Professional Documents
Culture Documents
Certification Program
Study Guide Series
When an exam is being developed, the Subject Matter Experts work together to define
the role the certified individual will fill. They define all of the tasks and knowledge that an
individual would need to have in order to successfully implement the product. This
creates the foundation for the objectives and measurement criteria, which are the basis
for the certification exam.
The Watson Developer Certification item writers used these objectives to develop the
questions that they wrote and which will appear on the exam.
It is recommended that you review these objectives. Do you know how to complete the
task in the objective? Do you know why that task needs to be done? Do you know what
will happen if you do it incorrectly? If you are not familiar with a task, then go through
the objective and perform that task in your own environment. Read more information on
the task. If there is an objective on a task there is about a 95% chance that you WILL
see a question about it on the actual exam.
After you have reviewed the objectives and completed your own research, then take the
assessment exam. While the assessment exam will not tell you which question you
answered incorrectly, it will tell you how you did by section. This will give you a good
indication as to whether you are ready to take the actual exam or if you need to further
review the materials.
Note: This is the high-level list of objectives. As you review these objectives, click for a
more detailed level of how to perform the task.
High-level Exam Objectives
Section 1 - Understand concepts of cloud computing and IBM Cloud
1.1 Cloud computing overview
1.2 IBM Cloud overview
1.3 Understand how applications are built in IBM Cloud
1.4 Create and manage an IBM Cloud application
1.5 Manage IBM Cloud users
1.6 Manage IBM Cloud resources
1.7 Explain IBM's Cloud point of view and core differentiators
Section 2 - Plan for a Cloud adoption
2.1 Understand an organization's readiness for cloud transformation
Identify key requirements and considerations to produce a comprehensive
2.2
plan for setting up a cloud environment
Identify the network and security requirements to support the
2.3
infrastructure, applications, and services
Understand the considerations for workload migration to a Cloud
2.4
environment
2.5 Understand HA/DR/backup options
2.6 Outline the challenges of meeting compliance in a Cloud environment
Section 3 - Understand IBM Cloud capabilities
3.1 Build a virtual environment
3.2 Understand the different Storage offerings
Outline Network capabilities in the Catalog and how to design network
3.3
architecture
3.4 Security capabilities
3.5 Align hosting technologies to workloads
3.6 Understand IBM Cloud for VMWare Solutions
Section 4 - Understand platform capabilities in IBM Cloud
4.1 Compare the different compute options available on IBM Cloud
Architect continuous integration, continuous deployment (CI/CD), and the
4.2
DevOps lifecycle
4.3 Understand the different data services
4.4 Architect how to do cloud and hybrid cloud integration
Leverage services to add enhanced functionalities to Cloud native
4.5
applications
4.6 Enhance application design with security services
Section 5 - Design and architect a microservices solution
5.1 Articulate microservices architectural methodology
5.2 Understand modern cloud native application development approaches
Understand the different approaches of migrating a monolithic application
5.3
to microservices
5.4 Describe Microservices Framework
Section 6 - Manage IBM Cloud applications and platforms
6.1 Describe IBM Cloud Management and Platform capabilities
6.2 Describe Application Availability Management
Describe IBM Cloud Management and Platform capabilities for Application
6.3
Perfomance Management
Understand the benefits of building Application Perfromance Management
6.4
into a DevOps lifecycle
Section 7 - IBM Cloud Private
7.1 Understand IBM Cloud Private capabilities
7.2 Describe IBM Cloud Private key node architecture components
7.3 Understand IBM Cloud Private Logging and Monitoring
Section 8 - Reference Architecture
8.1 Describe IBM Reference Architectures
8.2 Explain how IBM Reference Architectures can facilitate the move to cloud
Section 9 - Emerging Technologies
9.1 Understand IBM Blockchain
9.2 Identify the common core architecture of IoT
Understand the categories of Artificial Intelligence (AI) and how that can
9.3
enhance a Cloud Native Solution using AI
Detailed Exam Objectives
SUBTASK(S):
1.1.1. Define cloud computing
1.1.2. Describe the factors that lead to the adoption of cloud computing
1.1.3. Describe the choices that are available to developers when creating cloud
applications
1.1.4. Describe infrastructure as a service, platform as a service, and software as a
service
1.1.5. Describe the cloud computing benefits
1.1.6. Identify different situation for different type of cloud solutions
(Public,Hybrid,Private,On-Prem)
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html
SUBTASK(S):
1.2.1. Describe IBM Cloud features
1.2.2. Describe IaaS from IBM Cloud
1.2.3. Describe PaaS from IBM Cloud
1.2.4. Identify the runtimes and services that IBM Cloud offers
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html
SUBTASK(S):
1.3.1. Select compute options in IBM Cloud
1.3.2. Select services to use in IBM Cloud
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html
SUBTASK(S):
1.4.1. Understand IBM Cloud dashboard, catalog, and documentation features
1.4.2. Create a cloud application
1.4.3. Add services in IBM Cloud
1.4.4. Bind services to an application in IBM Cloud
1.4.5. Test applications through the application route
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html
SUBTASK(S):
1.5.1. Identify key features of IBM Cloud Identity and Access Management (Cloud IAM)
1.5.2. Add user to IBM Cloud
1.5.3. Manage user access control
1.5.4. Understand user roles within IBM Cloud
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html
SUBTASK(S):
1.6.1. Organize resources in IBM Cloud
1.6.1.1. Cloud Foundry organizations and spaces
1.6.1.2. Resource groups
1.6.2. Define Cloud Foundry organizations
1.6.3. Define domain and quota for organizations
1.6.4. Define space and user roles
1.6.5. Create and manage resource groups in IBM Cloud
1.6.5.1. Object Storage
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html
SUBTASK(S):
1.7.1. Explain the six steps for cloud adoption
1.7.2. Create an IT roadmap for cloud adoption
1.7.3. Define One IBM Cloud Architecture
1.7.3.1. Security & Compliance
1.7.3.2. Deployment
1.7.3.3. Infrastructure & Infrastructure service (IaaS)
1.7.3.4. Platform Services (PaaS)
1.7.3.5. Runtime & Orchestration
1.7.3.6. Data, Analytics & AI
REFERENCES:
Section 2 - Plan for a Cloud adoption
SUBTASK(S):
2.1.1. Identify business drivers
2.1.1.1. What business problems is the customer trying to solve and cannot with
their current strategy.
