0% found this document useful (0 votes)
210 views8 pages

OCI Course Contents

The document outlines the training contents for OCI (Oracle Cloud Infrastructure). It covers topics such as identity and access management, networking including virtual cloud networks, load balancing, and connectivity options, compute services, storage including object storage, block storage and file storage, database services, security services, and observability and management services including monitoring and logging. It also includes sections on designing network architectures, high availability and disaster recovery solutions, cloud-native and serverless architectures, infrastructure as code, and deploying Oracle database and autonomous database services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views8 pages

OCI Course Contents

The document outlines the training contents for OCI (Oracle Cloud Infrastructure). It covers topics such as identity and access management, networking including virtual cloud networks, load balancing, and connectivity options, compute services, storage including object storage, block storage and file storage, database services, security services, and observability and management services including monitoring and logging. It also includes sections on designing network architectures, high availability and disaster recovery solutions, cloud-native and serverless architectures, infrastructure as code, and deploying Oracle database and autonomous database services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

OCI Training Contents

1. OCI Introduction

2. OCI Architecture

3. Identity and Access Management


3.1.1. Introduction
3.1.2. Identity Domains
3.1.3. AuthN
3.1.4. AuthZ
3.1.5. Common Policies
3.1.6. Compartments
3.1.7. Policy Inheritance and Attachment
3.1.8. Conditional Policies
3.1.9. Network Sources
3.1.10. Tag based Access Control
3.1.11. Dynamic Groups

4. Networking – Virtual Cloud Network


4.1.1. Introduction to VCN
4.1.2. Introduction to CIDR Notation
4.1.3. Introduction to RFC 1918
4.1.4. Introduction to Subnet
4.1.5. Security List
4.1.6. Network Security Group
4.1.7. Bastion
4.1.8. Internet Gateway
4.1.9. NAT Gateway
4.1.10. Service Gateway
4.1.11. Local Peering Gateway
4.1.12. Route Table

5. Networking – Connectivity
5.1.1. Connectivity Options
5.1.2. Dynamic Routing Gateway – Part 1
5.1.3. Dynamic Routing Gateway – Part 2
5.1.4. DRG Route Tables
5.1.5. Remote Peering Connection
5.1.6. Site-to-Site VPN
5.1.7. FastConnect

6. Networking – Load Balancer


6.1.1. Load Balancer
6.1.2. Public and Private Load Balancers
6.1.3. Load Balancer Policies and Health Checks
6.1.4. Network Load Balancer
7. Networking – DNS Management
7.1.1. DNS Service
7.1.2. OCI DNS Management
7.1.3. Private DNS
7.1.4. Traffic Management

8. Networking – Other Services


8.1.1. Inter-Region Latency Dashboard
8.1.2. Network Visualizer
8.1.3. Introduction to IPv6 with Oracle
8.1.4. Bring Your Own IP

9. Compute
9.1.1. Overview of Compute Service
9.1.2. Platform and Custom Images
9.1.3. Import/Export and Bring Your Own Image
9.1.4. Compute Shapes
9.1.5. Bare Metal versus VM versus Dedicated Hosts
9.1.6. Capacity Types – Preemptible Instances
9.1.7. Capacity Types – Capacity Reservations
9.1.8. Capacity Types – Dedicated VM Host
9.1.9. Burstable Instances
9.1.10. Compute: Vertical Scaling
9.1.11. Compute: Auto Scaling
9.1.12. Oracle Cloud Agent
9.1.13. OS Management Service
9.1.14. Run Command
9.1.15. Instance Console Connection
9.1.16. Infrastructure Maintenance
9.1.17. Shielded Instances

10. Object Storage


10.1.1. Overview of Object Storage
10.1.2. Object Storage Resources
10.1.3. Object Storage Characteristics
10.1.4. Multipart Uploads
10.1.5. Managing Buckets and Objects
10.1.6. Object Storage Tiers
10.1.7. Auto-Tiering
10.1.8. Object Lifecycle Management
10.1.9. Object Storage Replication
10.1.10. Object Versioning
10.1.11. Retention Rules
10.1.12. Object Copy
10.1.13. Object Storage Logging
10.1.14. Securing Object Storage
10.1.15. Pre-Authenticated Requests

11. Block Storage


11.1.1. Overview of Block Storage
11.1.2. Volume Attachment Types
11.1.3. Volume Access Types
11.1.4. Boot Volumes
11.1.5. Block Volume Performance
11.1.6. Auto-tune Volume Performance
11.1.7. Resizing a Volume
11.1.8. Block Volume Backups
11.1.9. Block Volume Clones
11.1.10. Block Volume Backup versus Clone Operation
11.1.11. Cross Region Replication
11.1.12. Volume Groups
11.1.13. Cross Availability Domain Replication

12. File Storage


12.1.1. Overview of File Storage
12.1.2. File Storage Concepts
12.1.3. NFS Export Options
12.1.4. File Storage
12.1.5. File System Snapshots
12.1.6. File System Cloning
12.1.7. In-Transit Encryption
12.1.8. File Storage Security
12.1.9. File System Usage and Metering

13. Database
13.1.1. OCI Database Services Introduction
13.1.2. DB Systems Introduction
13.1.3. DB Systems Operations
13.1.4. DB Systems Maintenance
13.1.5. Autonomous Databases Introduction
13.1.6. Autonomous Database Operations
13.1.7. Autonomous Database Maintenance
13.1.8. Monitoring Database Services
13.1.9. External Database Service
13.1.10. Setting DB Time Zone
13.1.11. Database Migration

14. OCI Security


14.1.1. Shared Security Model
14.1.2. Security Services Introduction
14.1.3. What is Cloud Security Posture Management?
14.1.4. Cloud Guard Introduction
14.1.5. Cloud Guard Concepts
14.1.6. Cloud Guard Problems
14.1.7. Cloud Guard – Mange Detector Recipes
14.1.8. Cloud Guard – Responder Recipes
14.1.9. Cloud Guard Notifications
14.1.10. Security Zones and Security Advisor
14.1.11. Encryption Basics
14.1.12. Vault Introduction
14.1.13. Import and Export Keys
14.1.14. OCI Services Integration with Vault
14.1.15. Backup and Replicate Vaults and Keys
14.1.16. Secrets

15. Observability and Management – Introduction


15.1.1. Introducing Observability and Management Services

16. Observability and Management – Monitoring


16.1.1. Monitoring Service – Getting Started
16.1.2. Key Concepts
16.1.3. Notification Service
16.1.4. Access and Limits
16.1.5. Service Metrics
16.1.6. Metric Queries
16.1.7. Managing Alarms

17. Observability and Management – Logging


17.1.1. Logging Service: Overview
17.1.2. Fundamental Concepts
17.1.3. Enabling Service Logs
17.1.4. Working with Custom Logs
17.1.5. Access, Search and Explore Logs
17.1.6. Searching Logs with Queries
17.1.7. Service Connectors
1. Design and Implement a Real-World Network Architecture
1.1.1. Networking Workshop

2. Design Scalable and Resilient Solutions for HA and DR


2.1.1. High Availability
2.1.2. High Availability – moving to a highly available architecture.
2.1.3. Disaster Recovery
2.1.4. Disaster Recovery Planning

3. Design Cloud-Native, Microservices, and Serverless Architecture


3.1.1. Microservices Architecture Overview
3.1.2. Design Methodology of Microservices
3.1.3. Introduction to Containerization
3.1.4. OCI Registry OCIR: Introduction
3.1.5. Managing OCI Registry (OCIR)
3.1.6. Demo Managing OCIR
3.1.7. Introduction to Kubernetes
3.1.8. Introduction to OKE
3.1.9. Prerequisite to Create an OKE Cluster
3.1.10. Creating OKE Cluster on OCI
3.1.11. Demo Creating OKE Cluster on OCI
3.1.12. Setting Up Cluster Access
3.1.13. Demo Setting Up Cluster Access
3.1.14. Deploying an Application to OKE
3.1.15. Demo Deploying an Application to OKE
3.1.16. Tagging Cluster Resources
3.1.17. User-Managed Keys
3.1.18. Custom cloud-init Scripts
3.1.19. File Storage for PVCs
3.1.20. Capacity Reservations
3.1.21. Network Security Groups
3.1.22. Overview of Serverless Functions
3.1.23. Serverless Functions – Triggers
3.1.24. Serverless Functions – Use Cases
3.1.25. Serverless Functions – Concepts
3.1.26. Demo – Functions QuickStart on Cloud Shell
3.1.27. Demo – Creating a Function from a custom Dockerfile
3.1.28. Introduction to API Management
3.1.29. Setting Up API Gateway
3.1.30. Creating an API
3.1.31. Monitoring APIs
3.1.32. Network Security Groups
3.1.33. Custom Trust Store
3.1.34. Mutual TLS (mTLS) Support
4. Deliver Infrastructure as a code
4.1.1. Introduction to Terraform and Terraform Configuration
4.1.2. OCI Resource Manager Basics
4.1.3. Syncing Resource Manager and Infrastructure
4.1.4. Extending the console

5. Deploy Oracle Database Cloud Service


5.1.1. Oracle DBCS – Custom Database Software Image
5.1.2. Oracle DBCS – Security
5.1.3. DBCS – Custom Database Software Image
5.1.4. Connect VM DBCS in Private Subnet – Using Bastion Service
5.1.5. Move VM DBCS
5.1.6. Oracle ExaCS DB Changes
5.1.7. Database Cloud Service [Monitoring Metrics and Events]
5.1.8. Cloning in VM DBCS
5.1.9. Autonomous Database - Monitoring Metrics and Events

