Building Secure Architecture with Bicep - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Building Secure Architecture with Bicep (/Thread-Building-Secure-Architecture-with-Bicep) |
Building Secure Architecture with Bicep - OneDDL - 07-04-2024 Free Download Building Secure Architecture with Bicep Published 7/2024 Created by Artem Mikulich MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 25 Lectures ( 1h 2m ) | Size: 467 MB Building Secure Architecture with Bicep. Implementing private endpoints in Azure. What you'll learn: Implement secure connectivity with Private Endpoints (Infrastructure as Code) Automate Role-Based Access Controls (RBAC) deployment Calculate and define VNet/Subnet IP ranges Support IaC in multiple environments Requirements: Basic Azure Cloud knowledge Basic Azure Bicep experience Description: Following the infrastructure and code approach is a solid long-term investment, and Bicep is the best instrument for automating Azure infrastructure. However, implementing advanced secure solutions, like private endpoints, is often a bigger deal. The amount of information available on the Internet fades quickly as task complexity increases.My course will give you recipes and insights on organizing, delivering, and maintaining advanced Azure architectures. It is 100% practice-oriented and contains minimal theory. We will implement a cloud infrastructure comprising app service, storage account, key vault, private endpoints, RBAC, and application insights. We will deploy a test application and test all connections.You will learn:How to implement secure connectivity with Private Endpoints.How to automate Role-based Access Controls (RBAC).How to deploy Key Vault Access Policies.How to calculate VNets and subnets IP ranges.How to support multiple environments with Bicep.How to define a resource naming strategy.And much more.This course will work best for those familiar with bicep, as I won't stop at the basics, like syntax. However, I included code samples after every demo so you can follow along, even if you haven't developed with bicep before. I strongly recommend repeating exercises with your own hands to maximize learning efficiency. Who this course is for: DevOps who want to harness complex secure architectures Developers who want to dive deeper into the Infrastructure as Code approach Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |