Connecting...Academia & Industry

Oracle Cloud Infrastructure 2024 Certified Architect Associate

Cloud Infrastructure

The Oracle Cloud Infrastructure 2024 Architect Associate exam is designed for individuals who possess a strong foundational knowledge of architecting infrastructure using Oracle Cloud Infrastructure (OCI) services. This certification validates a deep understanding of topics such as Identity and Access Management, Networking, Compute & Storage.

Prepare to pass exam: 1Z0-1072-24

The Oracle Cloud Infrastructure 2024 Architect Associate exam is designed for individuals who possess a strong foundational knowledge of architecting infrastructure using Oracle Cloud Infrastructure (OCI) services. This certification validates a deep understanding of topics such as Identity and Access Management, Networking, Compute & Storage.

Review Exam Topics

The following table lists the exam objectives and their weightings.

Objectives% of Exam
Compute20%
Networking35%
Storage25%
Identity and Access Management20%

Compute

  • Select appropriate computing choices
  • Configure compute instances
  • Configure Autoscaling
  • Describe OCI compute image options
  • Describe and configure OS Management
  • Explain Infrastructure Maintenance

Networking

  • Implement and manage Virtual Cloud Networks
  • Describe public and private subnets
  • Describe public and private IP addresses and virtual NICs
  • Configure Virtual Cloud Network Routing and Gateways
  • Configure Security Lists and Network Security Groups
  • Implement and manage VCN connectivity
  • Evaluate VCN connectivity options
  • Configure Site-to-Site VPN
  • Describe FastConnect
  • Configure Local and Remote Peering
  • Implement transit routing scenarios
  • Configure DNS and Traffic Management
  • Describe Public and Private DNS zones
  • Configure Traffic Management Steering Policies
  • Explain Load Balancer concepts
  • Describe and configure Load Balancer and Network Load Balancer
  • Implement Web Application Acceleration
  • Implement Network Command Center Services
  • Analyze Inter-Region Latency
  • Implement Network Visualizer
  • Troubleshoot using Network Path Analyzer
  • Implement Capture filters and Virtual test access points

Storage

  • Deploy and manage Block Storage
  • Explain Block Volume performance tiers
  • Deploy Block and Boot Volumes
  • Configure Volume Groups, Backups, Clones
  • Configure cross-region replication
  • Configure and manage Object Storage
  • Explain Object Storage tiers
  • Describe Object Storage Security
  • Implement Object Storage versioning, life cycle management and retention rules
  • Configure Multipart uploads
  • Configure Object Storage replication
  • Implement and manage File Storage
  • Configure File Storage
  • Describe File Storage Security
  • Configure File System Snapshots and Clone
  • Analyze File System usage and metering
  • Implement File Storage replication

Identity and Access Management

  • Explain the core concepts of Identity and Access Management
  • Create and manage IAM domains, users, groups, and compartments
  • Implement IAM policies to control access to resources
  • Configure Dynamic Groups, Network Sources, and Tag-Based Access Control

Related Courses

Office Cloud
Professional Certification

Microsoft 365 Administrator

Become a Certified Microsoft 365 Administrator: Take charge of your organization’s productivity and security with our comprehensive Microsoft 365 Administrator certification course. Learn to deploy, manage, and secure Microsoft 365 services including Exchange Online, SharePoint Online, Teams, and more. Gain expertise in user management, data governance, compliance, and troubleshooting to maximize the efficiency and security of your Microsoft 365 environment. Ideal for IT professionals seeking to become proficient administrators of Microsoft 365. Start your journey to mastering Microsoft 365 administration today!

Azure Cloud
Professional Certification

Deploy and Configure Azure Monitor

Master Deploying and Configuring Azure Monitor: Elevate your cloud management capabilities with our in-depth course on deploying and configuring Azure Monitor. Learn to set up and utilize Azure Monitor for comprehensive insights into your cloud infrastructure. Gain expertise in configuring alerts, analyzing metrics, and optimizing performance and security using Azure’s powerful monitoring tools. Ideal for IT professionals and Azure administrators aiming to enhance their monitoring and operational efficiency in the cloud. Start your journey to mastering Azure Monitor deployment and configuration today!

Hacking Forensic
Professional Certification

Computer Hacking Forensic Investigator (CHFI)

Become a Certified Hacking Forensic Investigator: Master the art of digital forensics with our Hacking Forensic certification course. Learn to uncover digital evidence, analyze cyber incidents, and investigate hacking activities. Gain expertise in forensic tools, techniques, and methodologies to solve cybercrimes and secure systems. Ideal for IT professionals and cybersecurity enthusiasts aiming to specialize in digital forensics and cyber investigation. Start your journey to becoming a hacking forensic expert today!

User Security
Professional Certification

Certified Secure Computer User (CSCU)

Become a Certified Secure Computer User: Safeguard your digital life with our Secure Computer User certification course. Learn essential skills to protect your personal and professional data from cyber threats, including malware, phishing, and social engineering attacks. Gain knowledge in safe internet practices, email security, and data protection. Ideal for individuals and employees seeking to enhance their cybersecurity awareness and stay safe online. Start your journey to becoming a secure computer user today!

Professional Certification

Certified Ethical Hacker (CEH)

Become a Certified Ethical Hacker: Dive into the world of cybersecurity with our Ethical Hacking certification course. Learn to identify vulnerabilities, conduct penetration testing, and secure systems against cyber threats. Master tools and techniques used by ethical hackers to protect networks, applications, and data. Ideal for IT professionals and security enthusiasts aiming to safeguard organizations from malicious attacks. Start your journey to becoming an ethical hacking expert today!