2.1.1.2. Understand and identify constraints (i.e. funding, security requirements,
people)
2.1.1.3. People: Identify key stakeholders. Moving to the cloud results in
changing the way a business operates. Lack of executive sponsorship
can result in resistance and inadequate funding resulting in failure.
2.1.1.4. Process: Operational & business processes. How do their current
governance processes and change management practices work?
2.1.1.5. Technology: Identify and evaluate existing workloads and infrastructure
2.1.1.6. Prioritization: Risk analysis or proofs of concept testing cloud underlying
infrastructure and services. (Identify non-critical workloads that may be
easier to move first into the cloud, followed by prioritization of higher
visibility, critical applications)
2.1.1.7. Migration strategy: Understand timelines, requirements and
dependencies and how the customer handles this currently
2.1.1.8. Reporting Requirements (organizational, departmental, global)
2.1.1.9. Metering & Elasticity
2.1.1.9.1. Do they currently utilize external providers? If yes, what are
bursting requirements?
2.1.1.9.2. How are SLAs monitored and managed?
2.1.1.9.3. Do they have a need to track expenses and bill internally if
onprem cloud?
2.1.2. Perform gap analysis
2.1.2.1. Workloads: Evaluate workloads or groups of applications identified to
move to cloud.
2.1.2.1.1. Vendor & vendor versions (i.e. OS, middleware)
2.1.2.1.2. Virtual vs. physical; how many provisioned per week on
average
2.1.2.1.3. Network Management & future requirements
2.1.2.1.4. Storage Management & future requirements
2.1.2.1.5. Catalog Management & future requires
2.1.2.1.6. Security, audit & regulatory requirements (are there
requirements that drive an on-prem solution only)
2.1.2.1.7. Monitoring & future requirements
2.1.2.1.8. High-Availability & Disaster Recovery requirements
2.1.2.1.9. How do they handle IP Address Management User Accounts,
Backups, Storage, Patching, build repositories
2.1.3. Understand Training/Knowledge Transfer Requirements
2.1.4. Review the organization's current environment to identify required functional
changes
REFERENCES:
https://www.ibm.com/cloud/garage/adoption
https://www.omg.org/cloud/published-deliverables.htm
https://en.wikipedia.org/wiki/Cloud_computing
SUBTASK(S):
2.2.1. Demonstrate knowledge of the common cloud infrastructure models
2.2.2. Describe workloads in a cloud context
2.2.3. Describe the process for determining the appropriate cloud deployment model
2.2.3.1. Steps in overall migration strategy
2.2.3.2. Methods for specific workload analysis and model determination
2.2.3.3. Understand the context of the cloud environment (how the system will
interoperate with other systems), non-functional and functional
requirements that will affect the design and resulting performance of the
system.
2.2.4. Describe the functional and operational design of your cloud environment.
2.2.4.1. Specify the structure and behavior of the components of your cloud
environment.
2.2.4.2. Describe the key functional components of you cloud environment
2.2.4.3. Describe the key services (application, platform and infrastructure) that
will be used by the cloud solution and must be integrated into the
Solution Design.
2.2.5. Develop a High-Level Component Model
2.2.6. Develop a High-Level Operational Model
2.2.7. Identify solutions to address general environmental requirements
2.2.7.1. Governance policies and service agreements
2.2.7.2. Connectivity requirements
2.2.7.3. Common security challenges
2.2.7.4. Compliance and regulatory requirements
2.2.7.5. Service management
2.2.8. Map common workload use cases to an expected cloud model
2.2.9. Identify the requirements, components, architecture, and IBM solutions for
common workload patterns
2.2.10. Define requirements and plans for Back-up recovery
2.2.10.1. Assess current back-up and recovery workload for each key functional
component.
2.2.10.2. Measure current back-up and recovery workloads against one or more
target cloud environments as follows:
2.2.10.2.1. Assess resource capacity and software affinity
2.2.10.2.2. Assess ability of target cloud to meet specific workload
nonfunctional requirements
2.2.10.2.3. Assess migration impact
2.2.10.2.4. Assess basic operational cost
2.2.10.2.5. Assess risk and quantify the potential application
performance impact that may occur when the application
infrastructure is moved
2.2.11. Create back-up and recovery application work flow diagrams with existing client
data, if any
2.2.11.1. Confirm application demographics
2.2.11.2. Identify critical business functions supported
2.2.11.3. Document end-to-end application flow by business function (service)
2.2.11.4. Identify any dependencies on other applications or other shared
infrastructure
2.2.11.5. Identify application characteristics and communication protocols.
2.2.11.6. Create an application flow diagram for each application of interest
identifying end users (type and location), critical services required, and
supporting IT infrastructure to support each identified
service/transaction.
