🐻Bear with us - Registrations for expert-led classes are unavailable from 11:00 PM PT on April 30 to 5:00 PM PT on May 6. The website will be temporarily down for maintenance May 3–May 6. An exciting new experience is coming! Learn more. Need help with a class? Reach out to Trailhead Help.

Job Role

Architect

Duration

Virtual: 3 Full Day(s) or 6 Half Day(s)

User Interface

Lightning Experience

Overview

Who should take this course?


This course is designed for architects who are responsible for building enterprise security and sharing solutions using Salesforce. This is also a great course for anyone interested in earning their Sharing and Visibility Architect credential.


When you complete this course, you will be able to:


  • Leverage the Salesforce Well-Architected Framework to design secure and high-performing enterprise sharing solutions on the Salesforce Platform.
  • Use Salesforce sharing mechanisms to meet sensitive data protection requirements.
  • Implement data security solutions for internal and external users that account for potential impacts to Salesforce sharing and security models.

Prework

Prepare for the course with this Trailmix.

Class Registration

Lessons and Topics

Introduction to Data Security

  • Consider Security Using an Architect Mindset
  • Review the Salesforce Well-Architected Framework
  • Define Data Security


Data Security for Internal Users

  • Define Salesforce Security Features and Functionality
  • Outline Data Security Parameters for Internal Users
  • Examine How Permissions Impact Security and Sharing Models
  • Understand How Org-Wide Defaults Affect Security Models
  • Determine How Role Hierarchy Informs Security Model Design Decisions
  • Discover the Impact of Sharing Rules on Sharing Models
  • Determine How Restriction and Scoping Rules Affect Sharing Models


Pro-Code Security

  • Define Apex Sharing
  • Identify Apex Sharing Use Cases


Data Security for External Users

  • Define Data Security Parameters for External Users
  • Describe How Data Security Differs for External and Internal Users
  • Understand How Org-Wide Defaults Affect Security Models
  • Discover the Impact of Sharing Sets and Groups on Sharing Models


Sensitive Data Protection

  • Define Sensitive Data
  • Determine Security Requirements for Sensitive Data Types
  • Examine Methods of Sensitive Data Protection


Data Security Case Study

  • Examine a Data Security Use Case
  • Design a Data Security Solution