EXCEPTIONAL TRAINING COURSES FOR IT PROFESSIONALS
LONDON UK | ONSITE | ONLINE
What is Java EE?
What technologies does Java EE encapsulate?
What is the architecture of Java EE applications?
When should I be considering Java EE in my applications?
The need for Spring
Implementing Dependency Injection with Spring
The Spring Core
Programming to Interfaces using Spring
Incorporating Spring into Java EE applications
The Spring JDBC Related Module
The challenges of pure JDBC
The Spring JDBC Template
Writing an effective DAO using the Spring template class
Spring configuration elements required for database access
History of JPA
The need for Object Relational Mapping technology
Hibernate and the JPA
Mapping beans using JPA annotations
Using the EntityManager to work with data
Integrating Spring with the JPA
Injecting EntityManagers into DAOs
Spring configuration for effective use of JPA with Spring
Working with Transactions
Coordinating transactions with appropriate propagation
Using Validator Annotations
Displaying validation error messages
The Model/View/Controller Pattern
The DispatcherServlet Class
Web Application Contexts
The ModelAndView Class
The View Interface
The ViewResolver Interface
The redirect: Prefix
Overview of REST principles
Creating REST controllers
Using Paths and Parameters
Processing JSON and XML Data
Overview of SOAP services
WSDL First Services
Defining the XML Schemas
Configuring the Services
Creating the Java service class
The need for AOP
Configuration options for AOP
Weaving options when using AOP
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
Get in touch
0800 028 6400
The training was to target a team of developers, with a mix of Java, C# and some C++. The team made heavy use of Java SE with some elements of...
The BBC, who have a very substantial investment in technology, were keen to improve the quality of software development: to instil developers...
This client was expanding its capability to deliver technical training across EMEA. It had recently acquired a large technology company which...
Our inspiring and up-to-date courses gain exceptional feedback
"great tips to help reduce build times"
"we got access to exclusive content"
"intensive course meant less time off"
"what an inspiring trainer !"
"colleagues at 2 sites joined via web"
"I passed my exam the next day"
Traditionally Cyber security has been associated mainly with penetrating networks and infrastructure. Now a more subtle level of attack needs...
Back in March 2014, the Angular team dropped a bomb by announcing Angular 2 and everyone started yelling. Instead of an evolutionary step forward,...