π· DevOps [Azure Track]
Currently available in Islamabad
Azure is the cloud platform of enterprise. Banks, telecoms, government agencies, healthcare systems, and large software vendors across the world have standardised on Microsoft Azure β and the demand for Azure DevOps engineers with hands-on infrastructure automation skills is growing faster than the supply. Azure's deep integration with Microsoft's broader ecosystem (.NET, Active Directory, GitHub, Visual Studio Code, and the Microsoft 365 suite) makes it the dominant cloud platform in enterprise IT outsourcing, which is exactly the market Pakistan's IT export sector serves.
The core program builds the foundation every Azure DevOps engineer needs in 4β5 weeks: Linux, containers, Azure infrastructure, CI/CD with Azure DevOps Pipelines and GitHub Actions, Infrastructure as Code with Terraform and Bicep, observability with Azure Monitor, and cost governance. Advanced specialisations β AKS, security, serverless, platform engineering, ML infrastructure, and SRE β are offered as separate add-on tracks so students can go deep on the areas most relevant to their target roles without covering everything at once.
π‘ Why Azure DevOps in 2026
- Azure is the dominant cloud platform in enterprise IT β the majority of large Pakistani IT firms and their international enterprise clients run on Azure, making it the most commercially relevant cloud for the local outsourcing market
- Microsoft Entra ID (formerly Azure Active Directory) is the identity backbone of most enterprise organisations β Azure DevOps engineers who understand identity and access management are immediately valuable in any enterprise environment
- Azure DevOps (Pipelines, Repos, Boards, Artifacts) is deeply embedded in enterprise development workflows β knowing it is a prerequisite for many corporate DevOps roles
- GitHub Actions is now Microsoft-owned and deeply integrated with Azure β engineers who know both have a significant advantage
- Bicep is Microsoft's official IaC language for Azure β clean, concise, and the replacement for ARM templates that enterprises are actively migrating to
- Azure's AI platform (Azure OpenAI Service, Azure AI Studio, Azure Machine Learning) is the enterprise default for AI workloads β creating massive demand for engineers who can provision and operate this infrastructure
- AZ-104, AZ-400, and AZ-305 certifications are among the most widely recognised in Pakistan's IT job market β this course aligns directly with all three
π Core Program β 4 to 5 Weeks
(Foundation every Azure DevOps engineer needs before specialising)
Week 1 β Linux, Networking & Shell Automation
Every Azure Virtual Machine, every AKS node, every GitHub Actions runner, and every Azure Container App runs on Linux. This week builds the operating system and networking knowledge that everything in Azure infrastructure sits on top of.
- Linux fundamentals for DevOps: process management, systemd services, file permissions, user and group management, and the /proc and /sys virtual filesystems
- Shell scripting in Bash: variables, conditionals, loops, functions, error handling with set -euo pipefail, and writing production-grade automation scripts for Azure operations
- Text processing tools: grep, awk, sed, cut, sort, uniq, jq for JSON (essential for Azure CLI output), and yq for YAML β the DevOps data transformation toolkit
- File system and storage: inodes, mount points, LVM, disk usage analysis, and Azure Managed Disk attachment on Linux VMs
- Networking fundamentals: TCP/IP, subnets (CIDR notation), routing tables, DNS resolution, NAT, and how packets move through an Azure Virtual Network
- Linux networking tools: ip, ss, netstat, curl, wget, dig, nslookup, tcpdump, and nc β debugging connectivity in Azure VNet environments
- TLS/SSL: how certificates work, the certificate chain, and inspecting certificates with openssl β essential for Azure Application Gateway and App Service SSL configuration
- SSH: key generation, SSH config files, agent forwarding, and hardening SSH β managing Azure Linux VMs securely
- Azure CLI (az): installing, authenticating with service principals and Managed Identity, scripting resource operations, and querying with --query and JMESPath
- PowerShell for Azure (Az module): for Windows-centric enterprise environments β Get-AzResource, New-AzResourceGroup, and common administrative cmdlets
- Git advanced workflows: rebasing, cherry-picking, reflog, and monorepo patterns β working with Azure Repos and GitHub
- Python for Azure automation: scripts with the azure-mgmt Python SDK, subprocess, pathlib, and argparse for complex infrastructure automation
Week 2 β Docker & Containers in Depth
Containers are the unit of deployment across every Azure container service: ACI, ACA, AKS, and App Service. This week covers Docker from OS fundamentals to production-quality builds optimised for Azure Container Registry and Azure deployment targets.
- Container fundamentals: Linux namespaces, cgroups, and the kernel features that make containers possible β understanding what Azure Container Instances actually runs
- Docker architecture: Docker daemon, containerd, runc, image layers, and the OverlayFS union filesystem
- Writing production Dockerfiles: multi-stage builds, minimal base images (distroless, alpine, scratch), non-root users, and build cache optimisation
- Docker image security: scanning with Trivy and Microsoft Defender for Containers (defender-for-containers), removing secrets from build context, and .dockerignore
- Docker networking: bridge, host, overlay drivers β inter-container communication and Azure VNet integration
- Docker volumes: bind mounts vs named volumes, and mapping to Azure Files shares for persistent container storage
- Docker Compose: multi-container local development stacks β health checks, depends_on, environment files, and profiles
- Azure Container Registry (ACR): creating registries, pushing and pulling images, geo-replication, repository permissions, and ACR Tasks for automated builds
- ACR vulnerability scanning: Microsoft Defender for Containers integration β continuous image assessment in ACR
- Container image tagging strategies: semver tags, Git SHA tags, and immutable tags for production registries
- Multi-platform builds with buildx: building ARM64 + AMD64 images for Azure's Ampere-based Dsv5 VMs
- Docker in Azure DevOps Pipelines and GitHub Actions: layer caching strategies, parallel builds, and pushing to ACR from CI
Week 3 β Azure Core Services & Infrastructure as Code
Azure from a DevOps engineer's perspective β provisioning everything as code with Bicep and Terraform, designing proper network topology, and managing identity and access at scale.
Azure fundamentals for DevOps:
- Azure resource model: subscriptions, resource groups, resources, management groups, and the Azure Resource Manager (ARM) hierarchy
- Azure Virtual Network (VNet): subnets, route tables, Network Security Groups (NSGs), Application Security Groups (ASGs), VNet peering, and Private Endpoints
- Azure Virtual Machines: VM sizes, VM Scale Sets, Azure Spot VMs, custom VM images with Azure Image Builder, and VM extensions for automation
- Azure Load Balancer vs Application Gateway vs Front Door: Layer 4 vs Layer 7 load balancing β when each applies, WAF integration, and SSL offloading
- Azure Storage: Blob storage (Hot/Cool/Cold/Archive tiers), Azure Files, Azure Queues, and storage account security (private endpoints, SAS tokens, Managed Identity access)
- Azure SQL Database and Azure Database for PostgreSQL: managed databases β elastic pools, Hyperscale, geo-replication, and point-in-time restore
- Azure Cache for Redis: tiers, clustering, geo-replication, and access key vs Entra ID authentication
- Microsoft Entra ID (Azure AD): tenants, service principals, Managed Identities (system-assigned and user-assigned), app registrations, and RBAC role assignments
- Azure RBAC: built-in roles, custom role definitions, role assignments at different scopes (management group, subscription, resource group, resource)
- Azure DNS: public and private DNS zones, record sets, DNS private resolver, and split-horizon DNS patterns
- Azure Key Vault: secrets, keys, and certificates β access policies vs RBAC, Key Vault Firewall, and Private Endpoints for secrets
- Azure CLI and Azure Portal: navigating the portal efficiently and scripting every operation with the CLI β no console-only knowledge
Infrastructure as Code β Bicep and Terraform:
- Bicep fundamentals: the Azure-native IaC language β resources, parameters, variables, outputs, and the relationship between Bicep and ARM templates
- Bicep modules: reusable, versioned building blocks β VNet modules, AKS modules, and App Service modules shared across projects
- Bicep deployment scopes: resource group, subscription, management group, and tenant deployments
- Bicep parameter files and bicepparam: environment-specific configuration for dev, staging, and production
- What-if deployments: previewing Bicep changes before applying β the Bicep equivalent of Terraform plan
- Azure Deployment Stacks: the new native mechanism for managing the lifecycle of a Bicep deployment as a single unit
- Terraform with the AzureRM provider: provisioning Azure resources with Terraform β the industry standard IaC tool for multi-cloud teams
- Terraform state on Azure: Azure Blob Storage backend + state locking with Azure Blob lease
- Terraform modules for Azure: reusable VNet, AKS, and App Service modules β the Terraform Azure Verified Modules library
- Bicep vs Terraform: when to use each β the Microsoft-first argument for Bicep vs the multi-cloud portability of Terraform
- Checkov and tfsec for Azure: static analysis of Bicep and Terraform code for Azure security misconfigurations
- Azure Deployment environments: developer self-service environment provisioning backed by Bicep or Terraform templates
Week 4 β CI/CD with Azure DevOps Pipelines & GitHub Actions
The complete pipeline: from code commit to production deployment on Azure Container Apps and App Service, automated, secure, and repeatable. Both Azure DevOps Pipelines and GitHub Actions are covered β enterprises use both and engineers need fluency in each.
