Module 01:
Compute
- Select appropriate computing choices
- Configure compute instances
- Configure Autoscaling
- Describe OCI compute image options
- Describe and configure OS Management
- Explain Infrastructure Maintenance
Module 02:
Networking
- Implement and manage Virtual Cloud Networks
- Describe public and private subnets
- Describe public and private IP addresses and virtual NICs
- Configure Virtual Cloud Network Routing and Gateways
- Configure Security Lists and Network Security Groups
- Implement and manage VCN connectivity
- Evaluate VCN connectivity options
- Configure Site-to-Site VPN
- Describe FastConnect
- Configure Local and Remote Peering
- Implement transit routing scenarios
- Configure DNS and Traffic Management
- Describe Public and Private DNS zones
- Configure Traffic Management Steering Policies
- Explain Load Balancer concepts
- Describe and configure Load Balancer and Network Load Balancer
- Implement Web Application Acceleration
- Implement Network Command Center Services
- Analyze Inter-Region Latency
- Implement Network Visualizer
- Troubleshoot using Network Path Analyzer
- Implement Capture filters and Virtual test access points
Module 03:
Storage
- Deploy and manage Block Storage
- Explain Block Volume performance tiers
- Deploy Block and Boot Volumes
- Configure Volume Groups, Backups, Clones
- Configure cross-region replication
- Configure and manage Object Storage
- Explain Object Storage tiers
- Describe Object Storage Security
- Implement Object Storage versioning, life cycle management and retention rules
- Configure Multipart uploads
- Configure Object Storage replication
- Implement and manage File Storage
- Configure File Storage
- Describe File Storage Security
- Configure File System Snapshots and Clone
- Analyze File System usage and metering
- Implement File Storage replication
Module 04:
Identity and Access Management
- Explain the core concepts of Identity and Access Management
- Create and manage IAM Modules, users, groups, and compartments
- Implement IAM policies to control access to resources
- Configure Dynamic Groups, Network Sources, and Tag-Based Access Control


