Category Archives: Training Development

Training ColdFusion / Comprehensive – 5 days

Class overview :

In this Comprehensive ColdFusion 9 Training course, students will spend the first part of the week learning the basics of ColdFusion and the second part of the week learning advanced ColdFusion techniques.

Class goals :

– Learn to get data from a database and display it on the page
– Learn to insert, Edit and Delete records from a database
– Learn to pass data from one page and receive it on another using HTML Forms
– Learn to create Dynamic Form Fields including Dynamic Select Lists
– Learn to build a Search Interface
– Learn to use Session Variables to provide Password Protection
– Learn to call ColdFusion Components (CFCs) and Custom Tags
– Learn to send email with ColdFusion
– Learn to send email with ColdFusion
– Learn sophisticated data management techniques
– Learn to build and use Custom Tags
– Learn to build and use ColdFusion Components (CFCs)
– Learn to handle errors properly
– Learn to work with ColdFusion and XML

Content of Training ColdFusion / Comprehensive

  1. Introduction to ColdFusion
    1. Static pages vs. Dynamic pages
    2. Server-side Web Technologies
    3. Database Alphabet Soup: ODBC/JDBC, DSNs and SQL
    4. Course Objectives and Prerequisites
    5. Introduction to Course Project
  2. ColdFusion Basics
    1. Using CFML
      1. Code Editors
      2. Dreamweaver Interface
      3. Tag Updaters / Extensions
      4. Tag Editing Dialog Boxes
    2. Embedded Tag Help
    3. Using ColdFusion Comments
    4. Creating Variables
      1. <cfset> and <cfoutput>
    5. Variable Scope/Prefixes
    6. Built-in ColdFusion Functions
      1. CF Function Reference (Dreamweaver specific)
      2. Online Reference (http://livedocs.adobe.com)
      3. Tip: (http://cfquickdocs.com)
    7. Using <cfinclude> to reuse code
  3. Dynamic Data: Querying the Database
    1. Database Basics
      1. Introduction to SQL
      2. Select Statement
      3. Update Statement
      4. Insert Statement
      5. Delete Statement
      6. Data Source Name (DSN) / Remote Development Server (RDS)
      7. The DSN Used in This Class: movieList
    2. Course Project Database
    3. Querying the database with <cfquery>
      1. <cfdump> for Quick Output
    4. Customizing Display with <cfoutput>
      1. Building Dynamic Tables
      2. Shortcut: <cftable>
      3. Shortcut: Dynamic Table Tool (in Dreamweaver)
  4. Creating a Drill-down Interface
    1. Passing Variables between Pages
      1. « Two-page method »
    2. Receive Variables through the URL
      1. Using a WHERE clause in a SQL Statement
      2. Protecting Against SQL Injection Attacks with <cfqueryparam>
  5. Conditional Statements and Forms
    1. Conditional Statements
      1. <cfif>, <cfelseif> and <cfelse>
      2. Comparison Operators
      3. Operator
      4. Description
      5. Using the isDefined() function
    2. HTML Form Review
    3. Self-Submitting Forms
      1. Using the <cfparam> tag to set a default value
      2. Quick Examination of a ColdFusion Framework (Methodology): Fusebox
    4. Dynamically Populating Select Lists
      1. HTML Review: <select> tags
      2. Introducing the <cfform> Tag
      3. Shortcut: <cfselect>
  6. Quick Introduction to RSS and Ajax with <cfform>
    1. Reading an RSS Feed
    2. Introducing the <cfform> Tag
    3. Building a Mask with <cfform>
    4. Automatically Build a Dynamic Select List with <cfselect>
  7. Search Interface
    1. Creating a Search Interface
      1. Using % and _ in a LIKE Statement
  8. Insert Records into the Database
    1. Inserting Records
      1. SQL Insert Statement
      2. Insert Record Step 2 – the Insert
      3. Shortcut: <cfinsert>
      4. Redirect Users with <cflocation>
    2. Automated Form Validation
      1. Client-side vs. Server-side validation: When does the validation code run?
  9. Edit (Update) Database Records
    1. Updating records
      1. SQL UPDATE Statement Review
      2. Passing the Primary Key
      3. Page 2 – View Current Data in a Form
      4. Page 3 – Perform the Update to the Database
      5. Shortcut: <cfupdate>
    2. Deleting Records
      1. Note on Deleting records
      2. Review of the SQL Delete Statement
      3. « Deleting » without deleting
      4. No <cfdelete>!
  10. Reusing Code
    1. Reusing code with <cfinclude> and <cflocation>
    2. Custom Tags
      1. Where to store Custom Tags
      2. CALLER and ATTRIBUTE scopes
      3. Using <cfmodule>
      4. A Note about CFX tags
    3. User Defined Functions (UDFs) and ColdFusion Components (CFCs)
      1. Creating UDFs with the <cffunction> tag
      2. Using ColdFusion Components (CFCs)
    4. Creating Components
      1. Calling or Invoking Components
      2. Passing Arguments to Components
      3. The Component Code
      4. The main CFML page
      5. View a Component directly in the browser
  11. Using Session Variables for Password Protection
    1. Session Variables
      1. Using Application.cfc to Enable Session Management
      2. Creating Password Protected Pages
      3. Password-protect.cfm (the included page)
      4. Application.cfm
      5. Locking Session and Application variables with <cflock>
  12. Tracking User Information with Cookies (optional)
    1. Using Cookies to Track Users
  13. Sending email with <cfmail> (optional)
    1. Using ColdFusion to Send Email
      1. <cfmail> Tag Syntax
  14. Managing Data
    1. Creating a User Administration Page
      1. Displaying Users
      2. Adding Users
      3. Editing and Deleting Users
      4. Controlling Access to the Page
    2. Allowing Users to Add and Edit Data
      1. Displaying Data
      2. Adding Data using Stored Procedures
      3. Editing and Deleting Data
    3. Conclusion
  15. Custom Tags
    1. Calling Custom Tags
      1. thisTag Structure
    2. Storing Custom Tags
    3. Other Ways of Calling Custom Tags
      1. CFMODULE
      2. CFIMPORT
    4. Conclusion
  16. ColdFusion Components
    1. CFC Basics
    2. Creating CFCs
    3. Storing CFCs
    4. Invoking CFCs
      1. Passing Argument Values
    5. Extending ColdFusion Components
    6. Application.cfc
      1. Application.cfc Methods
      2. Application.cfc Benefits
    7. Conclusion
  17. Handling Errors
    1. Handling Exceptions
      1. Compiler Exceptions
      2. Runtime Exceptions
    2. cftry/cfcatch
      1. Exception Types
    3. Locking Code to Prevent Errors
      1. Race Conditions
      2. Named Locks
    4. Conclusion
  18. ColdFusion and XML
    1. XML Functions
      1. Creating New XML Documents
      2. Searching XML Documents
      3. Validating XML Documents
    2. Processing RSS Feeds
      1. Processing RSS Feeds with XmlSearch()
      2. Processing RSS Feeds with XmlTransform()
    3. ColdFusion and WDDX
      1. <cfwddx>
      2. WDDX vs. Web Services
    4. Conclusion
ColdFusion / Comprehensive
Training ColdFusion / Comprehensive

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Citrix XenServer 5.6 Administration – 5 days

Class overview :

In this course, students will learn the skills necessary to configure and administer Citrix XenServer 5.6, Citrix XenCenter, and Citrix Provisioning Services 5.6. Through hands-on labs, students will gain experience configuring a XenServer virtualization server; creating XenServer resource pools and connecting to remote storage; using XenMotion and automatic virtual machine placement; and creating, assigning and administering virtual disks.

Class goals :

Upon successful completion of this course, learners are able to demonstrate the following objectives:

  • Install, configure and administer XenServer 5.6
  • Configure and administer XenCenter
  • Deploy and manage Provisioning Services 5.6
  • Configure a XenServer virtualization server
  • Manage a XenServer using XenCenter
  • Create Windows and Linux virtual machines
  • Create XenServer resource pools and connect to remote storage
  • Use XenMotion and automatic virtual machine placement
  • Design a Provisioning Services farm
  • Create, assign and administer virtual disks
  • Manage target devices

Content of Citrix XenServer 5.6 Administration

Module 1: Introductions and Course Overview

Module 2: XenServer Introduction

Module 3: XenServer and XenCenter Installation

Module 4: Windows Virtual Machines

Module 5: Linux Virtual Machines

Module 6: Templates and Life-Cycle Operations

Module 7: XenConvert

Module 8: Resource Management

Module 9: Managing XenServer

Module 10: Networking

Module 11: Storage

Module 12: Resource Pools

Module 13: High Availability

Module 14: Workload Balancing

Module 15: Troubleshooting XenServer

Module 16: Provisioning Services Installation and Configuration

Module 17: vDisk Administration

Citrix XenServer 5.6 Administration
Training Citrix XenServer 5.6 Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition – 5 days

Class overview :

This course provides the foundation to manage, configure and monitor advanced features and components of Citrix NetScaler 9.0 Platinum Edition. Interactive discussion and hands-on labs guide learners through advanced administration tasks such as troubleshooting, configuring application security with the Citrix Application Firewall feature, tuning the NetScaler for high traffic, configuring Authentication Authorization and Accounting for system management, and configuring Advanced Policies using service callouts.

Class goals :

Upon successful completion of this course, learners are able to:

  • Identify common web attacks and vulnerabilities
  • Write PERL compatible regular expressions
  • Configure Citrix Application Firewall 9.0 to protect web applications
  • Troubleshoot Citrix Application Firewall 9.0
  • Install and configure Citrix EdgeSight for NetScaler to monitor web application performance
  • Install, configure, and use Citrix Command Center to manage NetScaler devices
  • Configure and use additional advanced features of NetScaler 9.0 including NetScaler Web Logging, HTTP Callout, and AAA authentication for web applications

Content of Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Troubleshooting

  • Troubleshooting Resources (Citrix Knowledge Center; Citrix Product Documentation; Citrix Technical Support; Collected NetScaler Data; Troubleshooting Log)
  • NetScaler System Overview (NetScaler Processes)
  • nCore Configuration Architecture
  • Built-In Tools (Nsconmsg; Network Traffic Capture; show and stat Commands; Reporting Tool; Shell Tools; Command-Line Interface Tools; Configuration Utility Tools)
  • Third-Party Tools (Network Protocol Analyzers; Web Browser Plug-ins; SNMP Browsers; FTP Clients)

Introducing Application Firewall

  • Application Attacks (Application Attack Description; Goals of Application Attacks; Most Common Types of Web Application Attacks; The Application Firewall Solution; Business Problems)
  • The Benefits of Application Firewall (Application Layer Protection; Positive Security Model; Negative Security Model; Deep Stream Inspection; Adaptive Learning Engine; Web Application Vulnerabilities; Security Audits and Application Firewalls)
  • Payment Card Industry Data Security Standard (Importance of PCI; Common Coding Vulnerabilities; PCI-DSS Report; Packet Processing and Inspection; Request Process; Response Process; Deployment Considerations)
  • Profiles and Policies (Profiles; Policies)

Profiles and Policies

  • Profiles (Profile Types; Default Profiles; Creating a Profile in the Configuration Utility; Creating a Profile in the Command-Line Interface; Action Settings; Sessionization and Security Checks; Profile Settings; Error Page; HTML Comment Stripping; XML Error Object; Other Profile Settings)
  • Policies (Policy Creation; Policy Binding; Policy State; Policy Priorities; Creating a Policy in the Configuration Utility; Creating Policies in the Command-Line Interface; Binding and Prioritizing a Policy in the Configuration Utility; Binding Policies in the Command-Line Interface)
  • Engine Settings

Regular Expressions

  • Regular Expressions
  • Forms of Regular Expressions
  • Using Regular Expressions
  • Metacharacters and Literal Characters
  • Metacharacters
  • Escapes
  • Quantifiers
  • Backreferencing
  • Lookaheads
  • Regular Expression Scope

Attacks and Protections

  • Security Checks (Profile Types; Common Security Checks; HTML Security Checks; XML Security Checks; Request-Side and Response-Side Checks)
  • HTTPS Web Applications
  • Buffer Overflow Exploits (Goals of a Buffer Overflow Attack; Consequences of a Buffer Overflow Attack)
  • Buffer Overflow Protection (Default Maximum Values; Modifying Buffer Overflow Settings)
  • Parameter Manipulation (Parameter Manipulation Example)
  • Server Misconfiguration
  • Deny URL Protection (The Deny URL List; Adding a Deny URL in the Command-Line Interface; Deleting a Deny URL in the Command-Line Interface)
  • SQL Injection (How SQL Injection Works)
  • HTML SQL Injection Protection (SQL Keywords and Special Characters; Modifying SQL Injection Action Settings; XML SQL Injection Security Check; Cross-Site Scripting; Attacking the Trust Relationship; How Cross-Site Scripting Attacks Work; Results of a Cross-Site Scripting Attack; Preventing Cross-Site Scripting Attacks; HTML Cross-Site Scripting Protection; Cross-Site Scripting Action Settings; Transform Cross-Site Scripts; Check Complete URLs for Cross-Site Scripting; Additional Action Settings; Relaxations; Modifying Cross-Site Scripting Action Settings; Adding a Cross-Site Scripting Relaxation Using the Command-Line Interface; Deleting a Cross-Site Scripting Relaxation Using the Command-Line Interface; XML Cross-Site Scripting Security Check)
  • Command Injection (Command Injection Examples)
  • Field Format Protection (Field Types and Field Formats; Predefined Field Types; Custom Field Types; Field Format Configuration; Default Field Format; Confidential Fields; Adding a Custom Field Type; Setting a Default Field Type; Modifying Field Format Settings; Adding a Confidential Field; Modifying a Confidential Field)
  • Cookie Tampering and Poisoning (Types of Cookies; How Cookies Are Added; Web Server Sessions)
  • Cookie Consistency Protection (Sessionization and Cookies; Relaxations; Adding a Cookie Consistency Relaxation in the Command-Line Interface; Deleting a Cookie Relaxation in the Command-Line Interface)
  • Form/Hidden Field Manipulation (Example of Hidden Field Manipulation)
  • Form Field Consistency Protection (Field Consistencies; User Sessions; Adding a Form Field Consistency Relaxation Using the Command-Line Interface; Deleting a Form Field Consistency Relaxation Using the Command-Line Interface)
  • Forceful Browsing (Forceful Browsing Protection)
  • Start URLs (The Start URL List; Sessionization and Start URLs; Modify Start URL Check; Adding a Start URL in the Command-Line Interface; Deleting a Start URL in the Command-Line Interface)
  • Backdoors and Misconfigurations
  • URL Closure (Enforcing URL Closure in the Configuration Utility; Enforcing URL Closure in the Command-Line Interface)
  • Identity Theft Attacks (Types of Identity Theft Attacks; Application Firewall Protection Against Identity Theft)
  • Credit Card Protection (Predefined Credit Cards; Credit Card Settings)
  • Protecting Credit Cards (Protecting Credit Cards in the Configuration Utility; Protecting Credit Cards in the Command-Line Interface)
  • Errors Triggering Sensitive Information Leaks
  • Safe Object Protection (Defining a Safe Object; Adding a Safe Object; Adaptive Learning for Security; Learning Over Time; Learning Thresholds; Generalized and Simple Rules; Learned Rules; Enabling Learning; Setting Learning Thresholds; Managing Learned Rules)

Application Firewall Troubleshooting

  • Application Firewall and Applications (HTTP Headers; HTML Comment Stripping)
  • Configuration Issues (Policy Issues; Profile Issues; Suggested Actions)

Queuing and Connection Tuning

  • HTTP Connections (Keep-alive HTTP Connections; HTTP 1.0 and 1.1 Behavior; Pipelined Requests)
  • HTTP Connection Management and NetScaler HTTP Behavior (Client Keep-Alive; Connection IP Address Control; Maximum Requests and Maximum Connections; Connection Idle Settings; Trackable Connections)
  • TCP Buffering (Down-State Flush and Access Down Connection Settings; TCP Optimization; Advertised Window Size; Window Scaling; Selective Acknowledgement)
  • Surge Queue
  • Surge Protection (Request and Response Rates; Throttle Rate; Disabling Surge Protection in the Configuration Utility; Disabling Surge Protection for a Service in the Configuration Utility; Setting Thresholds in the Configuration Utility)
  • Priority Queuing (Enabling Priority Queuing in the Configuration Utility; Creating a Priority Queuing Policy in the Configuration Utility; Binding Priority Queuing Policies in the Configuration Utility; Weighted Queuing)
  • HTTP Denial-of-Service Protection (Enabling HTTP DoS Protection in the Configuration Utility; Adding a HTTP DoS Policy in the Configuration Utility; Challenged JavaScript Responses; Client Detection Tuning and JavaScript Challenge Response Rate; HTTP DoS Protection Deployment Guidelines; Attack Characteristics)
  • IP Rate Limiting (Rate Control by Subnet Example; IP Rate Limiting Best Practices)

Authentication, Authorization, and Auditing

  • Users, Groups and Command Policies (Authentication, Authorization, and Auditing; Systems and AAA Users Groups; Local Accounts; External Authentication)
  • External Authentication for System Users (Authentication Actions and Policies; Configuring Local Authentication; Configuring External Authentication with Explicit Accounts; Configuring External Authentication with Group Extraction; Creating an External Authentication Policy; Creating local groups in the Command-Line Interface; Binding Groups in the Command-Line Interface; Creating an LDAP Authentication Action in the Command-Line Interface; Creating an Authentication Policy in the Command-Line Interface; Binding the Policy in the Command Line Interface; Authentication Troubleshooting; External Authentication Common Issues)
  • AAA for Traffic Management (Enabling AAA for Traffic Management; AAA for Application Traffic; Basic AAA Setup for Application Traffic; Workflow for AAA Traffic Management)
  • Configuration (Creating an Authentication Virtual Server; Creating an Authentication Virtual Server in the Command-Line Interface; Binding an SSL Certificate in the Command-Line Interface; Binding a Virtual Server to an Authentication Policy in the Command-Line Interface; Configuring a Virtual Server to use an Authentication Virtual Server in the Command-Line Interface; Configuring Authorization Policies for Traffic Management; Setting the Default Traffic Management Authentication Action to Deny in the Command-Line Interface; Creating an Authorization Policy to Allow Access
  • Audit Logging (Audit Logging Troubleshooting)

HTTP Service Callouts

  • HTTP Callouts
  • Configuring HTTP Callouts (Configuring HTTP Callouts in the Configuration Utility; Configuring HTTP Callouts in the Command-Line Interface; Callout Examples; HTTP Callout Response Parsing)
  • HTTP Callout Use Cases (Scenario 1: Filter Clients Based on an IP Address Blacklist; Scenario 2: Fetch and Update Content; HTTP Callout Auditing)

EdgeSight for NetScaler

  • Data Flow Overview
  • JavaScript Response Injection (User Metrics; NetScaler Metrics; NetScaler Metric Example; Data Validity)
  • EdgeSight for NetScaler Server Components (Component Installation Scenarios)
  • EdgeSight for NetScaler Installation Considerations (Installing EdgeSight for Netscaler; SQL Server; SQL Reporting Services; EdgeSight for NetScaler Components; Installing EdgeSight Database Components; Installing EdgeSight Report Console and Data Collector Components; EdgeSight Post-Installation Wizard; Upgrading EdgeSight for NetScaler)
  • Reporting Services Initial Configuration (NetScaler Configuration Overview; Configuring HTML Injection; Editing the prebody.js script; Configuration Example in the Command-Line Interface; Add NetScaler System to EdgeSight for NetScaler Data Collector; Topology Data Collectors with SSL)
  • EdgeSight Charts and Reports
  • EdgeSight Troubleshooting (Troubleshooting OS Components; Troubleshooting HTML Injection; Troubleshooting Injection Request; Troubleshooting Unknown Device; Troubleshooting from the NetScaler Command-Line Interface)

