Passer directement au contenu principal

Certaines parties de cette page peuvent être traduites par machine ou IA.

DÉCOUVRIR, ÉTABLIR DES RELATION ET GRANDIR

Microsoft Reactor

Rejoignez Microsoft Reactor et collaborez avec les start-ups et les développeurs en direct

Êtes-vous prêt à démarrer avec l’IA ?  Microsoft Reactor propose des événements, des formations et des ressources communautaires pour aider les start-ups, les entrepreneurs et les développeurs à fonder leurs futures activités sur la technologie de l’IA. Rejoignez-nous !

DÉCOUVRIR, ÉTABLIR DES RELATION ET GRANDIR

Microsoft Reactor

Rejoignez Microsoft Reactor et collaborez avec les start-ups et les développeurs en direct

Êtes-vous prêt à démarrer avec l’IA ?  Microsoft Reactor propose des événements, des formations et des ressources communautaires pour aider les start-ups, les entrepreneurs et les développeurs à fonder leurs futures activités sur la technologie de l’IA. Rejoignez-nous !

Retourner

Securing a network with Bicep - EP3/3

21 avril, 2022 | 4:00 PM - 5:00 PM (UTC) Temps universel coordonné

  • Format:
  • alt##LivestreamStream en direct

Thème: DevSecOps et outils de développement

Langage: À l’aide de la langue anglaise

This is the third and final episode of three part series of Building and working with virtual networks in Azure.

Series Description:
As cloud computing becomes increasingly popular, you might think skills like networking and security are no longer needed. And whilst the cloud can automate many of these services, they are still required for custom solutions and experimentation. , In this three part series, Gwyn and Liam will break down how to deploy a virtual network to Azure with an infrastructure as code tool called Bicep, how to work within it, and how to secure it with security groups, access control lists (ACL), IAM (Identity & Access Management) (Identity & Access Management) policies, and more. If you are looking to improve your Bicep, networking, security, and Azure infrastructure skills, this series is for you.

Episode 3

What is the session about?
Continuing with our series, we have covered deployment and working within our virtual network. Now it is time to cover one of the most important pillars of Cloud, security. In this episode, Gwyn and Liam will break down how to secure your virtual networks using security groups, access control lists, subnets, IAM policies, and more.

Who is it aimed at?
This series episode is aimed at cloud developers and administrators.

Why should you attend?
You should attend if you are looking to implement or improve the security of your virtual networks or are planning to implement one in the future.

Any pre-requisites?

Speaker Bio’s

Gwyneth Pena-Siguenza

Gwyn is Regional Cloud Advocate at Microsoft, YouTuber and college droput. She is passionate about introducing people to the cloud and creating friendly and concise content. When she is not doing Advocate things, she is probably playing video games (Big fan of Days Gone, Far Cry, and Sleeping Dogs), hanging out with my family, friends, and partner, or eating mint chocolate chip ice cream.
Connect with Gwyn
Twitter: https://twitter.com/madebygps
LinkedIn: https://www.linkedin.com/in/madebygps/

Liam Hampton

Liam is a Regional Cloud Advocate at Microsoft, UK. He is an IoT hobbyist, a podcast co-host and a Software Engineer with multiple Professional Cloud Certifications. He is passionate about cloud computing, clean code and creating simple and concise content for others. When he is not writing code or presenting, you'll either find him searching for the next best eatery in London, studying different cultures or at the airport jetting of to explore the next city on his TODO list.
Connect with Liam
Twitter: https://twitter.com/liamchampton
Linkedin: https://www.linkedin.com/in/liam-conroy-hampton/kedin.com/in/liam-conroy-hampton/

Prérequis

Intervenants

Pour toute question, contactez-nous à l’adresse reactor@microsoft.com