Compute |
Select appropriate computing choices | 4 | |
Configure compute instances | 4 | Launch Compute Instance |
Configure Autoscaling | 4 | |
Describe OCI compute image options | 4 | |
Describe and configure OS Management | 4 | |
Explain Infrastructure Maintenance | 2 | |
Networking |
Implement and manage Virtual Cloud Networks | 4 | |
Describe public and private subnets | 4 | |
Describe public and private IP addresses and virtual NICs | 4 | |
Configure Virtual Cloud Network Routing and Gateways | 4 | |
Configure Security Lists and Network Security Groups | 4 | |
Implement and manage VCN connectivity | 4 | |
Evaluate VCN connectivity options | 2 | |
Configure Site-to-Site VPN | 4 | |
Describe FastConnect | 4 | |
Configure Local and Remote Peering | 4 | |
Implement transit routing scenarios | 4 | |
Configure DNS and Traffic Management | 4 | |
Describe Public and Private DNS zones | 4 | |
Configure Traffic Management Steering Policies | 4 | |
Explain Load Balancer concepts | 4 | |
Describe and configure Load Balancer and Network Load Balancer | 4 | |
Implement Web Application Acceleration | 4 | |
Implement Network Command Center Services | 4 | |
Analyze Inter-Region Latency | 4 | |
Implement Network Visualizer | 4 | |
Troubleshoot using Network Path Analyzer | 4 | |
Implement Capture filters and Virtual test access points | 4 | |
Storage |
Deploy and manage Block Storage | 4 | |
Explain Block Volume performance tiers | 4 | |
Deploy Block and Boot Volumes | 4 | |
Configure Volume Groups, Backups, Clones | 4 | |
Configure cross-region replication | 4 | |
Configure and manage Object Storage | 4 | |
Explain Object Storage tiers | 4 | |
Describe Object Storage Security | 4 | |
Implement Object Storage versioning, life cycle management and retention rules | 4 | |
Configure Multipart uploads | 4 | |
Configure Object Storage replication | 4 | |
Implement and manage File Storage | 4 | |
Configure File Storage | 4 | |
Describe File Storage Security | 2 | |
Configure File System Snapshots and Clone | 4 | |
Analyze File System usage and metering | 4 | |
Implement File Storage replication | 4 | |
Identity and Access Management |
Explain the core concepts of Identity and Access Management | 4 | |
Create and manage IAM domains, users, groups, and compartments | 2 | |
Implement IAM policies to control access to resources | 4 | |
Configure Dynamic Groups, Network Sources, and Tag-Based Access Control | 2 | |