Knowledge Transfer Microsoft Certified Training Partner CTEC
Knowledge Transfer is a Microsoft Certified Gold Partner
Microsoft Certified Gold Training Partner
Search for a Course Topic:
Public Courses
Corporate Services & Training
 

 

 



 Course Search
Keyword
Course #
State

 Training Delivery
 
Training Delivery
Custom Curriculum
Course List
 
 Main Menu
 
Home
View Courses
Site Index
 
 


Architecting and Designing Java EE Applications Overview


CHAPTER 1 - FUNDAMENTAL ARCHITECTURAL CONCEPTS

  • What is Architecture?
  • Architecture vs. Design
  • Qualities of Service (QoS)
  • Common Mechanisms
  • Architectural Description
  • What Architecture is Not
  • The Need for Architecture
  • The Architect
  • Roles of the Architect
  • Skills of the Architect

CHAPTER 2 - SYSTEM ARCHITECTURE DEVELOPMENT GUIDELINES

  • Security Risks
  • Performance & Scalability Risks
  • Availability & Complexity Risks
  • Compatibility & Control Risks
  • Network Considerations
  • Latency and Bandwidth
  • Minimize Number of Network Calls
  • Minimize Network Call Size
  • Firewall Navigation
  • Secure Communication
  • Distributed Object Technologies
  • What is a Transaction?
  • Bank Example
  • Multiple Users Sharing Data
  • ACID Properties of Transactions
  • Architecture
  • Reference Architecture
  • Patterns
  • Development Methodologies
  • Open Standards
  • Frameworks

CHAPTER 3 - QUALITY OF SERVICE REQUIREMENTS

  • What are Quality of Service Requirements?
  • Qualities of Service and Design
  • Quality of Service Inventory
  • Performance
  • Scalability
  • Reliability
  • Availability
  • Extensibility
  • Maintainability
  • Manageability
  • Security
  • Cultural Adaptability
  • Portability
  • Testability
  • Usability
  • Upgradeability
  • Recoverability
  • Prioritizing Quality of Service Requirements
  • Inspecting QoS Requirements for Trade-off Opportunities
  • Quality of Service Reviews

CHAPTER 4 - SOFTWARE ARCHITECTURE TIERS

  • System Architecture
  • Good Architecture
  • Cave Drawings to Modern Day
  • Information Systems Evolution
  • Continued Evolution
  • Present Day
  • Client-Server Computing
  • Client-Server Pros/Cons
  • Client-Server Example
  • Tiered Architectures
  • Three-tier Architecture
  • Three-tier Pros/Cons
  • Three-tier Example
  • N-Tier Architecture
  • N-Tier Pros/Cons
  • N-Tier Example

CHAPTER 5 - CLIENT TIER TECHNOLOGIES

  • HTML5
  • HTML5 Main Objectives
  • Which Features of HTML 4 Changed
  • New Features of HTML 5
  • New Features of HTML 5
  • Browser-side Data Storage
  • Declaring HTML5
  • Detecting Support for HTML5
  • HTML5 Input Validation Example
  • HTML5 Date Form Widget
  • The Document Object Model
  • The Document Object Model
  • What the DOM is Not
  • Cascading Style Sheets
  • CSS Levels
  • What is JavaScript?
  • Working with JavaScript
  • Working with JavaScript
  • What is jQuery?
  • Benefits of Using a JavaScript Library
  • jQuery Example
  • jQuery Mobile
  • Apache Cordova (Adobe PhoneGap)
  • Apache Cordova History
  • Bootstrap
  • Responsive Web Design
  • Why Responsive Web Design Matters
  • Responsive Web Design Components
  • Mobile First
  • Backbone.js
  • Backbone Modules
  • MVC and Backbone
  • AngularJS

CHAPTER 6 - MANAGING CLIENT TIER CONSIDERATIONS

  • Understand Client-tier Concerns
  • Types of Clients
  • JEE Client Responsibilities
  • Presenting the User Interface
  • Validating User Inputs
  • Communicating with the Server
  • Managing Conversational State
  • Understand Client-Tier Security
  • Client-Tier Security
  • Compare/Contrast User Interface Devices
  • Application of Reuse to the Client Tier
  • Strategies for Deploying Java Desktop Applications
  • Applet Usage

