Voraussetzungen
- Experience with the Java programming language
- Familiarity with object serialization
- Familiarity with relational database theory and the basics of structured query language (SQL)
- Familiarity with the use of an IDE
- Java Programming Language, Java SE 6
Kursziele
- Describe the application model for the Java EE platform and the context for the model
- Select the correct Java EE Profile for a given application
- Develop and run an EJB technology application
- Develop basic Java Persistence API entity classes to enable database access
- Develop a web-based user interface using Servlets, JSPs, and JSF
- Develop simple web services for the Java EE platform
Produktbeschreibung
- Survey of Java EE Technologies
- Describe the different Java platforms and versions
- Describe the needs of enterprise applications
- Introduce the Java EE APIs and services
- Certifications Paths
- Introducing Applications Servers
- Enterprise Modules
- Enterprise Application Architecture
- Design Patterns
- Model View Controller
- Synchronous and Asynchronous communication
- Network Topologies and Clustering
- Layering (client,presentation,service,integration,persistence)
- Web Technology Overview
- Describe the role of web components in a Java EE application
- Define the HTTP request-response model
- Compare Java servlets, JSP, and JSF
- Brief introduction to technologies not covered in detail
- Developing Servlets
- Describe the servlet API
- Servlet configuration through annotations and deployment descriptors
- Use the request and response APIs
- Servlets as controllers
- Developing With JavaServer Pages Technology
- Evaluate the role of JSP technology as a presentation mechanism
- Author JSP pages
- Process data received from servlets in a JSP page
- Brief introduction to the JSTL and EL
- JavaServer Faces
- The JSF model explained
- Adding JSF support to web applications
- Using the JSF tag libraries
- Configuring JSF page navigation
- JSF Conversion, Validation, and Error Handling
- EJB Overview
- EJB types: Session Beans
- EJB types:Message Driven beans
- Java Persistence API as a replacement for Entity EJBs
- Describe the role of EJBs in a Java EE application
- EJB lite
- Implementing EJB 3.0 Session Beans
- Compare stateless and stateful behavior
- Describe the operational characteristics of a stateless session bean
- Describe the operational characteristics of a stateful session bean
- Describe the operational characteristics of a singleton session bean
- Create session beans
- Package and deploy session beans
- Create session bean clients
- The Java Persistence API
- The role of the Java Persistence API in a Java EE application
- Object Relational Mapping
- Entity class creation
- Using the EntityManager API
- The life cycle and operational characteristics of Entity components
- Persistent Units and Packaging
- Implementing a Transaction Policy
- Describe transaction semantics
- Compare programmatic and declarative transaction scoping
- Use the Java Transaction API (JTA) to scope transactions programmatically
- Implement a container-managed transaction policy
- Support optimistic locking with the versioning of entity components
- Support pessimistic locking of entity components
- Using transactions with the web profile
- Developing Asynchronous Java EE Applications and Messaging
- The need for asynchronous execution
- JMS technology introduction
- List the capabilities and limitations of Java EE components as messaging producers and consumers
- JMS and transactions
- JMS administration
- Developing Message-Driven Beans
- Describe the properties and life cycle of message-driven beans
- Create a JMS message-driven bean
- Web Service Model
- Describe the role of web services
- Web service models
- List the specifications used to make web services platform independent
- Describe the Java APIs used for XML processing and web services
- Implementing Java EE Web Services with JAX-WS and JAX-RS
- Describe endpoints supported by the Java EE 6 platform
- Developing Web Services with Java
- Creating Web Service Clients with Java
- Implementing a Security Policy
- Exploit container-managed security
- Define user roles and responsibilities
- Create a role-based security policy
- Use the security API
- Configure authentication in the web tier