Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Becoming a Salesforce Certified Technical Architect
  • Table Of Contents Toc
Becoming a Salesforce Certified Technical Architect

Becoming a Salesforce Certified Technical Architect

By : Tameem Bahri
4.9 (30)
close
close
Becoming a Salesforce Certified Technical Architect

Becoming a Salesforce Certified Technical Architect

4.9 (30)
By: Tameem Bahri

Overview of this book

Salesforce Certified Technical Architect (CTA) is the ultimate certification to validate your knowledge and skills when it comes to designing and building high-performance technical solutions on the Salesforce platform. The CTA certificate is granted after successfully passing the CTA review board exam, which tests your platform expertise and soft skills for communicating your solutions and vision. You’ll start with the core concepts that every architect should master, including data lifecycle, integration, and security, and build your aptitude for creating high-level technical solutions. Using real-world examples, you’ll explore essential topics such as selecting systems or components for your solutions, designing scalable and secure Salesforce architecture, and planning the development lifecycle and deployments. Finally, you'll work on two full mock scenarios that simulate the review board exam, helping you learn how to identify requirements, create a draft solution, and combine all the elements together to create an engaging story to present in front of the board or to a client in real life. By the end of this Salesforce book, you’ll have gained the knowledge and skills required to pass the review board exam and implement architectural best practices and strategies in your day-to-day work.
Table of Contents (21 chapters)
close
close
1
Section 1: Your Journey to Becoming a CTA
6
Section 2: Knowledge Domains Deep Dive
14
Section 3: Putting It All Together

Cryptographic algorithm types and use cases

The two types of cryptography algorithms that we will dive into are symmetric cryptography algorithms and asymmetric encryption algorithms. We will also dig into the details of hashing algorithms, digital signatures, and message authentication codes (MACs).

Symmetric cryptography algorithms

This is the family of algorithms that relies on a symmetric key for both encrypting the plaintext and decrypting ciphertext. As we discussed earlier, storing the key in a secure and safe way is absolutely crucial for this type of algorithm. The need for sharing the key between both parties (sender and recipient) is one of the main drawbacks of these types of algorithms as the attacker could intercept the used channel and get access to the key. There have been several workarounds during history (remember, some of these algorithms have been around for many years). More streamlined approaches have been adopted in the digital world, and we will find...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Becoming a Salesforce Certified Technical Architect
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon