Azure: Create a Virtual Machine and Deploy a Web Server

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Azure: Create a Virtual Machine and Deploy a Web Server

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
In this Guided Project, you will create a Virtual Machine in Azure to deploy a web server, specifically a Nextcloud server. Instead of using just the presets, you will explore how the basic architecture of Azure works, by creating a Virtual Machine, connecting it to a subnet, protected by inbound and outbound rules thanks to Network Security Groups, in a Virtual Network. You'll also learn how to use Bastion to connect to the machine via SSH, without exposing an external port to the Internet, and then installing a simple Nextcloud server and make the Virtual Machine available to you by opening a public IP and a DNS label. Note: before taking this Guided Project, if you don't have an Azure subscription yet, please create an Azure Free Trial beforehand at https://portal.azure.com
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
Microsoft Reveals Kazuar Malware’s Advanced Modular Design and Peer-to-Peer Botnet Capabilities
Microsoft reveals Kazuar malware's advanced modular design and peer-to-peer botnet capabilities, posing a significant threat to cybersecurity
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
Up next
How do I restrict access of IAM Identities to specific Amazon EC2 resources?
Amazon Web Services
Watch →