2.2.11.7. Identify applications at risk due to potential effects of network latency.
2.2.12. Define requirements and plans for Data Recovery
2.2.12.1. Understand current disaster recovery procedure
2.2.12.2. Understand the the key metrics of Recovery Point Objective (RPO)
and Recovery Time Objective(RTO)
2.2.12.2.1. Backup should be taken at the regular intervals for each
component
2.2.12.3. Determine when image copies can be taken and what types of image
copies need to be taken
2.2.12.3.1. Transaction log backups make up the second layer of the
backup and recovery strategy
2.2.12.3.2. Transaction log backup intervals may be influenced by the
method of synchronizing the primary and secondary
system
2.2.12.3.3. Send/replication to offsite store for storage.
2.2.12.3.4. The image copies and backed up logs should not only be
shipped to the secondary system, but also backed up to
another system and then copied to tape in order to have
copies both on-site (for quick recovery) and off-site (for
disaster recovery).
2.2.13. Define requirements and plans for Continuity of Operations planning for a Cloud
environment
2.2.13.1. Understand Continuity of Operations (COOP)
2.2.13.1.1. Identify Essential Functions (EFs) and ensure that those
functions can be continued throughout, or resumed rapidly
after, a disruption of normal activities.
2.2.13.1.2. Define conditions when the plan could be activated in
response to a wide range of events or situations – from a
fire in the building; to a natural disaster; to the threat or
occurrence of a terrorist attack. Any event that makes it
impossible for employees to work in their regular facility
could result in the activation of the Continuity plan.
2.2.13.1.3. Plan COOP requirements for a Cloud environment
a) Continuity Facilities – Locations, other than the
primary facility, used to carry out essential functions,
particularly in a continuity event. Continuity Facilities,
or “Alternate facilities”, refers to not only other
locations, but also nontraditional options such as
working at home. (“teleworking”), telecommuting, and
mobile-office concepts.
b) Continuity Communications – Communications that
provide the capability to perform essential functions, in
conjunction with other agencies, under all conditions.
c) Back-up recovery plan
d) Data Recovery plan
2.2.14. Describe the four Phases of Continuity of Operations Activation
2.2.14.1. Phase I - Readiness and Preparedness
2.2.14.2. Phase II - Activation and Relocation: plans, procedures, and
schedules to transfer activities, personnel, records, and equipment to
alternate facilities are activated
2.2.14.3. Phase III - Continuity Operations: full execution of essential operations
at alternate operating facilities is commenced
2.2.14.4. Phase IV – Reconstitution: operations at alternate facility are
terminated and normal operations resume
2.2.15. Describe IBM Continuity and Resiliency offerings
2.2.15.1. Resiliency Communications as a Service A high availability, cloud-
enabled crisis/incident management service
2.2.15.2. Virtualized Server Recovery Recover your virtualized or physical
servers on a virtualized cloud infrastructure at an IBM secure,
hardened recovery center.
2.2.15.3. Cloud Data Virtualization Virtual instant recovery of critical data.
2.2.15.4. Data Availability as a Service Redefine disaster recovery and turn your
dark data into new business value
2.2.15.5. Backup as a Service Managed backup services for public, private or
hybrid cloud.
REFERENCES:
https://www.ibm.com/services/business-continuity/disaster-recovery#resources
2.3. Identify the network and security requirements to support the infrastructure,
applications, and services
SUBTASK(S):
2.3.1. Identify security requirements for a cloud environment for effective governance,
risk and compliance processes (managing and servicing the cloud infrastructure)
2.3.2. Identify network requirements for a cloud environment
2.3.2.1. Private, Public, and Intra-Cloud networking
2.3.2.1.1. Connections to Public clouds
2.3.2.1.2. Intra-Cloud Connections
2.3.2.1.3. Network Hardware
2.3.2.1.4. Management Networks
2.3.2.1.5. Customer Networks
2.3.3. Articulate the knowledge of implementing a secure Cloud environment
2.3.4. Explain Cloud Data Security
2.3.4.1. The cloud data security contains the concepts, principles, structure and
standards that are used to design, implement, monitor and secure
operating systems, equipment, networks, applications, and those controls
that are used to enforce various levels of confidentiality, integrity, and
availability.
2.3.5. Explain Cloud Platform and Infrastructure Security
2.3.5.1. Knowledge of the cloud infrastructure components, both the physical and
virtual, existing threats, and mitigating and developing plans to deal with
those threats.
2.3.5.2. Understanding of business continuity planning (BCP), disaster recovery
planning (DRP) to understand the current and future security posture of
the cloud system.
2.3.5.3. Understand key focus areas
2.3.6. Explain Cloud Application Security
2.3.6.1. Use of verified secure software
2.3.6.2. Understanding of cloud software assurance and validating process (e.g.
cloud based functional testing, security testing (penetration testing)
2.3.6.3. Threat modeling
2.3.6.4. Identity and access management (IAM) solutions (e.g. federated identity,
identity providers, single sign-on and multi-factor authentication)
2.3.6.5. Common application security vulnerabilities
REFERENCES:
https://www.omg.org/cloud/published-deliverables.htm
https://cloudsecurityalliance.org
http://csrc.nist.gov/publications/PubsNISTIRs.html
https://www.ibm.com/cloud/garage/adoption
https://www.isc2.org/
REFERENCES:
https://www.ibm.com/cloud/garage/architectures
https://console.bluemix.net/docs/infrastructure/local-load-balancer/getting-
started.html#getting-started
https://console.bluemix.net/docs/infrastructure/loadbalancer-service/getting-
started.html#getting-started
https://www.ibm.com/cloud/garage/architectures/hybridIntegration
http://www.redbooks.ibm.com/redbooks/pdfs/sg248284.pdf
SUBTASK(S):
2.5.1. Understand HA concepts and metrics
2.5.1.1. IBM Cloud service description
2.5.1.2. Calculate overall solution availability
2.5.2. Understand availability zones in IBM Cloud
2.5.2.1. Single Zone Region (SZR)
2.5.2.2. Multi Zone Region (MZR)
2.5.3. Understand the customer’s SLAs for availability and Disaster Recovery
2.5.3.1. How many 9’s does the organization need and what should be the RTO
and RPO targets?
2.5.3.2. Balance between the cost of downtime and cost of a highly available
solution.
2.5.3.3. Architect different availability configurations and decide when to use each
2.5.3.4. Understand when to use the different DR options
2.5.4. Understand Disaster Recovery as a Service
2.5.5. Decide on the Backup Option in IBM Cloud
2.5.5.1. Cloud Object Storage
2.5.5.2. IBM Spectrum Protect
2.5.6. Design the solution for HA
2.5.6.1. Stateless application, services, middleware and data
REFERENCES:
http://www.edgeblog.net/2007/in-search-of-five-9s/
http://www.edgeblog.net/2007/in-search-of-five-9s/
https://console.bluemix.net/docs/containers/cs_regions.html#regions-and-zones
https://console.bluemix.net/docs/infrastructure/vpc/getting-started.html#getting-started-
with-ibm-cloud-virtual-private-cloud-beta-release
http://resource.onlinetech.com/what-is-the-difference-between-a-cold-warm-and-hot-
disaster-recovery-site/
https://www.ibm.com/blogs/bluemix/2018/03/concept-multi-tenant-hours-zerto-ibm-
cloud/
https://dzone.com/articles/microservices-design-get-scale-availability-right
https://www.ibm.com/cloud/garage/architectures/resilience
https://www.ibm.com/cloud/info/cloud-object-storage-backup-archive
https://www.ibm.com/us-en/marketplace/data-protection-and-recovery
https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_9.0.0/com.ibm.mq.con.doc/
q017830_.htm
SUBTASK(S):
2.6.1. Understand specific compliance regulations
2.6.1.1. All Cloud Service Providers (CSPs) offering low or moderate impact
cloud services to U.S. federal agencies must meet FedRAMP
requirements
2.6.1.2. PCI (Payment Card Industry) Security Standards. security standards for
account data protection
2.6.1.3. EU Data Protection Directive and GDPR
2.6.2. Describe Governance Risk and Compliance (GRC) practices
2.6.2.1. Defining compliance requirements
2.6.2.2. Reporting compliance
2.6.2.3. Testing compliance and controls
2.6.2.4. Auditing compliance
2.6.3. Assess compliance requirements impacting the design of a Cloud environment
2.6.3.1. Identify compliance regulations
2.6.3.2. Describe how the client measures organizational compliance with each
regulation
2.6.3.3. Identify all compliance controls in place
2.6.3.4. Define monitoring and logging requirements to support compliance
testing, auditing and reporting
2.6.4. Understand how IBM Cloud complies with the different regulations
2.6.5. Architect the solution to deal with data residency requirements
REFERENCES:
https://www.ibm.com/cloud/garage/adoption
https://www.fedramp.gov/
https://www.hhs.gov/hipaa/for-professionals/privacy/
https://www.pcisecuritystandards.org/
https://www.ibm.com/cloud/compliance
Section 3 - Understand IBM Cloud capabilities
3.1. Build a virtual environment
SUBTASK(S):
3.1.1. Identify your type of Cloud
3.1.1.1. Private Cloud
3.1.1.1.1. On Premise
3.1.1.1.2. Off Premises
3.1.1.2. Hybrid Cloud
3.1.1.3. Public Cloud
3.1.1.4. Non- Cloud Environment
3.1.2. Define and decide on type of Compute:
3.1.2.1. Bare Metal Server
3.1.2.1.1. Define the Operational System
3.1.2.1.2. Define the Hypervisor
3.1.2.2. Virtual Server
3.1.2.2.1. Define the Operational System
3.1.3. Identify the type of Storage
3.1.3.1. Block Storage
3.1.3.2. File Storage
3.1.3.3. Object Storage
3.1.4. Identify the type of Network
3.1.4.1. Content Delivery Network
3.1.4.2. Direct Link Dedicated
3.1.4.3. Direct Link Dedicated Hosting
3.1.4.4. Direct Link Exchange
3.1.5. Describe the Network Services
3.1.5.1. Domain Name Service
3.1.5.2. IPSec VPN
3.1.5.3. Load Balancers
3.1.5.4. Subnets/IPs
3.1.5.5. Virtual Router Appliance
3.1.5.6. VLAN Spanning
REFERENCES:
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=compute
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=network
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=storage
SUBTASK(S):
3.2.1. Block Storage
3.2.1.1. Define the Endurance performance
3.2.2. File Storage
3.2.2.1. Define the Endurance performance
3.2.3. Object Storage
3.2.3.1. Cross Region
3.2.3.2. Regional
3.2.3.3. Single Data Center
REFERENCES:
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=storage
3.3. Outline Network capabilities in the Catalog and how to design network
architecture
SUBTASK(S):
3.3.1. Understand your type of Network
3.3.1.1. Content Delivery Network
3.3.1.1.1. Choose IBM Cloud Content Delivery Network services
3.3.1.2. Direct Link
3.3.1.2.1. Dedicated
3.3.1.2.2. Dedicated Hosting
3.3.1.2.3. Exchange
3.3.2. Identify the Network Service
3.3.2.1. Domain Name Service
3.3.2.2. IPSec VPN
3.3.2.3. Load Balancers
3.3.2.3.1. IBM Cloud Load Balancer
3.3.2.3.2. Local Load Balancer
3.3.2.3.3. Citrix NetScaler VPX
3.3.2.4. Subnets/IPs
3.3.2.5. Virtual Router Appliance
3.3.2.6. VLAN Spanning
REFERENCES:
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=network
SUBTASK(S):
3.4.1. Define the security capabilities
3.4.1.1. Type of security appliance hardware or software
3.4.1.2. Firewall
3.4.1.2.1. Policy requirements
3.4.1.2.2. Bandwidth requirements
3.4.1.3. Data protection
REFERENCES:
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=security
3.5. Align hosting technologies to workloads
SUBTASK(S):
3.5.1. Understand available technologies for workloads
3.5.1.1. Define your Containers in Kubernetes Cluster
3.5.1.1.1. Define Docker and know the different cloud orchestration
solutions
3.5.1.1.2. Understand the core concepts of Kubernetes
3.5.1.1.2.1. Kubernetes objects
3.5.1.1.2.1.1. Pod
3.5.1.1.2.1.2. Service
3.5.1.1.2.1.3. Volume
3.5.1.1.2.1.4. Namespace
3.5.1.1.2.2. Controllers
3.5.1.1.2.2.1. ReplicaSet
3.5.1.1.2.2.2. Deployment
3.5.1.1.2.2.3. StatefulSet
3.5.1.1.2.2.4. DaemonSet
3.5.1.1.2.2.5. Job
3.5.1.1.3. Define Type of IBM Cluster
3.5.1.1.3.1. IBM Cloud public
3.5.1.1.3.2. IBM Cloud Dedicated
3.5.1.1.4. Create Kubernetes cluster
3.5.1.1.5. Install, Configure and/or Update the CLI
3.5.1.1.6. Understand how to use Helm Charts to quickly deploy
solutions
3.5.1.2. Define your Container Registry
3.5.1.2.1. Define type of IBM Cloud Container Registry
3.5.1.2.1.1. Free
3.5.1.2.1.2. Standard
3.5.1.2.2. Install and Set Up IBM Cloud Container Registry
REFERENCES:
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=security
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=containers
https://console.bluemix.net/docs/containers/container_index.html#container_index
https://docs.docker.com/engine/docker-overview/#docker-objects
https://developer.ibm.com/courses/all/docker-essentials-extend-your-apps-with-
containers/
https://developer.ibm.com/courses/all/get-started-kubernetes-ibm-cloud-container-
service/
https://kubernetes.io/docs/concepts/
REFERENCES:
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=compute
https://console.bluemix.net/docs/services/vmwaresolutions/index.html#getting-started-
with-ibm-cloud-for-vmware-solutions
https://www.ibm.com/cloud/garage/architectures/virtualizationArchitecture
SUBTASK(S):
4.1.1. Describe the compute options
4.1.1.1. Cloud Foundry
4.1.1.2. Container Service
4.1.1.3. IBM Cloud Functions
4.1.2. Compare the compute options
4.1.2.1. Opinionated PaaS
4.1.2.2. Docker/Kubernetes CaaS
4.1.2.3. Serverless FaaS
4.1.3. Compare quality of service
4.1.3.1. Deployment process
4.1.3.2. Build pipeline deployment support
4.1.3.3. Service discovery
4.1.3.4. Scaling/elasticity
4.1.3.5. Failure recovery
4.1.3.6. Version migration
1.1.1. Rolling deployment
1.1.2. Blue/green (aka red/black) deployment
4.1.3.7. ROI
REFERENCES:
https://www.ibm.com/cloud/garage/architectures
https://www.ibm.com/cloud/functions
https://console.bluemix.net/docs/openwhisk/index.html#index
https://console.bluemix.net/catalog/?taxonomyNavigation=apps&category=compute
https://www.ibm.com/blogs/bluemix/2017/04/one-microservice-three-compute-options-
cloud-foundry-container-openwhisk-choice/
SUBTASK(S):
4.2.1. Explain benefits of DevOps
4.2.1.1. Rapid deployment of code changes
4.2.1.2. Reliable deployment
4.2.1.3. Accelerated delivery
4.2.2. Explain continuous delivery principles
4.2.2.1. Every change must be releasable
4.2.2.2. Code branches must be short-lived
4.2.2.3. Deliver through an automated pipeline
4.2.2.4. Automate almost everything
4.2.2.5. Aim for zero downtime
4.2.3. Describe the Continuous Delivery components
4.2.3.1. Toolchain
4.2.3.2. Tool integration
4.2.3.3. Delivery pipeline
1.1.1. Stages
1.1.2. Jobs
4.2.3.4. Toolchain template
4.2.4. Describe the stages to customize a delivery pipeline
4.2.4.1. Configure triggering by a Git commit
4.2.4.2. Configure the Build stage
4.2.4.3. Configure a Build job
4.2.4.4. Configure a Deploy job
1.1.3. Deployer type: Cloud Foundry
1.1.4. Deployer type: Kubernetes
4.2.4.5. Configure a Test job
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html (Unit 4)
https://www.ibm.com/cloud/garage/content/deliver/practice_continuous_delivery/
https://console.bluemix.net/docs/services/ContinuousDelivery/index.html#cd_getting_st
arted
https://console.bluemix.net/docs/services/ContinuousDelivery/pipeline_about.html
SUBTASK(S):
4.4.1. Design and understand when to use different integration capabilities in IBM
Cloud
4.4.1.1. API Connect
4.4.1.2. Integration Bus
4.4.1.3. Message queuing
4.4.1.4. Message Hub (Event Streams)
4.4.2. Design Hybrid Cloud Integration using Secure Gateway
4.4.3. Assess client infrastructure readiness for hybrid cloud integration
4.4.4. Understand API Connect capabilities
4.4.4.1. Understand API Economy
4.4.4.2. Describe the lifecycle of API
4.4.4.3. API Connect Components
4.4.4.4. Securing APIs
4.4.5. Data Integration and Governance
4.4.5.1. Information Server
4.4.6. Decide when to communicate using Queueing (Kafka, MQ Lite, MQ), APIs, or
integration through data.
REFERENCES:
https://console.bluemix.net/docs/services/apiconnect/getting-started.html#index
https://console.bluemix.net/docs/services/AppConnect/appconnect.html#appconnect
https://console.bluemix.net/docs/services/SecureGateway/index.html#getting-started-
with-sg
https://www.ibm.com/support/knowledgecenter/en/SSMNED
https://console.bluemix.net/docs/services/ISOnCloud/index.html#iisoc_getting_started
https://console.bluemix.net/docs/services/EventStreams/index.html#getting_started
https://console.bluemix.net/docs/services/mqcloud/index.html#index
https://www.ibm.com/developerworks/library/mw-1708-bornert/index.html
https://www.youtube.com/watch?v=lmxyiNMER5Y
SUBTASK(S):
4.5.1. Describe how to add authentication functionality to Web and mobile applications
and the different authentication options
4.5.2. Explain and use Mobile Backend Architecture as a service (MBaaS) and Mobile
Foundation capabilities in IBM Cloud
4.5.3. Understand how to gain insights into how the mobile application is performing
4.5.4. Explain how to push notifications to mobile devices and browsers
4.5.5. Understand how create, run, schedule, and monitor a set of processes
4.5.6. Decide which Websphere Application Server (WAS) edition to use on IBM Cloud
4.5.6.1. WAS Liberty
4.5.6.2. WAS Traditional
4.5.6.3. WAS Network Deployment
REFERENCES:
http://www.redbooks.ibm.com/abstracts/sg248374.html?Open Unit 7
https://console.bluemix.net/docs/services/WorkloadScheduler/wkldschedsvc001a.html#
wkldschedovrvw
https://console.bluemix.net/docs/services/ApplicationServeronCloud/index.html#getting_
started
https://console.bluemix.net/docs/services/mobilefoundation/mdoverview.html#overview_
mobilefoundation
SUBTASK(S):
4.6.1. Understand how to manage SSL certificates
4.6.2. Understand the lifecycle of encryption keys and how to manage it
4.6.3. Describe how to add authentication with your app with social networks, cloud
directory, and enterprise directory
4.6.4. Describe when to use Secure Gateway and when to use VPN
REFERENCES:
https://console.bluemix.net/docs/services/certificate-manager/about.html#about-
certificate-manager
https://console.bluemix.net/docs/services/keymgmt/keyprotect_about.html#about
https://console.bluemix.net/docs/services/appid/about.html#about
https://console.bluemix.net/docs/services/SecureGateway/index.html#getting-started-
with-sg
https://www.ibm.com/blogs/bluemix/2017/03/secure-gateway-everything-ever-wanted-
know/
https://www.csoonline.com/article/3232355/authentication/what-is-saml-what-is-it-used-
for-and-how-does-it-work.html
SUBTASK(S):
5.1.1. Articulate the difference between SOA and Microservices
5.1.2. Understand business goal(s) for application to meet
5.1.3. Understand benefits/drawbacks of using microservices and see if it fits goals
5.1.4. Create high level outline of the process to meet the goal(s)
5.1.5. Determine how the process can be grouped
5.1.6. Iterate through microservice design
REFERENCES:
http://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/sg248275.html
https://www.ibm.com/developerworks/websphere/library/techarticles/1601_clark-
trs/1601_clark.html
SUBTASK(S):
5.2.1. Understand business goals to be met and if they can be met with cloud native
application(s)
5.2.2. Know how IaaS/PaaS/SaaS/APIs can be consumed by the application
5.2.3. Select appropriate toolchain for building/testing/deploying/managing application
5.2.4. Provision required services
5.2.5. Build/test/run/manage/sunset application
REFERENCES:
https://www.ibm.com/cloud/smartpapers/cloud-native-application-innovation/
https://www.ibm.com/blogs/bluemix/2017/09/microservices-and-cloud-native-
development-vs-traditional-development/
SUBTASK(S):
5.3.1. Understand differences between microservices and monolithic applications
5.3.2. Understand business requirements of moving from monolithic to microservices
applications
5.3.3. Select the appropriate pattern to meet the requirements
REFERENCES:
https://www.ibm.com/developerworks/cloud/library/cl-strangler-application-pattern-
microservices-apps-trs/index.html
https://www.ibm.com/developerworks/cloud/library/cl-evolution-microservices-
patterns/index.html
SUBTASK(S):
5.4.1. Understand business goals to be met with the application
5.4.2. Understand benefits of each framework
5.4.3. Select an appropriate framework to meet the business requirements
REFERENCES:
https://cdelmas.github.io/2015/11/01/A-comparison-of-Microservices-Frameworks.html
https://buoyant.io/2017/07/11/linkerd-istio/
https://www.ibm.com/cloud/garage/architectures/microservices
https://www.ibm.com/blogs/bluemix/2015/12/bluemix-framework-for-microservices-
architecture/
https://istio.io/docs/
SUBTASK(S):
6.1.1. Describe Netcool Operations Insight (NOI)
6.1.1.1. Networks for NOI
6.1.1.2. Netcool Performance Insights
6.1.1.3. Agile Service Manager
6.1.2. Describe IBM Operations Analytics
6.1.2.1. Predictive Insights
6.1.3. Describe IBM Cloud Application Performance Management
6.1.3.1. Base & Advanced
6.1.4. Describe IBM Tivoli Application Dependency Discovery Manager
6.1.5. Describe IBM Control Desk
6.1.6. Describe IBM Workload Automation
6.1.7. Describe IBM Workload Scheduler
6.1.8. Describe IBM Tivoli Systems Automation
6.1.8.1. For Multiplatform Application Manager
.
REFERENCES:
https://www.ibm.com/support/knowledgecenter/SSMKFH/com.ibm.apmaas.doc/welcom
e.htm
REFERENCES:
https://console.bluemix.net/docs/services/cloud-activity-tracker/index.html#getting-
started-with-cla
https://console.bluemix.net/docs/services/AvailabilityMonitoring/index.html#avmon_getti
ngstarted
https://console.bluemix.net/docs/services/cloud-monitoring/index.html
https://www.ibm.com/support/knowledgecenter/SSMKFH/com.ibm.apmaas.doc/welcom
e.htm
6.3. Describe IBM Cloud Management and Platform capabilities for Application
Perfomance Management
SUBTASK(S):
6.3.1. Explain the features that are available in IBM Cloud Application Performance
Management
6.3.1.1. End to End Transaction Tracking
6.3.1.2. Deep Dive Diagnostics
6.3.1.3. Alert Notification
6.3.1.4. Integration with Predictive Insights
6.3.1.5. Integration with Netcool Operation Insights
6.3.2. Define where the Application that Agents should be deployed
6.3.2.1. Resource Agents
6.3.2.2. Tracking Agents
6.3.3. Describe the Roles of users for IBM Cloud Application Performance Management
6.3.3.1. IT Operations
6.3.3.2. Line of Business Owners
6.3.3.3. Developers
REFERENCES:
https://console.bluemix.net/docs/services/cloud-activity-tracker/index.html#getting-
started-with-cla
https://console.bluemix.net/docs/services/AvailabilityMonitoring/index.html#avmon_getti
ngstarted
https://console.bluemix.net/docs/services/cloud-monitoring/index.html
https://www.ibm.com/support/knowledgecenter/SSMKFH/com.ibm.apmaas.doc/welcom
e.htm
SUBTASK(S):
7.1.1. Describe ICP core services & capabilities
7.1.2. At a high-level, identify the 5 functional components of the ICP Reference
Architecture
7.1.2.1. Infrastructure
7.1.2.2. PaaS
7.1.2.3. CaaS
7.1.2.4. Next Generation Management
7.1.2.5. Developer Automation
7.1.3. From the ICP Reference Architecture detail key components that comprise the
functional components of ICP
7.1.3.1. PaaS: Cloud Foundry
7.1.3.2. CaaS: Kubernets, Docker, Istio
7.1.3.3. Developer Automation: Helm, Cloud Foundry, IBM Cloud Private
Catalog
7.1.3.4. Next Generation Management: Prometheus, Grafana, ELK
REFERENCES:
https://www.ibm.com/cloud/garage/architectures/private-cloud/0_1
https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=KUM12391USEN
SUBTASK(S):
7.2.1. Describe at a high level the ICP nodes and the services they provide
7.2.1.1. Boot Node
7.2.1.2. Master Node
7.2.1.3. Proxy Node
7.2.1.4. Management Node
7.2.1.5. Worker Node
7.2.2. Identify key factors to consider when architecting an ICP solution
7.2.2.1. Workloads
7.2.2.2. Storage
7.2.2.3. Networking
7.2.2.4. Security
7.2.2.5. Performance
7.2.2.6. Monitoring
7.2.2.7. Backup/Data Retention
REFERENCES:
https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/W1559b1b
e149d_43b0_881e_9783f38faaff
https://www.ibm.com/cloud/private
SUBTASK(S):
7.3.1. Describe the components of ELK and each of their functionality
7.3.1.1. Elasticsearch
7.3.1.2. Logstash
7.3.1.3. Kubana
7.3.2. Describe Filebeat’s role in ICP Logging
SUBTASK(S):
8.1.1. Describe the popular application styles
8.1.1.1. Application modernization, cognitive, microservices, data and analytics,
blockchain, internet of things, mobile, web application, infrastructure,
private cloud, virtualization, e-commerce, social
8.1.2. Identify the related practices for a specific application style
8.1.2.1. Microservices, continuous delivery, mobile development, etc…
8.1.3. Describe the aspects for scaling your application
8.1.3.1. Service management, security, resilience, hybrid integration,
transformation with APIs, DevOps
8.1.4. Identify the solutions for a specific aspect of an application
8.1.4.1. Identity and access, security, hybrid connectivity, etc…
REFERENCES: https://www.ibm.com/cloud/garage/architectures
8.2. Explain how IBM Reference Architectures can facilitate the move to cloud
SUBTASK(S):
8.2.1. Describe the value proposition of using the IBM Architecture Center
8.2.1.1. ROI while leveraging best practices
8.2.1.2. Repeatable patterns
8.2.1.3. Automation
8.2.2. Describe how to use reference architectures to solve business problems
8.2.2.1. Identify application style, leverage solution patterns, identify key
personas, obtain key reference architecture assets
8.2.3. Explain the various assets available on the IBM Architecture Center
8.2.3.1. Github repository code samples
REFERENCES:
https://www.ibm.com/cloud/garage/architectures
Section 9 - Emerging Technologies
9.1. Understand IBM Blockchain
SUBTASK(S):
9.1.1. Identify when a IBM Blockchain technology should be considered in a solution
9.1.1.1. Shared ledger
9.1.1.2. Permission based Blockchain
9.1.1.3. Immutability of data
9.1.1.4. Smart contracts
9.1.2. Describe key opensource projects leveraged by IBM Blockchain solutions