CHAPTER 7 - JEE TECHNOLOGY SERVERS

  • Server Types in JEE
  • JEE Servers
  • Java EE 6 Profiles
  • Popular Java EE Application Servers
  • Java EE Blueprint
  • JEE Containers
  • Enterprise Information Systems
  • ERP Systems
  • Mainframe Transaction Processing Systems
  • Relational and Legacy Databases
  • Legacy Integration
  • Selecting a JEE Server
  • Packaging and Deployment Definitions
  • Roles and Responsibilities
  • EJB Modules
  • EJB Module Packaging
  • Web Modules
  • Web Module Recommendations
  • Deployment Descriptors

CHAPTER 8 - JEE TECHNOLOGIES

  • Major Programming Technologies of Java EE
  • Servlets
  • Servlets Do the Following
  • The Web Container
  • JSP (Java Server Pages)
  • JSP Elements
  • JSP Standard Tag Library (JSTL)
  • Filters
  • Uses for Filters
  • JavaServer Faces (JSF)
  • JSF 2.0
  • Contexts and Dependency Injection for Java (CDI)
  • CDI Example
  • Bean Validation
  • Java Message Service (JMS)
  • What are EJBs?
  • Main Characteristics of EJBs
  • EJB Container
  • Data Persistence
  • Java Persistence API
  • Entities
  • Enterprise Java Beans
  • Session Beans
  • Session EJB vs JPA Entities
  • Asynchronous EJB
  • Singleton EJB
  • Message-Driven Beans
  • Remote vs. Local Session EJBs
  • Defining Services
  • Many Flavors of Services
  • Java Web Service Implementation Choices
  • Java Architecture for XML Binding (JAXB)
  • Java SOAP Web Services with JAX-WS
  • Java REST Web Services with JAX-RS
  • REST vs SOAP Summary
  • JCA (JEE Connector Architecture)

CHAPTER 9 - JEE TECHNOLOGY CHOICES

  • Client Session State
  • Client Managed State
  • Web Tier Managed State
  • EJB Tier Managed State
  • Business Objects
  • When to Use EJB
  • Persistence Data Options
  • Client Types
  • Web Browser Clients
  • Java Clients
  • Model View Controller
  • Model View Controller in the Web-Tier
  • Web Application Frameworks
  • Web Presentation Layout
  • Java Presentation Layout
  • Message-Oriented Middleware and JMS
  • Messaging Domains
  • Characteristics of MOM
  • Advantages of Asynchronous Communication (e.g. MOM)
  • Implementing Asynchronous EJBs
  • Advantages of Synchronous Communication (e.g. RMI/IIOP)
  • Remote Access to Business Logic

CHAPTER 10 - SOA CONCEPTS

  • Anatomy of an Enterprise
  • IT Nightmare
  • Understanding by Analogy
  • Service Oriented Architecture
  • Componentization and Reuse
  • Benefits of Service Orientation
  • Defining SOA
  • Aligning the Enterprise
  • Whats a Service?
  • Service Actors
  • Service Layering
  • Is SOA a Flash in the Pan?
  • Service Orienting the Enterprise
  • Service Oriented Thinking

CHAPTER 11 - INTRODUCTION TO JAX-WS

  • What is JAX-WS?
  • Advantages of JAX-WS
  • Why Do We Need a Programming Model?
  • Basic Java to WSDL Mapping
  • Developing a Service Provider
  • The Service Implementation Class
  • The Service Endpoint Interface (SEI)
  • Service Implementation Options
  • Developing a Consumer
  • Static Client Development
  • The Service Class
  • The BindingProvider Interface

CHAPTER 12 - REST AND JAX-RS OVERVIEW

  • Many Flavors of Services
  • Where SOAP Shines
  • Where REST Shines
  • Understanding REST
  • Principles of RESTful Services
  • Example: Catalog Service
  • Create a New Product
  • Retrieve a Product
  • Update a Product
  • Delete a Product
  • Introduction to JAX-RS
  • The Resource Class
  • The Entity Class
  • Retrieve a Product
  • Create a Product
  • Update and Delete
  • Content Negotiation
  • Retrieving a JSON Representation
  • Sending a JSON Representation
  • REST Service Clients
  • AJAX and XML
  • AJAX and JSON
  • Java REST Clients

