| Compute |
| Select appropriate computing choices | 4 | |
| Configure compute instances | 4 | Launch Compute Instance |
| Configure Autoscaling | 4 | |
| Describe OCI compute image options | 4 | |
| Describe and configure OS Management | 4 | |
| Explain Infrastructure Maintenance | 2 | |
| Networking |
| Implement and manage Virtual Cloud Networks | 4 | |
| Describe public and private subnets | 4 | |
| Describe public and private IP addresses and virtual NICs | 4 | |
| Configure Virtual Cloud Network Routing and Gateways | 4 | |
| Configure Security Lists and Network Security Groups | 4 | |
| Implement and manage VCN connectivity | 4 | |
| Evaluate VCN connectivity options | 2 | |
| Configure Site-to-Site VPN | 4 | |
| Describe FastConnect | 4 | |
| Configure Local and Remote Peering | 4 | |
| Implement transit routing scenarios | 4 | |
| Configure DNS and Traffic Management | 4 | |
| Describe Public and Private DNS zones | 4 | |
| Configure Traffic Management Steering Policies | 4 | |
| Explain Load Balancer concepts | 4 | |
| Describe and configure Load Balancer and Network Load Balancer | 4 | |
| Implement Web Application Acceleration | 4 | |
| Implement Network Command Center Services | 4 | |
| Analyze Inter-Region Latency | 4 | |
| Implement Network Visualizer | 4 | |
| Troubleshoot using Network Path Analyzer | 4 | |
| Implement Capture filters and Virtual test access points | 4 | |
| Storage |
| Deploy and manage Block Storage | 4 | |
| Explain Block Volume performance tiers | 4 | |
| Deploy Block and Boot Volumes | 4 | |
| Configure Volume Groups, Backups, Clones | 4 | |
| Configure cross-region replication | 4 | |
| Configure and manage Object Storage | 4 | |
| Explain Object Storage tiers | 4 | |
| Describe Object Storage Security | 4 | |
| Implement Object Storage versioning, life cycle management and retention rules | 4 | |
| Configure Multipart uploads | 4 | |
| Configure Object Storage replication | 4 | |
| Implement and manage File Storage | 4 | |
| Configure File Storage | 4 | |
| Describe File Storage Security | 2 | |
| Configure File System Snapshots and Clone | 4 | |
| Analyze File System usage and metering | 4 | |
| Implement File Storage replication | 4 | |
| Identity and Access Management |
| Explain the core concepts of Identity and Access Management | 4 | |
| Create and manage IAM domains, users, groups, and compartments | 2 | |
| Implement IAM policies to control access to resources | 4 | |
| Configure Dynamic Groups, Network Sources, and Tag-Based Access Control | 2 | |