| Topic | Details |
| Topic 1 | - Evaluate An Application Design Considering High-Availability And Resiliency
- Explain Architectural Patterns
|
| Topic 2 | - Explain Data Privacy Concerns Related To Storage And Transmission Of Data
- Explain Considerations Of Model-Driven Telemetry
|
| Topic 3 | - Describe The Capabilities Of Appdynamics When Instrumenting An Application
- Construct API Calls To Retrieve Data From Intersight
|
| Topic 4 | - Implement Mitigation Strategies For OWASP Threats (Such As XSS, CSRF, And SQL Injection)
- Configure Application Specific SSL Certificates
|
| Topic 5 | - Utilize RESTCONF To Configure A Network Device Including Interfaces, Static Routes, And Vlans (IOS XE Only)
|
| Topic 6 | - Construct API Requests To Create And Delete Objects Using Firepower Device Management (FDM)
- Software Development And Design
|
| Topic 7 | - Identify The Secret Storage Approach Relevant To A Given Scenario
- Construct An Application That Consumes A REST API That Supports Pagination
|
| Topic 8 | - Evaluate Choice Of Database Types With Respect To Application Requirements
- Construct A Sequence Diagram That Includes API Calls
|
| Topic 9 | - Construct A Python Script Using The UCS Apis To Provision A New UCS Server Given A Template
- Explain The Concepts Of Release Packaging And Dependency Management
|
| Topic 10 | - Describe The Benefits Of Continuous Testing And Static Code Analysis In A CI Pipeline
- Utilize Docker To Containerize An Application
|
| Topic 11 | - Describe Distributed Applications Related To The Concepts Of Front-End, Back-End, And Load Balancing
|
| Topic 12 | - Describe The Steps In The Oauth2 Three-Legged Authorization Code Grant Flow
- Diagnose Problems With An Application Given Logs Related To An Event
|
| Topic 13 | - Describe How End-To-End Encryption Principles Apply To Apis
- Implement Control Flow Of Consumer Code For Unrecoverable REST API Errors
|
| Topic 14 | - Identify A Configuration Management Solution To Achieve Technical And Business Requirements
- Describe The Tenets Of The "12-Factor App"
|
| Topic 15 | - Integrate An Application Into A Prebuilt CD Environment Leveraging Docker And Kubernetes
- Describe An Effective Logging Strategy For An Application
|