EXCEPTIONAL TRAINING COURSES FOR IT PROFESSIONALS
LONDON UK | ONSITE | ONLINE
This Spring Boot Microservices training course will show you how Boot, which is built on top of the Spring Framework, garners all the benefits of Spring's maturity, while decorating the complexities of the underlying framework with opinionated fixtures that aid in the development of microservices.
Much of Spring Boot is aimed at developer productivity by making common concepts, like RESTful HTTP and embedded web application runtimes, easy to wire up and use.
This course teaches you how to create enterprise applications using the latest versions of the very popular Spring framework. The training course will be delivered using either Eclipse or IntelliJ and Maven or Gradle as the core development and build environments.
In addition to teaching all the major aspects of both frameworks, the course also covers best practice integration between the frameworks and also the architectural principles surrounding how to use the frameworks appropriately. Various modules can be dropped / replaced, for example, NoSQL or SQL based back ends, and optional modules on SpringMVC for Thymeleaf can also be included if desired.
Spring vs. Spring Boot
Spring Boot CLI
Microservices and Cloud
The need for Spring
Implementing Dependency Injection with Spring
The Spring Core
Programming to Interfaces using Spring
Incorporating Spring into Java EE applications
Using Spring Annotations
Using Java Configuration classes
A brief introduction to XML configuration
The Spring JDBC Related Module
The challenges of pure JDBC
The Spring JDBC Template
Writing an effective DAO using the Spring template class
Spring configuration elements required for database access
History of JPA
The need for Object Relational Mapping technology
Hibernate and the JPA
Mapping beans using JPA annotations
Using the EntityManager to work with data
Integrating Spring with the JPA
Injecting EntityManagers into DAOs
Spring configuration for effective use of JPA with Spring
Working with Transactions
Coordinating transactions with appropriate propagation
Integrating Spring with MongoDB and Cassandra
The MongoTemplate from Spring
Inserting and Updating and Querying NoSQL Databases
Building CRUD APIs
Working with finder methods
The Repository pattern
Using Spring Data with a NoSQL Database
Using Validator Annotations
Displaying validation error messages
Overview of REST principles
Creating REST controllers
Using Paths and Parameters
Processing JSON and XML Data
Authentication and Authorization
The Spring Security Servlet Filter
AOP based security for components
Configuring form based authentication
Realm configuration using Spring
Creating entire applications using Boot
Configuring a Repository using Boot
Creating a REST API using Boot
Maintaining Spring Boot Applications
The need for AOP
Configuration options for AOP
Weaving options when using AOP
Using the Spring Context in Unit Tests
Autowiring beans into tests
Testing Web application controllers using Spring
Mocking when using Spring
Introduction to JMS
The convertAndSend vs send methods
Integrating messaging with Spring Boot
See why people choose JBI
Call our Tech Team : 0800 028 6400 request info
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
Get in touch
0800 028 6400
The training was to target a team of developers, with a mix of Java, C# and some C++. The team made heavy use of Java SE with some elements of...
The BBC, who have a very substantial investment in technology, were keen to improve the quality of software development: to instil developers...
This client was expanding its capability to deliver technical training across EMEA. It had recently acquired a large technology company which...
Our inspiring and up-to-date courses gain exceptional feedback
"great tips to help reduce build times"
"we got access to exclusive content"
"intensive course meant less time off"
"what an inspiring trainer !"
"colleagues at 2 sites joined via web"
"I passed my exam the next day"
Traditionally Cyber security has been associated mainly with penetrating networks and infrastructure. Now a more subtle level of attack needs...
Back in March 2014, the Angular team dropped a bomb by announcing Angular 2 and everyone started yelling. Instead of an evolutionary step forward,...