9.1.2.1. Hyperledger Composer, Hyperledger Fabric
9.1.3. Describe IBM Blockchain membership plans
9.1.3.1. Starter, Enteprise, Enterprise +
9.1.4. Identify the common blockchain use cases
9.1.4.1. Trade and supply chain finance, carbon exchange, health data
exchange, payment and digital currency
REFERENCES:
https://www.ibm.com/blockchain
https://console.bluemix.net/docs/services/blockchain/index.html#ibm-blockchain-
platform
SUBTASK(S):
9.2.1. Understand the key components of IoT
9.2.1.1. Understand the difference between Cloud and Edge
9.2.1.2. Understand the difference Cloud, Gateway, and Device
9.2.2. Understand the features of IBM IoT Platform
9.2.2.1. Device Management
9.2.2.2. Application Authorization
9.2.2.3. IoT Platform Extensions (Cloudant, MessageHub)
9.2.3. Networked Things: typically wireless sensors and actuators
9.2.3.1. data collected from devices and turned into useful data (i.e. robotic
cameras, water-level detectors, air-quality sensors, accelerometers,
shopping patterns & transactions, manufacturing robotics, lightening,
heart rate monitors)
9.2.4. Sensor data aggregation systems and analog-to-digital data conversion
9.2.4.1. IoT w/ a large number of sensors can trigger massive amounts of data.
Data may need to be aggregated and converted to digital streams for
further analysis downstream. Typically these systems are located in
close proximity to the sensors & actuators and be physically attached to
the device
9.2.5. Edge devices that perform pre-processing of data prior to moving to centralized
location
9.2.5.1. Perform analytics that aggregate the data further reducing the amount of
data required to be transferred. (i.e. rather than passing on all heart
beats from a heart rate monitoring, it would aggregate averages over
time specific intervals or transfer only irregular heart rates)
9.2.6. Data is analyzed, managed and stored
9.2.6.1. data that requires additional processing or needs to be combined with
other sensor data for deeper insights is transferred to a centralized
location where is analyzed, monitored, backed up & stored based on
retention policy requirements. This stage can take place on-premises, in
the cloud or hybrid cloud model.
9.2.7. Security/Privacy
9.2.7.1. security must be pervasive across every facet of IoT. (i.e a device gets
hacked, its connectivity can serve as a launching point to attack other
devices and systems as well as data gathered may contain health
information, shopping patterns and transactions.
References:
https://www.ibm.com/support/knowledgecenter/en/SSQP8H/iot-connected-
products/kc_welcome.html
https://console.bluemix.net/docs/services/IoT/index.html#gettingstartedtemplate
https://www.ibm.com/internet-of-things
9.3. Understand the categories of AI functionality and how to enhance a cloud
native solution using Artificial Intelligence (AI)
SUBTASK(S):
Architecting an effective solution utilizing AI, it’s important to initially & periodically
validate the data as AI systems are only as effective as the data they are trained on.
Bad training and stale data can lead to higher error rates and biased decision making
even when the underlying model is sound.
An AI architecture should ensure that a system will satisfy key functional requirements
and non-functional requirements such as reliability, portability, modifiability. Key areas
to consider when designing an AI solution are data collection, data handling (i.e. data
storage, security, retention, migration of stale data, performance & monitoring), how the
data is presented and who has access to the data. There should be a balanced
representation of unbiased data sets when training so the algorithms developed ensure
a fairness of the output. The architecture should also ensure the systems are flexible &
agile to adjust to changes in the environment (i.e. self-learning).
There are many AI functions available through IBM’s Cloud Offerings that can enhance
a cloud native solution such as:
References:
https://console.bluemix.net/catalog/services/natural-language-
classifier?taxonomyNavigation=apps
https://console.bluemix.net/docs/services/conversation/getting-
started.html#gettingstarted
https://console.bluemix.net/docs/services/discovery/getting-started-tool.html#getting-
started
https://www.redbooks.ibm.com/Redbooks.nsf/RedpieceAbstracts/sg248419.html?Open
– Chapter 2
Next Steps
1. Take the IBM Cloud Solutions Architect v3 assessment test. Use the promotion
code CloudAssess20 for $20 off each assessment.
3. If you failed the assessment exam, review how you did by section. Focus
attention on the sections where you need improvement. Keep in mind that you
can take the assessment exam as many times as you would like ($10 per exam),
however, you will still receive the same questions only in a different order.