Command Center

  • Command Center Introduction (Command Center NetScaler Features; NetScaler and WANScaler Support)
  • Command Center Clients (Connecting to Command Center)
  • Server Requirements (Disk Space Requirements; MySQL Considerations; MicrosoftSQL Server 2005 Considerations)
  • Port Setting Requirements (Command Center Installation; Linux Considerations; Installation; Capacity Planning; Backup; Installation Modes; Installation Considerations)
  • Command Center Functionality (Command Center Home Page; Discovery; Fault Management; Configuration Management; Change Management; Centralized Certificate Management; Performance Monitoring)
  • Command Center Administration (Security Administration; Administration Operations; Administration Configuration; Server Details)
  • Command Center Troubleshooting (Microsoft SQL Database Issues; Discovery Issues; Performance Data Issues; Linux Command-Line Interface Access Issues; Reporting Issues)

NetScaler Web Logging

  • NetScaler Web Logging Introduction (Architecture Overview; Communication Process)
  • NetScaler System Configuration (Enabling Web Logging in the Configuration Utility; Enabling Web Logging in the Command-Line Interface; Configuring the Buffer Size in the Configuration Utility; Configuring the Buffer Size in the Command-Line Interface)
  • NSWL Client Installation (Logging System Components; Installing the NSWL Client on Windows; NSWL Options; Windows Service Registry Key)
  • NSWL Client Configuration (NetScaler IP Addresses; Log Filters; Defining Log Properties; Running NSWL; Verifying the Configuration)
  • Troubleshooting Web Logging (NSWL Troubleshooting; NetScaler Troubleshooting; Buffer Overflow)
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Basic Administration for Citrix NetScaler 9.2 – 5 days

Class overview :

This CNS-203-1I Basic Administration for Citrix NetScaler 9.2 course (also known as CNS2031I, CNS-2031I, CNS-2031 and CNS2031) covers the initial configuration and administration of Citrix NetScaler 9.2. Learners gain an understanding of NetScaler features such as load balancing, SSL offload, classic and advanced expressions, caching, compression, content switching, and AppExpert templates.

Class goals :

Upon successful completion of this course, learners are able to:

  • Identify deployment considerations and network placement options
  • Perform an initial configuration
  • Identify NetScaler-owned IP addresses
  • Configure virtual local area networks (VLANs)
  • Configure reverse network address translation (RNAT)
  • Configure access control lists
  • Configure high availability
  • Configure load balancing
  • Configure SSL offload
  • Configure global server load balancing (GSLB)
  • Configure NetScaler features using classic and advanced policy expressions, including:
    • Content filtering
    • Content switching
    • Compression
    • Rewrite
    • Responder
    • URL transformation
    • Integrated caching
  • Perform basic management, such as auditing, logging and monitoring

Content of Basic Administration for Citrix NetScaler 9.2

Module 1: Introductions and Course Overview

Module 2: Introducing and Deploying Citrix NetScaler

Module 3: Networking

Module 4: Configuring High Availability

Module 5: Securing Citrix NetScaler

Module 6: Configuring Load Balancing

Module 7: Configuring SSL Offload

Module 8: Configuring Global Server Load Balancing

Module 9: Using AppExpert Classic to Optimize Traffic

Module 10: Using AppExpert with Responder, Rewrite and URL Transformation

Module 11: Using AppExpert for Content Switching

Module 12: Using AppExpert to Optimize Traffic

Module 13: Management

Basic Administration for Citrix NetScaler 9.2
Training Basic Administration for Citrix NetScaler 9.2

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Implementing Citrix Access Gateway 9.0 Enterprise Edition – 2 days

Class overview :

This CAG-200-1I Implementing Citrix Access Gateway 9.0 Enterprise Edition course (also known as CAG2001I, CAG2001, CAG-2001 and CAG-2001I) covers information administrators and other IT professionals need to successfully deploy and manage Access Gateway 9.0 Enterprise Edition and the Access Gateway Plug-ins.