Azure DevOps Pipelines in depth:
- Azure DevOps organisation: projects, repos, pipelines, artifacts, boards, and test plans β understanding the full platform
- YAML pipelines: stages, jobs, steps, triggers, and the pipeline execution model
- Pipeline agents: Microsoft-hosted agents (Ubuntu, Windows, macOS), self-hosted agents on Azure VMs, and Azure Virtual Machine Scale Set agents for cost-efficient elastic capacity
- Service connections: connecting Azure DevOps to Azure subscriptions, ACR, GitHub, and external services β Workload Identity Federation for keyless authentication
- Variable groups and Azure Key Vault integration: storing pipeline secrets in Key Vault and referencing them in pipelines without storing values in pipeline YAML
- Pipeline templates: reusable stage, job, and step templates in a central repository β the enterprise pipeline library pattern
- Environments and deployment gates: requiring manual approval, automated quality gates, and deployment history per environment
- Artifact feeds: Azure Artifacts for npm, NuGet, Python, Maven, and Universal Packages β internal package registries
- Pipeline security: branch policies, required reviewers for pipeline changes, and least-privilege service connection permissions
GitHub Actions for Azure:
- GitHub Actions architecture: workflows, jobs, steps, runners, and the event model
- Azure login with OIDC: passwordless authentication from GitHub Actions to Azure using Workload Identity Federation β no stored client secrets
- Azure-specific GitHub Actions: azure/login, azure/arm-deploy, azure/container-apps-deploy, azure/aks-set-context, and azure/webapps-deploy
- Reusable workflows and composite actions: building a shared GitHub Actions library for Azure deployments across multiple repositories
- GitHub Environments with Azure: deployment protection rules, required reviewers, and environment secrets for each Azure environment
- Self-hosted GitHub Actions runners on Azure: Azure Container Instances or Azure VM Scale Sets for private network access
Azure deployment targets:
- Azure Container Apps: the recommended serverless container platform β environments, container apps, revisions, replicas, and traffic splitting
- Container Apps scaling rules: HTTP scaling, CPU/memory scaling, KEDA-based custom scaling (queue depth, Service Bus, Event Hubs)
- Azure App Service: PaaS web hosting for containers and code β deployment slots, blue/green deployments, auto-scaling, and custom domains
- Azure Container Instances (ACI): ephemeral containers for CI/CD jobs, batch processing, and sidecar patterns
- Complete CI/CD pipeline: code push β Trivy scan β Docker build β push to ACR β Bicep what-if β Bicep deploy β Container Apps update β health check β notify Slack
- Rollback strategy: Container Apps revision-based rollback and App Service slot swap reversal
Week 5 β Observability, Security Basics & Cost Management
The three operational disciplines that occupy the most time for working Azure DevOps engineers: understanding what your systems are doing with Azure Monitor, keeping them secure and compliant, and controlling the Azure bill.
Observability with Azure Monitor:
- Azure Monitor architecture: the unified observability platform β metrics, logs, traces, alerts, and dashboards in one system
- Log Analytics workspace: the central log store β Log Analytics agents, diagnostic settings, and querying with KQL (Kusto Query Language)
- KQL in depth: the query language for Azure Monitor Logs β where, project, summarize, extend, join, render, and time-series analysis
- Application Insights: APM for web applications β request tracking, dependency tracking, exception logging, custom events, and the Live Metrics stream
- Azure Monitor Metrics: platform metrics, custom metrics, and metric alerts with dynamic thresholds
- Azure Monitor Alerts: metric alerts, log query alerts, activity log alerts, and action groups (email, SMS, webhook, Azure Function, Logic App)
- Azure Dashboards and Workbooks: building operational dashboards β Workbooks for parameterised, interactive reports
- Container Insights: AKS and Container Apps monitoring β CPU/memory per pod, node status, and live container logs
- OpenTelemetry with Azure Monitor: the Azure Monitor OpenTelemetry Distro β exporting OTel traces, metrics, and logs to Application Insights
- Distributed tracing: end-to-end trace correlation across Azure Container Apps, App Service, and Azure Functions
Azure security fundamentals:
- Azure Key Vault in production: secrets rotation, Key Vault references in App Service and Container Apps, and audit logging with diagnostic settings
- Managed Identity in practice: assigning user-assigned Managed Identities to Container Apps, VMs, and Azure Functions β eliminating stored credentials entirely
- Microsoft Defender for Cloud: the unified cloud security posture management platform β Secure Score, security recommendations, and defender plans
- Microsoft Defender for Containers: runtime threat protection for AKS and Container Apps β vulnerability assessment and runtime anomaly detection
