Five domains, with weights set by Microsoft's April 2026 update. Every domain summary below is paraphrased from the official skills outline; bullet-level objectives in Azure Mastery are tagged so you always know which domain you're being tested on and where your weak spots cluster.
Design and implement core networking infrastructure25–30%
The largest domain by weight. Plan and implement VNets, subnets, IP addressing, public IPs, prefixes, IPv6 considerations; VNet peering (regional, global, gateway transit, hub-and-spoke topologies); route tables and user-defined routes; name resolution via Azure DNS (public, private zones, virtual network links, conditional forwarding). Plus the resource design patterns — when to choose hub-and-spoke vs Virtual WAN. Around 10–18 questions per sitting.
Design, implement, and manage connectivity services20–25%
Hybrid connectivity. VPN Gateway — site-to-site, point-to-site, VNet-to-VNet, BGP, active-active vs active-standby. ExpressRoute — circuits, peering types, FastPath, ExpressRoute Direct vs Provider. Azure Virtual WAN — secured virtual hubs, branch connectivity, custom routing, integration with Azure Firewall. Encrypt-in-transit story: VPN over ExpressRoute, MACsec. Around 8–15 questions.
Design and implement application delivery services15–20%
Layer-4 vs Layer-7 load balancing. Azure Load Balancer (public, internal, Standard SKU, backend pools, health probes, NAT rules). Azure Application Gateway v2 (URL-based routing, multi-site hosting, SSL termination, WAF integration, autoscaling). Azure Front Door (global, HTTP/2, caching, WAF) and Azure Traffic Manager (DNS-based, routing methods — priority, weighted, performance, geographic). Choose the right service for the scenario — global vs regional, L4 vs L7, latency-sensitive vs failover-sensitive. Around 6–12 questions.
Design and implement private access to Azure services10–15%
Smallest domain by weight, distinct conceptually. Azure Private Link and Private Endpoints for PaaS access without public exposure; service endpoints for VNet-restricted access; VNet integration for App Service / Functions; Private Link Service for exposing your own services privately to consumers in other tenants. Around 4–9 questions.
Design and implement Azure network security services15–20%
Security at the network layer (overlaps with AZ-500 territory). Azure Firewall (rules, threat intelligence, Premium-tier IDPS and TLS inspection, Firewall Manager hierarchies); NSGs and application security groups; Web Application Firewall on App Gateway and Front Door (managed rule sets, custom rules, geo filtering); DDoS Protection (Network vs IP plans). Plus encryption choices: VNet encryption, MACsec on ER. Around 6–12 questions.