6. Deploy Oracle Autonomous Database


6.1.1. Oracle Autonomous Database – Auto Provisioning
6.1.2. Oracle Autonomous Database – Auto Configuration
6.1.3. Oracle Autonomous Database – Auto Indexing
6.1.4. Oracle Autonomous Database – Automatic Partitioning
6.1.5. Oracle Autonomous Database – Optimizer Statistics
6.1.6. Oracle Autonomous Database – Initialization Parameters
6.1.7. Oracle Autonomous Database – Scaling
6.1.8. Autonomous Database – Shared Scale Up Operation (Demo: Scaling)
6.1.9. Autonomous Database – Auto Start and Stop Feature
6.1.10. Oracle Autonomous Database – Controlled Access
6.1.11. Oracle Autonomous Database – Encryption
6.1.12. Oracle Autonomous Database – TDE Master Key Encryption
6.1.13. Oracle Autonomous Database – Patching
6.1.14. Oracle Autonomous Database – Auditing
6.1.15. Autonomous Database (Shared) – Using Customer-Managed Keys
6.1.16. Autonomous Database (Shared) – Authentication Using IAM
6.1.17. Oracle Autonomous Database – Self-Repairing
6.1.18. Oracle Autonomous Database (Deployment Options)
6.1.19. Oracle Autonomous Database (Shared Provisioning)
6.1.20. Autonomous Database (Shared) – Network Access
6.1.21. Oracle Autonomous Database [Dedicated | Provisioning]
6.1.22. Autonomous Database (Dedicated) – Provisioning (Demo)
6.1.23. Oracle Autonomous Database – Cloning
6.1.24. Autonomous Database (Shared) – Cloning (Demo)
6.1.25. Autonomous Database (Shared) – Backup and Recover
6.1.26. Oracle Autonomous Database [Patching and Updates]
6.1.27. Oracle Autonomous Database – Disaster Recovery
6.1.28. Autonomous Database (Shared) – Autonomous Data Guard (Demo)
6.1.29. Oracle Autonomous Database – Database Actions
6.1.30. Autonomous Database - Database Actions (Demo)

7. Design for Hybrid Cloud Architecture


7.1.1. VMWare Product Overview
7.1.2. Use Cases, Key Benefits & Values
7.1.3. SDDC Deployment
7.1.4. Designing a Hybrid Cloud
7.1.5. Demo – OCVS
7.1.6. Demo – Accessing SDDC
7.1.7. Access to Microsoft Azure

8. Migrate On-Premises Workloads to OCI


8.1.1. Data Migration
8.1.2. Data Migration – Data Transfer Appliance and Disk
8.1.3. Data Migration – Online migration
8.1.4. Demo: Storage Gateway
8.1.5. Data Migration to OCI
8.1.6. Data Migration to OCI DBCS – UI Based Migration Tools
8.1.7. Data Migration to OCI DBCS – Remote Cloning
8.1.8. Data Migration to OCI DBCS – RMAN
8.1.9. Data Migration to OCI DBCS – Datapump
8.1.10. Data Migration to OCI DBCS – Other Tools and Methods
8.1.11. Data Migration to OCI DBCS – Automated Migration Methods

9. Design for Security and Compliance


9.1.1. OCI Web Application Firewall
9.1.2. WAF Components
9.1.3. Demo Load Balancer and WAF policies
9.1.4. Demo Creating WAF Policy: Demo – Creating a WAF Access Control
9.1.5. Demo – Enabling Protection Rules and XSS
9.1.6. Demo – Creating a WAF Bot Management.pptx
9.1.7. Demo – Adding Access Control Rule
9.1.8. Certificates
9.1.9. Demo – Certificates
9.1.10. Demo – Certificate Authority – Part 1
9.1.11. Demo – Certificate Authority – Part 2
9.1.12. OS Management with Oracle Cloud Infrastructure
9.1.13. Demo – OS Management
9.1.14. Vulnerability Scanning
9.1.15. Demo – Cloud Guard Integration with Vulnerability Scanning
9.1.16. Oracle Data Safe
9.1.17. Oracle Data Safe in OCI
9.1.18. Oracle Data Safe – Security Assessment
9.1.19. Oracle Data Safe – User Assessment
9.1.20. Oracle Data Safe – Activity Auditing
9.1.21. Oracle Data Safe – Data Recovery
9.1.22. Oracle Data Safe – Data Masking
9.1.23. Oracle Data Safe – Architecture
9.1.24. Oracle Data Safe – Targets DB Connectivity

10. Implement Real-World Architectures


10.1.1. Reference Architecture 1: Architecture Overview
10.1.2. Reference Architecture 2: Hub-Spoke Architecture
10.1.3. Reference Architecture 3: HPC Architecture
10.1.4. Reference Architecture 4: Security Architecture

You might also like