- Azure Policy: defining and enforcing compliance rules β built-in policy definitions, custom policies, and policy initiatives (blueprints)
- Azure Security Center recommendations: remediating the most impactful findings β NSG configuration, JIT VM access, and encryption enforcement
- Private Endpoints: removing public internet exposure for Azure SQL, Storage, Key Vault, ACR, and other PaaS services
- Azure Firewall: managed network security β application rules, network rules, DNAT, and threat intelligence-based filtering
- Shift-left security in pipelines: Trivy for containers, Checkov for Bicep/Terraform, Semgrep for SAST, and credential scanning with git-secrets and GitHub secret scanning
- Microsoft Entra ID Conditional Access: enforcing MFA, device compliance, and location-based access policies for Azure DevOps and GitHub access
Azure Cost Management:
- Azure Cost Management + Billing: cost analysis, cost allocation by resource group and tag, and downloading invoices
- Tagging strategy: mandatory cost allocation tags (environment, team, project, owner) enforced via Azure Policy
- Azure Budgets: budget alerts and automated actions β stopping or deallocating resources when thresholds are exceeded
- Azure Advisor: cost recommendations β rightsizing VMs, deleting unused resources, and Reserved Instance opportunities
- Azure Reserved Instances and Savings Plans: committing to compute usage for 1 or 3 years β 30β72% savings over pay-as-you-go
- Azure Spot VMs: using spot for CI/CD agents, batch jobs, and fault-tolerant stateless workloads β eviction handling
- Container Apps and App Service scaling to zero: eliminating idle costs for non-production environments
- Azure Storage cost optimisation: lifecycle management policies, Blob access tier transitions, and right-sizing storage accounts
- Private Endpoint vs Service Endpoint pricing: understanding the cost implications of different network security approaches
π Advanced Add-On Tracks
(Each track is 2β3 weeks β additional fee per track. Can be taken in any order after completing the core program.)
Advanced Track 1: Kubernetes & AKS (3 weeks)
Kubernetes on Azure Kubernetes Service is the most in-demand enterprise container platform β and the most complex. Three weeks are needed to cover it properly: the Kubernetes object model, AKS-specific operations, and the GitOps delivery layer on top.
Week 1 β Kubernetes fundamentals:
- Kubernetes architecture: control plane components (API server, etcd, scheduler, controller manager) and worker node components (kubelet, kube-proxy, container runtime)
- Core workload objects: Pods, ReplicaSets, Deployments, StatefulSets, DaemonSets, Jobs, and CronJobs β when each is the right choice
- Services: ClusterIP, NodePort, LoadBalancer, and ExternalName β DNS-based service discovery with CoreDNS
- Ingress and Ingress Controllers: NGINX Ingress Controller and the Azure Application Gateway Ingress Controller (AGIC) β TLS termination, path routing, and host-based routing
- ConfigMaps and Secrets: injecting configuration and sensitive data into Pods β the baseline before using Azure Key Vault integration
- Persistent Volumes: PV, PVC, StorageClass β the Azure Disk CSI driver and Azure Files CSI driver for RWO and RWX storage
- Namespaces and RBAC: isolating teams and workloads, ClusterRoles vs Roles, ServiceAccounts, and binding Azure AD groups to Kubernetes roles
- Resource requests and limits: LimitRanges, ResourceQuotas, and the three QoS classes
- Health checks: liveness, readiness, and startup probes β writing probes that avoid unnecessary restarts
- Pod scheduling: nodeSelector, node affinity/anti-affinity, pod topology spread constraints, taints and tolerations, and PodDisruptionBudgets
- Rolling updates, rollbacks, and Deployment strategies: maxUnavailable, maxSurge, and progressive delivery
Week 2 β AKS in production:
- AKS cluster provisioning with Terraform and Bicep: system node pools, user node pools, and Spot node pools β network plugin selection (Azure CNI vs kubenet vs Azure CNI Overlay)
- AKS authentication: Azure AD integration β local accounts, Azure AD-backed kubectl authentication, and disabling local accounts for compliance
- Workload Identity for AKS: the replacement for AAD Pod Identity β assigning Azure RBAC permissions to Kubernetes ServiceAccounts via federated credentials
- AKS networking deep dive: Azure CNI pod IP assignment, NSG rules for pods, Azure Network Policy, and Calico network policy
- AKS node pool autoscaling: the Cluster Autoscaler and KEDA β scaling nodes and pods based on workload demand
- AKS cluster upgrades: the upgrade sequence β control plane first, then node pools β node surge upgrades and zero-downtime strategies
- AKS add-ons and extensions: AGIC, Azure Monitor for containers, Secrets Store CSI Driver, and Open Service Mesh
- Secrets Store CSI Driver with Azure Key Vault: mounting Key Vault secrets directly as Kubernetes volumes β no Kubernetes Secrets needed
- KEDA (Kubernetes Event-Driven Autoscaling): scaling deployments based on Azure Service Bus queue depth, Event Hubs consumer lag, and HTTP request rate
- AKS cost optimisation: spot node pools for batch workloads, node pool right-sizing, Start/Stop cluster schedules for non-production, and AKS Cost Analysis
- AKS observability: Container Insights with Managed Prometheus, Azure Managed Grafana, and Log Analytics for cluster and pod logs
Week 3 β GitOps and advanced delivery on AKS:
- Helm: packaging Kubernetes applications β writing charts, values files, release management, and the Azure-specific Helm charts in the AKS documentation
- Kustomize: environment-specific overlays without duplicating manifests β base + overlays for dev/staging/prod on AKS
- Flux CD on AKS: the GitOps operator built into AKS as an extension β source controller, kustomize controller, helm controller, and image automation
- ArgoCD on AKS: the alternative GitOps operator β Applications, ApplicationSets, the App of Apps pattern, and multi-cluster deployments
- Azure GitOps with Azure DevOps: triggering Flux/ArgoCD sync from Azure DevOps Pipelines β the enterprise GitOps pattern
- Sealed Secrets and External Secrets Operator with Azure Key Vault: managing secrets safely in a GitOps repository
- Progressive delivery with Argo Rollouts: canary and blue/green deployments on AKS with automated analysis based on Application Insights metrics
- Service mesh with Istio on AKS: the AKS Istio add-on β mTLS between services, traffic management, and Kiali for mesh observability
- OPA Gatekeeper and Azure Policy for AKS: the built-in policy enforcement for AKS β restricting privileged containers, enforcing resource limits, and requiring specific labels
Advanced Track 2: Azure Security & Compliance Engineering (2 weeks)
Enterprise Azure environments operate under regulatory frameworks β GDPR, ISO 27001, SOC 2, PCI-DSS, and industry-specific compliance requirements. This track covers the Azure security tooling, DevSecOps pipeline integration, and compliance automation that regulated environments demand.
Week 1 β Azure security services in depth:
- Microsoft Defender for Cloud in depth: Secure Score improvement, regulatory compliance dashboard (NIST, CIS, PCI-DSS), and Defender plans for VMs, SQL, Storage, Containers, and App Service
- Microsoft Sentinel: the cloud-native SIEM β connecting data connectors (Azure AD, Office 365, Azure Activity), creating analytics rules, and building investigation playbooks
- Azure DDoS Protection: Standard tier β adaptive tuning, attack telemetry, and integration with Azure Monitor alerts
- Azure Bastion: browser-based SSH and RDP to VMs without public IP addresses β eliminating jump boxes
- Just-in-time VM access: Microsoft Defender for Cloud JIT β time-limited NSG rules for administrative access
- Azure Private Link and Private DNS: end-to-end private connectivity to PaaS services β DNS resolution from on-premises and hub-spoke networks
- Customer-managed keys (CMK): bringing your own keys for Azure Storage, SQL, Cosmos DB, and AKS β key rotation and emergency key revocation
- Azure Active Directory Identity Protection: risk-based Conditional Access β sign-in risk, user risk, and automated remediation
- Privileged Identity Management (PIM): just-in-time elevation of Azure RBAC roles β approval workflows and access reviews
Week 2 β DevSecOps pipeline and compliance automation:
- Shift-left security in Azure DevOps Pipelines: Trivy (containers), Checkov (Bicep/Terraform), Semgrep (SAST), OWASP Dependency-Check (SCA), and Microsoft Security DevOps extension
- Microsoft Security DevOps GitHub Action: the official Microsoft action for running Credential Scanner, Template Analyzer, and Trivy in GitHub Actions
- Software Bill of Materials (SBOM): generating SBOMs with Syft and storing in ACR β Microsoft SBOM Tool for .NET projects
- Container image signing with Notation (CNCF): signing ACR images with Azure Key Vault-backed certificates and verifying signatures in AKS with Ratify
- Supply chain security: SLSA framework on Azure β provenance attestation for container builds in Azure DevOps
- Azure Policy as code: managing Azure Policy assignments with Terraform and Bicep β the policy-as-code DevOps workflow
- Compliance frameworks on Azure: Azure Policy regulatory compliance initiatives for ISO 27001, SOC 2, PCI-DSS, and NIST SP 800-53 β mapping controls to Azure services
- Microsoft Purview: data governance and data loss prevention β discovering sensitive data across Azure Storage, SQL, and Synapse
- Azure Audit Logs and Activity Logs: retention, archiving to Storage, streaming to Microsoft Sentinel, and alerting on suspicious management operations
- Incident response on Azure: isolating compromised resources (NSG lockdown, VM deallocate, identity revocation), forensic investigation with Activity Logs and Sentinel, and runbook automation with Azure Automation
Advanced Track 3: Serverless & Event-Driven Architecture on Azure (2 weeks)
Azure's serverless and event-driven services form a complete platform for building event-driven applications, real-time data pipelines, and API backends β all without managing servers.