CHAPTER 13 - JEE SECURITY

  • JEE Authentication Mechanisms
  • Basic Authentication
  • Form-based Authentication
  • Client Certificate Authentication
  • JEE Authorization
  • Declarative Security on Web Resources
  • Programmatic Security on Web Resources
  • Security Role Reference
  • Defining Security Roles Using Annotations
  • Delegation
  • Declarative Security on EJB Resources
  • Protecting Beans Using Annotations
  • Protecting Beans Using the Deployment Descriptor
  • Programmatic Security on EJB Application
  • Delegation

CHAPTER 14 - WEB SERVICES SECURITY (WS-SECURITY)

  • The Challenges
  • Public Key Infrastructure (PKI)
  • Digital Signature
  • Certificates
  • Overview of Web Services Security
  • SOAP Message Security
  • Message Integrity
  • Message Confidentiality
  • Symmetric Encryption Example
  • Authentication Using Identity Token
  • Authentication
  • Transport Level Security
  • Audit Tracking
  • Identity Assertion Using SAML
  • SAML SOAP Example

CHAPTER 15 - PROTOTYPES

  • What is a Prototype?
  • Conceptual Prototypes
  • Architectural Prototypes
  • Advantages of Prototyping
  • Deciding Whether to Build a Prototype or Not
  • Prototypes and the Software Development Lifecycle
  • Prototype Roles and Responsibilities
  • Throw-away vs. Evolutionary Prototypes
  • Spikes
  • Testing a Prototype

CHAPTER 16 - DESCRIBING AND EVALUATING SOFTWARE ARCHITECTURE

  • Architecture Description
  • Architectural Views
  • Subsystems
  • Layers
  • Example: Subsystems with Layers
  • Components
  • Decomposing the System Into Components
  • Software Partitioning Strategies
  • Managing Dependencies
  • Component Diagrams
  • Deployment Diagrams
  • Tiered Architectures
  • Managing Complexity
  • Evaluating the Architecture

APPENDIX A - DATA TRANSFER IN DISTRIBUTED COMPUTING

  • Data Transfer in Java Local Computing
  • Data Transfer in Java Distributed Computing
  • Comparing Data Transfer in Local and Distributed Computing

APPENDIX B - TRANSACTIONS IN EJB

  • Need for Transactions
  • Transactions
  • ACID Properties
  • Transaction Components
  • Distributed Transactions
  • Distributed Transaction Components - Two Phase Commit
  • Java Transaction API (JTA)
  • EJB Transaction Basics
  • Transaction Propagation
  • Transaction Outcome
  • Container-Managed Transaction
  • Transaction Attributes
  • Container-Managed Transaction Settings
  • Interacting with Container-Managed Transactions
  • Container-Managed Transaction  Example
  • Application Exceptions in Container-Managed Transactions
  • Transaction Attributes Support
  • Bean-Managed Transaction Management Type

APPENDIX C - BUSINESS TIER PATTERNS - 1

  • Facade Pattern
  • Business Object Pattern
  • Application Service Pattern
  • Service Locator Pattern
  • Remote Service Locator Example
  • Dependency Injection in Servlets
  • Business Delegate Pattern

APPENDIX D - BUSINESS TIER PATTERNS - 2

  • Data Transfer Object (DTO) Pattern
  • JPA Entity as DTO
  • JPA Lazy Loading
  • Message Facade
  • Fast Lane Pattern
  • Pagination (Value List Handler) Pattern
  • Version Number Pattern
  • Read for Update Pattern
  • Primary Key Generation
  • Data Access Object (DAO)

 

View Printer Friendly Page

Course Schedule
  Start Date  City  Price  
 8/28/2017
 $2395
Enroll
 11/6/2017
 $2395
Enroll

To Inquire About Future Classes

Request a class date

if one is not scheduled.