Building Secure Architecture with Bicep.
Published 7/2024
Duration: 1h2m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 467 MB
Genre: eLearning | Language: English
Published 7/2024
Duration: 1h2m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 467 MB
Genre: eLearning | Language: English
Building Secure Architecture with Bicep. Implementing private endpoints in Azure.
What you'll learn
Implement secure connectivity with Private Endpoints (Infrastructure as Code)
Automate Role-Based Access Controls (RBAC) deployment
Calculate and define VNet/Subnet IP ranges
Support IaC in multiple environments
Requirements
Basic Azure Cloud knowledge
Basic Azure Bicep experience
Description
Following the infrastructure and code approach is a solid long-term investment, and Bicep is the best instrument for automating Azure infrastructure. However, implementing advanced secure solutions, like private endpoints, is often a bigger deal. The amount of information available on the Internet fades quickly as task complexity increases.
My course will give you recipes and insights on organizing, delivering, and maintaining advanced Azure architectures. It is 100% practice-oriented and contains minimal theory.
We will implement a cloud infrastructure comprising app service, storage account, key vault,
private endpoints
,
RBAC
, and application insights. We will deploy a test application and test all connections.
You will learn:
How to implement secure connectivity with Private Endpoints.
How to automate Role-based Access Controls (RBAC).
How to deploy Key Vault Access Policies.
How to calculate VNets and subnets IP ranges.
How to support multiple environments with Bicep.
How to define a resource naming strategy.
And much more.
This course will work best for those familiar with bicep, as I won’t stop at the basics, like syntax. However, I included code samples after every demo so you can follow along, even if you haven’t developed with bicep before. I strongly recommend repeating exercises with your own hands to maximize learning efficiency.
Who this course is for:
DevOps who want to harness complex secure architectures
Developers who want to dive deeper into the Infrastructure as Code approach
More Info