- Azure Functions deep dive: the execution model, cold starts, the Flex Consumption plan, Durable Functions orchestration patterns (chaining, fan-out/fan-in, human interaction, eternal orchestration)
- Azure Functions triggers and bindings: HTTP, Timer, Service Bus, Event Hubs, Blob Storage, Cosmos DB, Queue Storage β the binding-based development model
- Azure Functions deployment: Zip deploy, container-based deployment, and deploying Functions as containers in Container Apps
- Azure Functions scaling: KEDA-based scaling on Container Apps vs Consumption plan automatic scaling
- Azure Logic Apps: low-code workflow automation β connectors, triggers, actions, and enterprise integration patterns
- Azure API Management (APIM): the enterprise API gateway β policies (rate limiting, transformation, caching, authentication), products, subscriptions, and the developer portal
- Azure Event Grid: event routing across Azure services and custom applications β topics, subscriptions, event filtering, and dead-letter queues
- Azure Service Bus: enterprise messaging β queues, topics, subscriptions, sessions for ordered processing, dead-letter queues, and message deferral
- Azure Event Hubs: high-throughput event streaming β partitions, consumer groups, capture to Blob Storage, and the Kafka-compatible endpoint
- Azure Queue Storage: simple reliable messaging for decoupled architectures β poison message handling and message lease patterns
- Azure Cosmos DB: globally distributed NoSQL β partition key design, consistency levels, change feed for event-driven patterns, and serverless capacity mode
- Azure Static Web Apps: hosting SPAs and static sites with integrated Azure Functions backends β GitHub Actions and Azure DevOps integration
- Event-driven architecture patterns: choreography vs orchestration, the outbox pattern on Azure, and saga coordination with Durable Functions
- Serverless observability: Application Insights for Azure Functions β request/dependency/exception tracking and distributed tracing across Service Bus and Event Grid
Advanced Track 4: Platform Engineering & Advanced IaC (2 weeks)
Platform Engineering on Azure means building the internal developer platform that enterprise development teams use to self-service environments, deployments, and infrastructure β reducing dependence on the central infrastructure team for every change.
- Platform Engineering principles for enterprise: golden paths, paved roads, the platform team's mission, and measuring developer experience with DORA and SPACE metrics
- Azure Landing Zones: Microsoft's reference architecture for enterprise-scale Azure β management groups, policy assignments, networking hub-spoke topology, and the Enterprise-Scale CAF (Cloud Adoption Framework)
- Azure Landing Zone Bicep accelerator: deploying the Microsoft reference landing zone with Bicep modules from the ALZ Bicep repository
- Terraform Azure Landing Zones module: the community and Microsoft-maintained Terraform equivalent β when to choose Terraform over Bicep for landing zones
- Azure Deployment Environments: developer self-service environment provisioning backed by Bicep or Terraform templates in Azure DevOps Catalogs
- Backstage with Azure: the internal developer portal β Azure DevOps plugin, ACR plugin, and Azure resource entity provider for service catalogue integration
- Azure Developer CLI (azd): the new developer-focused CLI for deploying Azure applications β azd templates, pipelines, and the developer workflow
- Bicep advanced patterns: modules registry with Azure Container Registry, Bicep extensibility providers, and porting ARM templates to Bicep with the decompile command
- Terraform advanced patterns for Azure: module composition with Azure Verified Modules, provider aliasing for multi-subscription deployments, and the AzureRM backend with state encryption
- Policy as code at enterprise scale: Azure Policy exemptions, remediation tasks, compliance reports in pipelines, and the Terraform azurerm_policy_assignment resource
- Azure Cost Management at scale: Management Group-level cost analysis, chargeback and showback with cost allocation rules, and automated cost anomaly alerts
- FinOps on Azure: the FinOps Foundation framework applied to Azure β Inform, Optimise, and Operate phases with Azure tooling
Advanced Track 5: Azure AI & ML Infrastructure (2 weeks)
Azure is the enterprise home for AI workloads β Azure OpenAI Service, Azure AI Studio, and Azure Machine Learning are the platforms that enterprise data science and AI teams depend on. This track covers the infrastructure engineering required to provision, operate, and secure these workloads in production.
- Azure OpenAI Service infrastructure: deploying OpenAI models (GPT-4o, embedding models) in Azure regions β model deployments, capacity planning, PTU (provisioned throughput units) vs standard
- Azure OpenAI private networking: Private Endpoints for Azure OpenAI, network isolation, and routing enterprise traffic through Azure Firewall
- Azure AI Studio: the unified platform for Azure AI β hubs, projects, connections, and the compute infrastructure behind model deployments
- Azure AI Search: provisioning the enterprise vector search service β indexes, indexers, skillsets, and the semantic ranking capability
- Azure Machine Learning workspace infrastructure: compute clusters, compute instances, datastores, environments, and the MLflow tracking integration
- AML compute targets: CPU and GPU compute clusters β NC-series and ND-series VMs for model training, autoscaling compute, and low-priority (spot) nodes
- AML pipelines and components: building reusable ML pipeline steps as Docker containers β the infrastructure side of MLOps
- Azure Container Registry for ML: storing and managing model container images β ACR Tasks for automated rebuilds on base image updates
- Model deployment infrastructure: AML Online Endpoints (real-time) and Batch Endpoints β blue/green model deployments with traffic mirroring
- Azure Data Factory: the managed ETL service β pipelines, datasets, linked services, and integration runtimes for on-premises data movement
- Azure Synapse Analytics infrastructure: Spark pools, SQL pools, integration runtimes, and workspace networking with Managed VNet
- Azure Databricks infrastructure: workspace provisioning with Terraform, Unity Catalog setup, instance pools, and cluster policies for cost control
- Data platform security: Azure Purview data governance, row-level security in Synapse, and Unity Catalog fine-grained access control
- MLOps pipeline CI/CD: deploying AML pipelines and model endpoints from Azure DevOps Pipelines β the responsible AI dashboard integration
Advanced Track 6: SRE & Advanced Observability on Azure (2 weeks)
Site Reliability Engineering principles applied to Azure infrastructure β defining SLOs backed by Application Insights data, automating toil with Azure Automation and Logic Apps, building chaos experiments with Azure Chaos Studio, and operating production systems at enterprise scale.
Week 1 β Advanced observability stack:
- Azure Monitor Logs (Log Analytics) in depth: workspace design (centralised vs decentralised), data collection rules (DCR), table retention tiers, and cost management with commitment tiers
- KQL mastery: advanced query patterns β time series analysis, anomaly detection with series_decompose_anomalies(), machine learning functions, and exporting results to Power BI
- Azure Managed Grafana: the managed Grafana service with Azure Monitor, Prometheus, and Log Analytics data sources β building operational dashboards without managing Grafana infrastructure
- Azure Monitor Managed Service for Prometheus: scraping Kubernetes (AKS) metrics into a fully managed Prometheus-compatible store β PromQL queries and Grafana integration
- OpenTelemetry Collector on Azure: deploying the OTel Collector as a DaemonSet on AKS or as an Azure Container App β pipelines for receiving, processing, and exporting telemetry to Azure Monitor and Prometheus
- Application Insights in depth: custom events, custom metrics, availability tests (URL ping, multi-step web tests), user flow analysis, and retention reports
- Azure Monitor Workbooks: building interactive, parameterised reports β resource health reports, SLO dashboards, and incident review workbooks
- Azure Monitor alerts at scale: alert rules, action groups, alert processing rules for maintenance windows, and programmatic alert management with Terraform
Week 2 β SRE practice on Azure:
- SLIs, SLOs, and error budgets on Azure: defining SLIs from Application Insights availability and response time data β building SLO dashboards with KQL and Azure Monitor Workbooks
- Multi-window multi-burn-rate alerting: implementing the Google SRE alerting approach with Azure Monitor metric alerts and Log Analytics scheduled query alerts
- Azure Chaos Studio: the managed chaos engineering platform β fault library (VM shutdown, AKS pod delete, network latency, Service Bus outage), experiment design, and safety guards
- Resilience testing scenarios: validating Container Apps scale-out, AKS node pool failover, Azure SQL failover group switchover, and Service Bus dead-letter handling under chaos conditions
- Azure Automation: runbooks (PowerShell and Python), update management for VMs, and automated remediation triggered by Azure Monitor alerts
- Azure Logic Apps for incident management: automated incident response workflows β alerting PagerDuty, creating Azure DevOps work items, and sending Teams notifications
- Toil reduction on Azure: identifying repetitive manual operations and automating them with Azure Functions, Logic Apps, and Event Grid-triggered automation
- Blameless post-mortems: Azure-specific incident timeline reconstruction using Activity Logs, Application Insights, and Sentinel β action item tracking in Azure DevOps Boards
- Capacity planning on Azure: using Azure Advisor recommendations, Compute Optimizer signals, and historical metric trends to plan ahead of traffic growth
- Azure Service Health: configuring service health alerts for Azure regional outages, planned maintenance, and health advisories β embedding service health in SRE dashboards
π Schedule & Timings
Choose one group only based on your availability. Max 5 candidates per group to ensure individual attention and hands-on lab support.
Weekday Groups:
- Group 1: MonβWed, 10 AM β 1 PM
- Group 2: MonβWed, 4 PM β 7 PM
Weekend Groups:
- Group 3: Sat & Sun, 10 AM β 2 PM
- Group 4: Sat & Sun, 4 PM β 8 PM
π Location: In-house training in Islamabad
π± Online option may be arranged for out-of-city participants
π οΈ Core Program Tools & Technologies
- OS & Scripting: Ubuntu Linux, Bash, Azure CLI, PowerShell Az module, Python (azure-mgmt SDK)
- Containers: Docker, Docker Compose, Azure Container Registry, Trivy, Microsoft Defender for Containers
- Azure Services: VNet, NSG, VM/VMSS, ALB/AppGW/Front Door, Container Apps, App Service, ACI, Storage, SQL/PostgreSQL, Redis, Key Vault, Entra ID, DNS, ACM
- IaC: Bicep, Terraform (AzureRM provider), Terragrunt, Checkov, Azure Deployment Stacks
- CI/CD: Azure DevOps Pipelines (YAML, templates, environments), GitHub Actions (OIDC to Azure, azure/ actions)
- Observability: Azure Monitor, Log Analytics (KQL), Application Insights, Container Insights, OpenTelemetry
- Security: Key Vault, Managed Identity, Defender for Cloud, Azure Policy, Conditional Access
- Cost: Azure Cost Management, Azure Budgets, Azure Advisor, Reserved Instances
π Advanced Track Summary
- Track 1: Kubernetes & AKS β 3 weeks (Helm, Flux, ArgoCD, Workload Identity, KEDA, Istio, OPA Gatekeeper)
- Track 2: Azure Security & Compliance Engineering β 2 weeks (Sentinel, Defender, DevSecOps pipeline, Notation, SBOM, PIM)
- Track 3: Serverless & Event-Driven Architecture β 2 weeks (Functions, Durable Functions, APIM, Event Grid, Service Bus, Event Hubs)
- Track 4: Platform Engineering & Advanced IaC β 2 weeks (Landing Zones, Bicep Registry, Backstage, Deployment Environments, FinOps)
- Track 5: Azure AI & ML Infrastructure β 2 weeks (Azure OpenAI, AI Studio, AML, Databricks, Synapse, MLOps pipelines)
- Track 6: SRE & Advanced Observability β 2 weeks (Managed Prometheus, Managed Grafana, KQL mastery, Chaos Studio, SLOs)
π― Azure Certifications Aligned
- Core program: AZ-104 (Azure Administrator Associate), AZ-900 (Azure Fundamentals)
- Track 1 (AKS): Kubernetes CKA, AZ-104 advanced scenarios
- Track 2 (Security): AZ-500 (Azure Security Engineer Associate), SC-200 (Microsoft Security Operations)
- Track 3 (Serverless): AZ-204 (Azure Developer Associate)
- Track 4 (Platform): AZ-400 (Azure DevOps Engineer Expert), AZ-305 (Azure Solutions Architect Expert)
- Track 5 (AI/ML): AI-102 (Azure AI Engineer Associate), DP-100 (Azure Data Scientist Associate)
- Track 6 (SRE): AZ-400 (DevOps Engineer Expert) advanced scenarios
β Prerequisites
- Comfortable using the Linux command line (navigating, editing files, running commands)
- Basic understanding of how web applications and HTTP work
- Familiar with at least one scripting language (Bash or Python preferred)
- Git basics: clone, commit, push, pull, branch
- No prior Azure or DevOps experience required for the core program
π― Who This Is For
- Developers and system administrators transitioning into Azure DevOps and cloud engineering roles
- Engineers at Pakistani IT firms building or operating enterprise systems for international clients on Azure
- .NET and Microsoft-stack developers who want to own the infrastructure and deployment pipeline
- Engineers targeting remote Azure DevOps, platform engineering, or cloud architect roles
- Anyone pursuing AZ-104, AZ-400, AZ-305, or AZ-500 certification with hands-on lab training
π³ Course Fee & Booking
- β Core Program Duration: 4β5 Weeks
- β Each Advanced Track: 2β3 additional weeks (additional fee per track)
- π¦ Available Advanced Tracks: Kubernetes & AKS Β· Security & Compliance Β· Serverless & Event-Driven Β· Platform Engineering Β· Azure AI & ML Infrastructure Β· SRE & Advanced Observability
- π Seats: 5 only per group