Description

Thanks to this 100% online Postgraduate diploma, you will acquire advanced technical skills to implement and manage effective security measures, as well as to identify and mitigate potential vulnerabilities"

##IMAGE##

Salesforce Security ensures comprehensive protection of confidential and sensitive information through robust encryption and access control measures. It also gives users peace of mind by providing proactive threat monitoring, suspicious activity detection and immediate response to security incidents. This not only strengthens customer confidence, but also ensures compliance with regulations and data security standards.

This is how this comprehensive Postgraduate diploma was conceived, which will delve into APIs and integrations in Salesforce, addressing the configurations needed to enable secure integrations, along with detailed demonstration of how the different types of APIs available work. In addition, the computer scientists will develop practical cases of massive data export and import using the Bulk API, as well as how to subscribe to the event bus to capture relevant information.
In addition, various Trigger frameworks will be analyzed, designing effective error management mechanisms. SOLID principles will also be explored to ensure software efficiency and scalability, and specialized knowledge in Apex Enterprise Patterns will be generated to optimally organize Apex code.

Finally, professionals will be immersed in the best development practices to ensure the protection of applications in Apex, Visualforce, Aura and LWC environments. They will delve into Salesforce's inverted security pyramid and compile effective measures to protect solutions against possible external attacks. To this we must add the proper monitoring of access to the application by users and applications, ensuring a secure and reliable operation.

In this way, TECH has implemented this Postgraduate diploma completely online, offering students the flexibility to access according to their needs, anytime and anywhere. They will only need a device with an Internet connection to progress securely in their academic and professional career. Likewise, this program takes advantage of the innovative Relearning methodology to enhance learning.

Specialize in Salesforce Security with TECH! With your help, organizations will be able to operate with peace of mind, focusing their efforts on innovating and growing, knowing that their data is protected"

This Postgraduate diploma in Salesforce Security contains the most complete and up-to-date program on the market. The most important features include:

  • Development of practical cases presented by experts in Salesforce Security
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where self-assessment can be used to improve learning.
  • Its special emphasis on innovative methodologies 
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

Do you want to specialize in Salesforce Security? Now you can, with TECH! You will analyze in depth in SOLID principles to create a robust and scalable code. Enroll now!”

The program’s teaching staff includes professionals from the field who contribute their work experience to this educational program, as well as renowned specialists from leading societies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive education programmed to learn in real situations.

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise during the academic year For this purpose, the students will be assisted by an innovative interactive video system created by renowned and experienced experts.

You will be able to correctly monitor user and application access, ensuring secure and efficient operations at all times. What are you waiting for to enroll?"

##IMAGE##

You will cover everything from the necessary configuration to enable inbound integrations, to the practical demonstration of different API types and use cases with the Bulk API"

Syllabus

This comprehensive program has been designed to address current challenges in data protection and security on the Salesforce platform. As such, the content will cover a wide range of topics, from API configuration and integrations to ensure effective security policies, to advanced Salesforce programming, exploring Triggers frameworks, SOLID principles and Apex Enterprise Patterns. In addition, you will delve into the understanding of security on this platform, analyzing development best practices, the inverted security pyramid and measures to protect solutions against external attacks.

##IMAGE##

From detailed understanding of Salesforce integrations and APIs, to the practical application of Triggers frameworks, you will equip yourself with the skills needed to develop secure and robust solutions"

Module 1. API and Integrations in Salesforce

1.1. Salesforce Integration

1.1.1. Outbound Integrations from Salesforce
1.1.2. Inbound Integrations to Salesforce
1.1.3. Salesforce to Salesforce Integrations
1.1.4. Salesforce API Libraries

1.2. External Services

1.2.1. Open API Standard Specification
1.2.2. External Credentials
1.2.3. Named Credentials

1.3. Connected Apps

1.3.1. Connected App
1.3.2. Integration Scopes
1.3.3. Integration Authorization and Identity Management
1.3.4. Connected Apps Security Policies

1.4. SOAP API

1.4.1. Enterprise WSDL
1.4.2. WSDL Partner
1.4.3. Apex WSDL
1.4.4. WSDL Metadata

1.5. Synchronous REST Integrations

1.5.1. REST API in Salesforce
1.5.2. Connect REST API in Salesforce
1.5.3. Document Management in Salesforce via API

1.6. API for Data Migration

1.6.1. Bulk API
1.6.2. Configuration and Execution of Bulk Data Migration by Bulk API
1.6.3. Data Processing in Bulk Loads
1.6.4. Bulk API 1.0 vs. Bulk API 2.0

1.7. Event-driven Integration

1.7.1. Platform Event Bus
1.7.2. Streaming API in Salesforce
1.7.3. Pub/Sub API in Salesforce
1.7.4. Change Data Capture
Event Subscription from External Systems with the cometD Framework

1.8. Integration for Configuration and Development

1.8.1. Tooling API
1.8.2. API Metadata
1.8.3. Dynamic Org Management Based on Tooling API

1.9. Data Synchronization between Orgs

1.9.1. Data Synchronization Patterns Between Orgs
1.9.2. Salesforce Connect with Cross-Org Adapter
1.9.3. Open Data Protocol (oData)
1.9.4. GraphQL with oData

1.10. Integration Patterns

1.10.1. Remote Process Invocation-Request and Reply
1.10.2. Remote Process Invocation-Fire and Forget
1.10.3. Batch Data Synchronization
1.10.4. Remote Call-In
1.10.5. UI Update Based on Data Changes
1.10.6. Data Virtualization

Module 2. Advanced Programming in Salesforce

2.1. Dynamic Apex

2.1.1. Dynamic Access to Object and Field Definitions
2.1.2. Dynamic SOQL
2.1.3. Dynamic DML

2.2. Platform Cache

2.2.1. Platform Cache. Uses
2.2.2. Org Cache
2.2.3. Session Cache
2.2.4. Best Practices

2.3. Platform Event Bus

2.3.1. Platform Event Bus. Uses
2.3.2. Publication of an Event 
2.3.3. Subscription to an Event

2.4. SOLID Principles

2.4.1. Single Responsability
2.4.2. Open-closed
2.4.3. Liskov Substitution
2.4.4. Interface Segregation
2.4.5. Dependency Inversion

2.5. Apex Enterprise Pattern

2.5.1. Separation of Concerns (SOC)
2.5.2. Selector Layer
2.5.3. Domain Layer
2.5.4. Service Layer

2.6. Trigger Framework

2.6.1. Trigger Framework
2.6.2. O’Hara
2.6.3. Dan Appleman
2.6.4. Hari Krishnan
2.6.5. Scot Wells

2.7. Error Framework

2.7.1. Error Framework
2.7.2. Error Capture
2.7.3. Platform Event to Register the Error

2.8. Framework Automations

2.8.1. Automation Tools
2.8.2. Design of Automation Framework
2.8.3. Technical Aspects

2.9. Development Tools 

2.9.1. Code Analyzer
2.9.2. Apex Replay
2.9.3. Apex Log Analyzer
2.9.4. Explain Plan

2.10. Troubleshooting Limits in Apex

2.10.1. CPU Time
2.10.2. Too Many SOQL
2.10.3. Heap Size

Module 3. Salesforce Security

3.1. Apex Security

3.1.1. Apex Security
3.1.2. Best Practices for Secure and Attack Protected Code
3.1.3. Encryption of Data in Transit and at Rest

3.2. Visuaforce Security

3.2.1. Visuaforce Security
3.2.2. Security in Visualforce Framework
3.2.3. Best Practices for Secure Visualforce Code

3.3. Security in Aura

3.3.1. Security in Aura Framework
3.3.2. Practical Examples of Protection and Security Evidences in Aura
3.3.3. Best Practices for Secure Code in Aura

3.4. Security in Lightning Web Components

3.4.1. Security in LWC Framework
3.4.2. Practical Examples of Protection and Security Evidences in LWC
3.4.3. Best Practices for Secure Code in LWC

3.5. User Access Management

3.5.1. User Profiling and Licensing (Profiles & Custom Permission)
3.5.2. Role Hierarchy and Territory Model
3.5.3. Team Management (Case, Account and Opportunity)
3.5.4. Queues and User Groups
3.5.5. Best Practices for External User Access

3.6. Security at the Registry Level

3.6.1. OWD, Sharing Rules, ARSDR and Manual Sharing. Best Practices
3.6.2. Registry Locking
3.6.3. Implicit Sharing and Apex Sharing Reasons
3.6.4. Data Masking

3.7. Security at the Field Level

3.7.1. Advanced Profiling Model
3.7.2. Best Practices for Dynamic Forms
3.7.3. FLS Control and Record Visibility in Apex and SOQL

3.8. User Authentication and Salesforce Access Authorization

3.8.1. Authentication Methods (U/P, SSO and Delegated Authentication)
3.8.2. Best Practices in Login Flows
3.8.3. Best Practices for Internal and External Access Best Practices (Experience Cloud)
3.8.4. Configuring Secure Access for External Salesforce Applications
3.8.5. Best Practices in OAuth Flows for Access Authorization

3.9. Monitoring and Security Policies

3.9.1. Salesforce Shield-Advanced Use Cases
3.9.2. Salesforce Shield-Field Audit Trail
3.9.3. Salesforce Shield-Transaction Security Policies

3.10. Security at the Network Level

3.10.1. HTTPS & TLS - Advanced Configuration in Salesforce
3.10.2. 1-way & 2-way SSL Flow. Configuration and Applicability
3.10.3. Network Configuration Best Practices

##IMAGE##

The curriculum will provide you with the skills and knowledge necessary to implement, manage and maintain secure and efficient systems on the Salesforce platform"

Postgraduate Diploma in Salesforce Security

In an increasingly connected digital world, data security is a critical priority for businesses across all industries. Salesforce, as one of the leading customer relationship management (CRM) platforms, stores a large amount of sensitive and confidential information, making it an attractive target for cybercriminals. Therefore, the demand for professionals with Salesforce security expertise is constantly growing. Want to become a security expert on the leading CRM platform? This Postgraduate Diploma in Salesforce Security created by TECH Global University gives you the perfect opportunity to acquire the necessary skills and excel in the field of cybersecurity. This program, taught completely online, will provide you with comprehensive training in all key areas of platform security. You will learn how to identify and mitigate security risks, implement robust access controls, protect sensitive data and respond effectively to security incidents.

Learn all about Salesforce security

One of the advantages of this innovative program is that it combines theory and practice to ensure that you acquire skills applicable in real business environments. Our expert instructors will guide you through case studies, hands-on exercises and cyber attack simulations, giving you the experience you need to meet the most demanding security challenges. In addition, our program prepares you to earn industry-recognized Salesforce security certifications, validating your skills and differentiating you in the labor market. These certifications are highly valued by employers and can significantly increase your employment opportunities and earning potential. Upon completion of our program, you will be prepared to take on challenging and rewarding roles in the cybersecurity field. Whether as a security consultant, systems administrator, or security analyst, you'll have the skills and confidence to protect organizations' digital assets and ensure their long-term success. Enroll today and prepare to become a leader in the exciting and ever-evolving field of cybersecurity at Salesforce!