| Topic | Details |
| Topic 1 | - Implementing Identity and Access Management (IAM): This section of the exam measures skills of OCI Administrators and focuses on identity and access controls. It covers IAM domains, users, groups, and compartments, as well as the use of IAM policies to manage access to resources. Candidates are also tested on configuring dynamic groups, network sources, and tag-based access control, along with managing MFA, sign-on policies, and activity monitoring.
|
| Topic 2 | - Protecting Infrastructure - Network and Applications: This section of the exam measures the skills of Cloud Security Professionals and covers methods for securing networks and applications on OCI. Topics include network security groups, firewalls, and security lists, while also focusing on the use of load balancers for availability. The section further addresses the configuration of OCI certificates and web application firewalls to strengthen infrastructure security.
|
| Topic 3 | - Detecting, Remediating, and Monitoring OCI Resources: This section of the exam measures the skills of OCI Administrators and emphasizes monitoring and maintaining security posture across cloud resources. It focuses on the use of Cloud Guard, security zones, and the Security Advisor. Candidates also need to understand how to identify rogue users with threat intelligence, as well as use monitoring, logging, and event services for continuous visibility into performance and security.
|
| Topic 4 | - OCI Security Introduction: This section of the exam measures the skills of Cloud Security Professionals and covers the basics of security in Oracle Cloud Infrastructure. It introduces the shared security responsibility model, the core principles of security design, and the use of foundational security services to secure deployments on OCI.
|
| Topic 5 | - Protecting Data: This section of the exam measures the skills of Cloud Security Professionals and highlights data security practices in OCI. It tests knowledge of using the Key Management Service for encryption keys, managing secrets in the OCI Vault, and applying features of OCI Data Safe to ensure sensitive data remains protected.
|