
Lokální instruktorem vedené Java školení České republice.
Reference
Trenér má velmi dobré znalosti v mnoha průmyslových odvětvích a poskytuje mnoho příkladů skutečného života, které velmi souvisí s tématy školení.
Intergraph Process, Power & Marine
Kurz: Java 8 and Spring
Machine Translated
V tomto tréninku jsme se nenaučili jen základní technické znalosti Java jaro / technologií a nejdůležitější věcí, kterou jsme také získávání pozemský znalosti, které jste během třídu sdílený s námi.
Kelvin Low - Intergraph Process, Power & Marine
Kurz: Java 8 and Spring
Machine Translated
Rychlost řešení problémů studentů
Dariusz Stefańczyk
Kurz: Java Intermediate and Advanced
Machine Translated
Mír a podpora moderátora
PSI Polska Sp. z o.o.
Kurz: Java EE 8 for Beginners
Machine Translated
Java Návrh Školení
By the end of this training, participants will be able to:
- Setup and configure a Vaadin project.
- Understand the fundamentals of Vaadin in developing applications.
- Use Vaadin to develop applications.
By the end of this training, participants will be able to:
- Learn how to use Guava in Java programming.
- Utilize Guava to facilitate standard coding practices.
- Make easy to read and concise Java codes.
By the end of this training, participants will be able to:
- Learn about NetBeans and how it works.
- Learn how to use NetBeans in Java programming.
- Use NetBeans to create templates and projects.
Toto školení vedené instruktory, na místě nebo na dálku, je zaměřeno na softwarové architekty a vývojáře webových stránek, kteří chtějí používat RabbitMQ jako prostředník pro zasílání zpráv a program v Java pomocí aplikace Spring k vytváření aplikací.
Na konci tohoto školení budou účastníci schopni:
- K vytváření aplikací použijte Java a Spring with RabbitMQ .
- Navrhněte asynchronní systémy řízené RabbitMQ pomocí RabbitMQ .
- Vytvářejte a používejte fronty, témata, výměny a vazby v RabbitMQ
Formát kurzu
- Interaktivní přednáška a diskuse.
- Spousta cvičení a cvičení.
- Praktická implementace v prostředí živé laboratoře.
Možnosti přizpůsobení kurzu
- Chcete-li požádat o přizpůsobené školení pro tento kurz, kontaktujte nás a domluvte se.
Tento výcvik vedený instruktorem (online nebo on-site) je zaměřen na vývojáře, kteří chtějí obsahovat své Java EE 8 aplikace a spustit je jako mikroslužby v cloudu.
Po ukončení tohoto tréninku budou účastníci schopni:
Vytvořte a rozmístěte mikroslužby v kontejnerech Docker. Využijte kontejnery Kubernetes. Integrujte mikroslužby s existujícím monolitickým systémem. Monitorování, testování a zabezpečení mikroslužeb. Kontejnery a orchestrální prostředí.
Formát kurzu
Interaktivní přednáška a diskuse. Mnoho cvičení a praxe. Hands-on implementace v živém laboratoři prostředí.
Možnosti personalizace kurzu
Chcete-li požádat o přizpůsobené školení pro tento kurz, kontaktujte nás, abyste uspořádali.
This course does not cover in depth test automation frameworks such as Selenium. It also bypasses the conventional "Hello World" approach to learning Java, as this is not a course on application development. This course is squarely aimed at getting participants up and running quickly with test automation. If you are already versed in Java and wish to get straight into testing with Selenium, please check out: Introduction to Selenium (https://www.nobleprog.com/introduction-selenium-training).
The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).
The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get sources and further readings on secure coding practices
Audience
Developers
Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.
General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.
The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of all components is presented through practical exercises, where participants can try out the discussed APIs and tools for themselves.
Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get practical knowledge in using security testing tools
- Get sources and further readings on secure coding practices
Audience
Developers
The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Understand security concepts of Web services
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Understand security solutions of Java EE
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get practical knowledge in using security testing tools
- Get sources and further readings on secure coding practices
Audience
Developers
General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.
The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. Security issues of Java Enterprise Edition are presented through various exercises explaining both declarative and programmatic security techniques in JEE.
Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Understand security concepts of Web services
- Understand security solutions of Java EE
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get practical knowledge in using security testing tools
- Get sources and further readings on secure coding practices
Audience
Developers
Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation.
Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Realize the severe consequences of unsecure buffer handling
- Understand the architectural protection techniques and their weaknesses
- Learn about typical coding mistakes and how to avoid them
- Be informed about recent vulnerabilities in various platforms, frameworks and libraries
- Get sources and further readings on secure coding practices
Audience
Developers
Úroveň Java bezpečnostní architektury probíhá řešením kontroly přístupu, ověření a autorizace, bezpečné komunikace a různých kryptografických funkcí. Existují také různé API, které mohou být použity k zabezpečení vašeho kódu v PHP, jako je OpenSSL pro šifrování nebo HTML Purifier pro ověření vstupu. Na straně serveru se poskytují nejlepší postupy pro usnadnění a konfiguraci operačního systému, webového kontejneru, souborového systému, serveru SQL a samotného PHP, zatímco zvláštní důraz je kladen na bezpečnost na straně klienta prostřednictvím bezpečnostních problémů JavaScript, Ajax a HTML5.
Obecné webové zranitelnosti jsou diskutovány příklady v souladu s OWASP Top Deset, které ukazují různé injekční útoky, injekce skriptů, útoky proti sezení, nejisté přímé reference objektů, problémy s nahrávkami souborů, a mnoho dalších. Různé Java- a PHP-specifické jazykové problémy a problémy vyplývající z pracovní doby prostředí jsou zavedeny do standardních typů zranitelnosti chybějící nebo nesprávné ověření vstupu, nesprávné použití bezpečnostních funkcí, nesprávné chyby a výjimky zpracování, problémy související s časem a stavem, problémy kvality kódu a zranitelnosti související s mobilním kódem.
Účastníci mohou vyzkoušet diskutované API, nástroje a účinky konfigurací pro sebe, zatímco zavedení zranitelností je podporováno řadou praktických cvičení, které demonstrují důsledky úspěšných útoků, ukazují, jak opravit chyby a aplikovat techniky zmírnění, a zavádějí použití různých rozšíření a nástrojů.
Účastníci tohoto kurzu budou
Pochopte základní pojmy bezpečnosti, IT bezpečnosti a bezpečného kódování Naučte se webové zranitelnosti nad OWASP Top Deset a víte, jak se jim vyhnout Zjistěte zranitelnosti na straně klienta a bezpečné postupy kódování Naučte se používat různé bezpečnostní vlastnosti rozvojového prostředí Java Využijte praktické znalosti kryptografie Naučte se používat různé bezpečnostní funkce PHP Porozumět bezpečnostním pojmům webových služeb Získejte praktické znalosti při používání bezpečnostních testovacích nástrojů Naučte se typické chyby kódování a jak se jich vyhnout Informujte se o nedávných zranitelnostech Java a PHP rámců a knihoven Získejte zdroje a další čtení o bezpečných postupech kódování
publikum
Vývojáři
Topics:
- DevOps practices and tools
- Puppet
- Technical introduction to cloud computing
- Jenkins
In this instructor-led, live training, participants will learn the GWT programming concepts needed to get a web application up and running.
By the end of this training, participants will be able to
- Write client-side AJAX applications in Java and deploy them as JavaScript across multiple browsers (desktop, Android, iPhone, etc.)
- Develop a high-performance web application while overcoming the idiosyncrasies of browser behavior, XMLHttpRequest, and JavaScript
- Understand and overcome the challenges of Ajax programming
- Use GWT's tools to optimize a web application
Audience
- Front-end web developers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
By the end of this training, participants will be able to:
- Understand and use the different components (core, web, client, etc.) in the Vert.x stack.
