Data Architecture
- Handling Large Data Volumes
- Query Plan tool
- Tuning Force.com performance
- Anti-patterns
- Data Quality and Governance
- Duplicate Management
- Master Data Management
Integration Architecture
- SOAP, REST, BULK, UI API in depth
- Integration patterns
- Mashups and Composite Applications
- Integration Security
- When to use which API?
- Salesforce to Salesforce Integration
- Streaming API
- OAuth 2.0, Named Creds, Connected Apps
Sharing and Visibility
- Sharing Architecture
- Salesforce Security Guide
- Record level sharing – under the hood
- Declarative sharing
- Apex based sharing
- Vulnerability prevention
- Account Teams, Opportunity Teams, Territory Management
- Community Access Guidelines
- Shield Platform Encryption
Deployment and Development Lifecycle
- Dev Lifecycle and Dev Models
- Agile & Governance
- Scrum and Kanban
- Salesforce DX
- Git and Github
- Package Development
- Enterprise Environment Management
- Apex Metadata API
- Salesforce1 Environment Management
Platform Events
- Platform Events and cache
- Salesforce Connect
- Event Monitoring
- Apex MetaData API
Identity and Access Architecture
- Identity Provider and Service Provider
- Common methods for Trusted Connections
- Authentication, Authorization or Accounting
- Methods for provisioning users
- Accepting 3rd party identity in Salesforce
- Salesforce as Identity provider
- OAuth flow types & Concepts
- Canvas, Connected Apps, App Launcher
- 2-Factor Authentication mechanisms
- Identity Connect
- Customized Registration experience for communities
Technical Architecture – Insights
- Salesforce Architecture under the hood
- Real world technical architecture problems and solutions
Certification Focus
- Data Architecture and Management Designer
- Integration Architecture Designer
- Development Lifecycle and deployment Designer
- Sharing and Visibility Designer
- Technical Architect
Final Hands-on Exercise
- An implementation that covers all of what was discussed in this track