecting the appropriate DR strategy depends on these business requirements. Mastering these concepts and knowing how to implement them using Azure services demonstrates a comprehensive understanding of business continuity and disaster recovery principles.

Migration Strategies to Azure
Explore lift-and-shift versus refactoring approaches, utilizing Azure Migrate for seamless transitions, and establishing hybrid connectivity via VPN or ExpressRoute solutions.
Lift and Shift vs. Refactor
Understanding the nuances between “lift and shift” and “refactor” is crucial for successful Azure migrations, a key component of the AZ-305 exam. Lift and shift, also known as rehosting, involves moving applications to Azure with minimal code changes – a faster, simpler approach ideal for immediate cloud presence. However, it may not fully leverage cloud capabilities.
Refactoring, conversely, involves modifying application code to optimize it for the cloud, enhancing scalability, resilience, and cost-efficiency. This approach demands more time and effort but unlocks the full potential of Azure services. The optimal strategy depends on application complexity, business requirements, and long-term goals. Careful assessment is vital to determine the most appropriate migration path, balancing speed, cost, and future scalability.

Azure Migrate Service
Azure Migrate is a powerful service designed to streamline the discovery, assessment, and migration of on-premises workloads to Azure, a critical skill tested in the AZ-305 exam. It provides a centralized hub for assessing server compatibility, estimating Azure costs, and orchestrating the migration process. Azure Migrate supports various migration scenarios, including rehosting, refactoring, and redeploying applications.
The service offers agentless discovery for initial assessment and agent-based replication for actual migration. It integrates seamlessly with Azure Site Recovery for physical and virtual machine migrations. Mastering Azure Migrate’s capabilities, including dependency mapping and performance-based sizing, is essential for designing efficient and cost-effective migration strategies, ensuring a smooth transition to the Azure cloud platform.
Hybrid Connectivity Options (VPN, ExpressRoute)
Establishing secure and reliable connectivity between on-premises environments and Azure is paramount, and the AZ-305 exam heavily emphasizes understanding hybrid networking solutions. Virtual Private Networks (VPNs) offer a cost-effective way to create encrypted tunnels over the public internet, suitable for less demanding workloads and development/test scenarios. However, for mission-critical applications requiring consistent, high-bandwidth, and low-latency connections, Azure ExpressRoute is the preferred choice.
ExpressRoute provides a dedicated, private connection to Azure, bypassing the public internet. Choosing between VPN and ExpressRoute depends on factors like bandwidth requirements, latency sensitivity, and security needs. Proficiency in designing and implementing both options, including gateway configurations and routing protocols, is crucial for success on the AZ-305 certification.