Microsoft Azure for .NET Developers - Building Secure Services and Applications

This course will teach you how to use software containers, Microsoft Service Fabric, and Azure Resource Manager Templates to build and deploy applications and services.
Course info
Rating
(53)
Level
Advanced
Updated
June 30, 2017
Duration
4h 38m
Table of contents
Cloud Identity
58m 33s
Description
Course info
Rating
(53)
Level
Advanced
Updated
June 30, 2017
Duration
4h 38m
Description

There are many approaches you can use to building and deploying secure applications in the cloud. In this course, Microsoft Azure for .NET Developers - Building Secure Services and Applications, you'll mainly be focusing on different techniques you can use with Microsoft Azure. You'll see how to use both software containers and Microsoft service fabric. You will also integrate with Azure Active Directory to secure both web application pages and web APIs using standard protocols like OpenID Connect. By the end of the course, you'll have a solid knowledge of these different technologies and make informed decisions about the architecture for the systems you build.

About the author
About the author

Scott has over 15 years of experience in commercial software development and is a frequent speaker at national conferences, and local user groups. Scott is a Microsoft MVP and has authored books on several Microsoft technologies, including ASP.NET, C#, and Windows Workflow.

More from the author
More courses by Scott Allen
Transcript
Transcript

Hi, this is Microsoft MVP Scott Allen, and this course on Microsoft Azure will focus on building and deploying secure services and applications. We will look at how to use software containers. and Docker for Windows, and we'll also see how to use Microsoft's Service Fabric which is the technologybehind many of the Azure resources we use, like Azure SQL.

We will secure our APIs and applications using Azure Active Directory, and also provision everything we need in the microsoft cloud using Azure resource manager templates.

By the end of the course, you'll have an understandign of the different approaches you can use to build your own secure systems, and I hope you'll enjoy the course.