- Use Vert.x to create network utilities, HTTP/REST microservices, high volume event processing, back-end message-bus applications, etc.
- Execute an app that can handle high concurrency using minimal kernel threads.
- Use Vert.x's APIs to support Java, JavaScript, Groovy, Ruby, Ceylon, Scala, Kotlin, etc.
- Unit test asynchronous code with Vert.x-Unit.
- Deploy and scale an app with minimal hardware.
By the end of this training, participants will be able to:
- Understand the importance and significance of reactive programing in applications and systems development.
- Run Unit test on RxJava 2.0.
- Use the Akka framework under reactive programing principles.
- Employ Spring to handle the development of concurrent applications.
- Use Java 9's flow API to develop reactive apps.
Tento instruktor vedený, živý a trénink uvádí účastníky do rozsáhlé knihovny ReactiveX a rozvíjí reagující aplikace a chodí účastníky prostřednictvím řady případů, které prokazují užitečnost a funkčnost klíčových funkcí ReactiveX.
Až do konce tohoto tréninku budou účastníci být mohl a:
Pochopte paradigmu reaktivního programování a funkčnost pozorovatelných zařízení a jejich společné využití při vývoji těžkých aplikací UI Úspěšné nastavení prostředí pro ReactiveX Vytvoření pozorovatelných událostí tvoří množství různých položek Použijte ReactiveX's transformační a filtrační funkce
publikum
Vývojáři
Formát of the course
Část čtení, část diskuse, cvičení a těžká praxe
In this instructor-led, live training, participants will become familiar with RxJS's tools and functions as they apply them to a variety of coding problems associated with interactive-heavy based mobile and web apps. Participants will also learn how to create and deploy a UI heavy web app.
By the end of this training, participants will be able to:
- Understand the reactive programing paradigm and its usefulness for UI heavy application development.
- Build UI heavy applications with scalability, flexibility, and responsiveness in mind.
- Easily and freely create and manage a multitude of UI events, asynchronous HTTP requests, and other data streams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro.
By the end of this training, participants will be able to:
- Use Shiro's API to secure various types of applications, including mobile, web and enterprise
- Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc.
Audience
- Developers
- Security engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
In this instructor-led, live training, participants will learn how to use Cuba Platform to develop enterprise applications with rich web interfaces.
By the end of this training, participants will be able to:
- Develop Java applications and UIs using a declarative user interface, without using HTML, CSS or JavaScript
- Reduce boilerplate code and facilitate rapid development
- Use the CUBA Studio web development tool with existing Java IDEs
- Customize applications without branching the code
Audience
- Developers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
In this instructor-led, live training, participants will learn how to use the Eclipse IDE for Java.
By the end of this training, participants will be able to:
- Understand the different functionalities of the Eclipse IDE
- Learn how to set up the Eclipse IDE for Java development
- Create and run their first Java application in Eclipse
- Learn various tips and tricks on how to use the Eclipse IDE efficiently
Audience
- Java developers interested in using the Eclipse IDE
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
In this onsite instructor-led, live training, participants will learn how to develop rich user interfaces using Java's powerful GUI library, JavaFX.
By the end of this training, participants will be able to:
- Create a modern, visually-pleasing Java application using JavaFX
- Integrate JavaFX into legacy Swing and SWT based Java applications
- Add 3D graphics and effects to their application
- Test and debug their Java application
- Deploy the application to the web or as a desktop application
Audience
- Application developers
- Web developers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
This 4 day course is aimed at object-oriented developers (e.g. C++ or C#) who need to get up to speed quickly in Java. The course covers the Java programming constructs and APIs quickly, focussing on the differences between Java and other OO languages.
Audience
This training course is aimed at OO developers who need to transition into Java.
Last Updated: