The Salesforce Certified Community Cloud Consultant program is designed for consultants who have experience implementing and consulting on the Salesforce Communities applications in a customer-facing role. This credential is targeted toward Salesforce Community Cloud Consultants or Partners who want to demonstrate their skills and knowledge in designing, configuring, building, and implementing Salesforce Communities applications, using the declarative customization capabilities of the Communities platform. The Salesforce Certified Community Cloud Consultant is able to meet customer business requirements that are maintainable and scalable, and contribute to long-term customer success. The credential is relevant to customers, partners, employees, and anyone interested in demonstrating competence with Community Cloud. In order to qualify to take the Salesforce Certified Community Cloud Consultant exam, candidates must have earned the Salesforce Certified Administrator credential.
This exam is aimed at the Consultant role. You are expected to understand how a community is implemented, and capabilities, limitations, and features of different community templates and licenses.
Select appropriate license type for a given scenario
Evaluate the infrastructure of a community
Capabilities of different deployment types
Mobility requirements
Integration strategy
Critical success factors for a community rollout
Limits for different types of users, roles, and licenses
Set up a custom domain
Most Salesforce professionals would agree security is one of the more complex and challenging topics. With communities, security gets exponentially more complicated. External users are accessing an org, so Admins now have two sets of users to manage: internal users such as company employees, and external community users. There are different tools, considerations, and skills to learn, to manage external community users and administer security.
Security requirements for a scenario that includes collaboration, business processes, object and document access requirements
Appropriate security model for various use cases
Configure users, person accounts, profiles, object permissions
Steps to build a public community
How to add new community users
Grant access to information resources
Protect critical internal information assets
Differences between community and org security
Sharing, sharing sets, share groups