Learning Tracks - Advanced Track

Data Architecture
- Handling Large Data Volumes
- Query Plan tool
- Tuning Force.com performance
- Anti-patterns
- Data Quality and Governance
- Duplicate Management
- Master Data Management

Integration Architecture
- SOAP, REST, BULK, UI API in depth
- Integration patterns
- Mashups and Composite Applications
- Integration Security
- When to use which API?
- Salesforce to Salesforce Integration
- Streaming API
- OAuth 2.0, Named Creds, Connected Apps

Sharing and Visibility
- Sharing Architecture
- Salesforce Security Guide
- Record level sharing – under the hood
- Declarative sharing
- Apex based sharing
- Vulnerability prevention
- Account Teams, Opportunity Teams, Territory Management
- Community Access Guidelines
- Shield Platform Encryption

Deployment and Development Lifecycle
- Dev Lifecycle and Dev Models
- Agile & Governance
- Scrum and Kanban
- Salesforce DX
- Git and Github
- Package Development
- Enterprise Environment Management
- Apex Metadata API
- Salesforce1 Environment Management

Platform Events
- Platform Events and cache
- Salesforce Connect
- Event Monitoring
- Apex MetaData API

Identity and Access Architecture
- Identity Provider and Service Provider
- Common methods for Trusted Connections
- Authentication, Authorization or Accounting
- Methods for provisioning users
- Accepting 3rd party identity in Salesforce
- Salesforce as Identity provider
- OAuth flow types & Concepts
- Canvas, Connected Apps, App Launcher
- 2-Factor Authentication mechanisms
- Identity Connect
- Customized Registration experience for communities

Technical Architecture – Insights
- Salesforce Architecture under the hood
- Real world technical architecture problems and solutions

Certification FOCUS
- Data Architecture and Management Designer
- Integration Architecture Designer
- Development Lifecycle and deployment Designer
- Sharing and Visibility Designer
- Technical Architect

Final Hands-on FOCUS
- An implementation that covers all of what was discussed in this track