Class goals :

Upon successful completion of this course, learners are able to:

  • Understand how the Access Gateway Enterprise Edition differs from the Standard and Advanced Editions
  • Perform the initial configuration of the Access Gateway server
  • Install Access Gateway Plug-ins for Windows, ActiveX and Java
  • Configure VPN virtual servers
  • Create policies to customize VPN behaviour
  • Customize client experience and login pages
  • Configure Access Gateway to integrate with XenApp and WANScaler
  • Create and configure policies and profiles

Content of Implementing Citrix Access Gateway 9.0 Enterprise Edition

Deploying the Citrix Access Gateway

  • Access Gateway Features
  • Access Gateway Product Line
  • Identifying Access Gateway Hardware Platforms
  • Identifying the Access Gateway Hardware Components
  • Identifying Network Placement Options
  • WANScaler Integration
  • Identifying Deployment Considerations

Performing an Initial Installation and Configuration

  • Access Gateway Installation
  • Logging in to the Access Gateway
  • Setting the Password
  • Managing Licensing
  • Enabling Access Gateway Features
  • Initial Configuration
  • Understanding Virtual Local Area Networks
  • Running the Access Gateway Wizard
  • Saving the Configuration

Performing Basic Administration

  • Access Gateway Administrative Tools
  • Introducing the Configuration Utility
  • Introducing the Command-Line Interface
  • Introducing FreeBSD
  • Using Third-Party Tools
  • Access Gateway Management
  • Performing an Upgrade
  • Managing Role-Based Administration

Configuring Policies

  • Policy Structure
  • Policy Types and Their Uses
  • Policy Expressions
  • Identifying Qualifiers
  • Identifying Operators
  • Identifying Operands, Wildcards and Context-Sensitive Fields
  • Policy Priority
  • Policy Manager
  • Using Policy Manager
  • Creating Policy Expressions

Configuring Access Policies

  • Endpoint Analysis
  • Configuring Pre-Authentication Policies
  • Authentication Policies
  • Configuring Authentication Policies
  • Authorization Policies
  • Configuring Authorization Policies
  • Session Policies
  • Configuring Credential Passing
  • Timeout Settings
  • Configuring Timeout Settings
  • Client Cleanup
  • Configuring Client Cleanup
  • Split Tunneling
  • Configuring Split Tunneling

Providing User Access

  • Plugin Options and Configuration
  • Displaying Client Options and the Configuration Window
  • Connection Methods
  • Deploying Access Gateway Plugins
  • Configuring Clientless Access
  • Client Software Selection
  • Configuring Access Choices

Customizing the User Experience

  • Intranet Applications
  • Configuring Intranet Applications
  • Intranet IP Addresses.
  • Configuring Intranet IP Addresses
  • Traffic Policies
  • Configuring Traffic Policies
  • TCP Compression Policies
  • Configuring TCP Compression Policies
  • Login Page Customization

Securing XenApp Connections

  • XenApp Overview
  • ICA Proxy Mode
  • Configuring ICA Proxy Mode
  • Binding the Secure Ticket Authority
  • Configuring Web Interface Failover
  • Web Interface Connections through Access Gateway
  • Configuring Web Interface for Access Gateway Connections
  • File Type Association
  • Configuring File Type Association
  • SmartAccess
  • Configuring SmartAccess
  • Configuring XenApp for SmartAccess
  • Configuring Access Scenario Fallback

Auditing and Logging

  • Syslog and Nslog Auditing
  • Configuring Audit Servers
  • Configuring Global Auditing Parameters
  • Configuring Auditing Policies
  • Binding Auditing Policies
  • Viewing Recent Audit Messages
  • Viewing Historical Audit Messages
  • Access Gateway Log Management
  • Monitoring Tool
  • User Connection Management
  • Historical Reporting

Configuring High Availability

  • Introduction to High Availability
  • High Availability Node Configuration
  • Configuring Nodes
  • Verifying High Availability Status
  • Performing Synchronization
  • Performing a Forced Failover
  • High Availability Management
Implementing Citrix Access Gateway 9.0 Enterprise Edition
Training Implementing Citrix Access Gateway 9.0 Enterprise Edition

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Citrix XenApp 5 for Windows Server 2003: Administration – 5 days

Class overview :

This CTX1259CI course (also known as: CTX-1259, CTX1259, CTX-1259CI) provides the foundation necessary to effectively deploy and administer Citrix XenApp 5 for Windows Server 2003 and its components, including Web Interface, Application Streaming, Load Manager, Installation Manager and Secure Gateway.

Class goals :

Upon successful completion of this Citrix course, learners are able to perform the following:

  • Install XenApp in a Windows Server 2003 environment
  • Install and distribute Citrix XenApp Plugins
  • Create and customize Web Interface sites
  • Publish applications, server desktops and content
  • Configure XenApp Web and XenApp Services sites
  • Configure, apply and prioritize policies in a XenApp environment
  • Create and assign load evaluators
  • Configure printers and printer policies and manage print drivers and printer bandwidth
  • Create and configure XenApp administrator accounts and their permissions
  • Configure HDX settings
  • Configure SecureICA encryption, SSL Relay and Secure Gateway
  • Install and distribute applications, service packs and hotfixes

Content of Citrix XenApp 5 for Windows Server 2003: Administration

Installing Citrix XenApp

  • Identifying Components of Citrix XenApp 5
  • Features of XenApp 5 Feature Pack 2
  • Identifying XenApp Management Consoles
  • Installation of Citrix XenApp
  • Making Installation Decisions

Installing and Configuring Citrix XenApp Plugins

  • Citrix XenApp Plugins for Windows
  • Architecture and Communication
  • Citrix Online Plug-in Installation
  • Installing the Citrix Online Plug-in
  • Citrix Online Plug-in Usage
  • Session Reliability

Publishing Resources

  • Publishing Resources
  • Organizing Published Resources for Users
  • Advanced Settings for Published Resource
  • Configuring Advanced Access Control Properties
  • Configuring Server-to-Client Content Redirection
  • Implementing Resource Limits and Client Options
  • Configuring Resource Appearance
  • Published Resource Management
  • Viewing Published Resource Usage
  • Modifying Published Resource Properties
  • Disabling or Hiding a Published Resource

Enabling Web Access to Published Resources

  • Web Interface Architecture and Communications
  • Web Interface Installation
  • Site Creation
  • Creating XenApp Web Sites
  • Creating XenApp Services Sites
  • Modifying a Web Interface Site
  • Site Appearance
  • Configuring the Site Appearance
  • Configuring Session Preferences
  • Configuring Workspace Control
  • XenApp Plugins and the Web Interface
  • Configuring Plugin Deployment
  • Configuring Client for Java Settings
  • Authentication Configuration
  • Configuring Explicit Authentication
  • Configuring Pass-through Authentication
  • Configuring Smart Card Authentication
  • Web Interface Access Methods
  • Configuring an Access Method
  • Client-side Proxy Setting Configuration
  • Server Configuration
  • Adding Server Farms
  • Configuring Load Balancing
  • Enabling Fault Tolerance
  • Configuring the Citrix XML Service
  • Web Interface Site Removal

Configuring Policies in Citrix XenApp

  • Architecture and Communication
  • Policies in Citrix XenApp
  • Identifying Policy Rules
  • Using the Streamed Applications Rule
  • Creating Policies in Citrix XenApp
  • Applying Policies Using Filters
  • Prioritizing Policies
  • Using the Policy Search Engine
  • Merging Shadow Policies
  • Common Policy Configuration Missteps

Configuring Sessions in Citrix XenApp

  • Session Connection Settings
  • Configuring Virtual IP Addresses
  • Configuring Broadcast Setting
  • Configuring the Citrix XML Service
  • Configuring Time Zone Settings
  • Configuring Novell Directory Services
  • Session Reconnection Configuration
  • Configuring Keep-Alive Setting
  • Configuring Session Reliability
  • Configuring Auto Client Reconnect
  • Session Performance Configuration
  • Configuring HDX Broadcast Display
  • Configuring HDX 3D Browser Acceleration
  • Configuring HDX MediaStream Multimedia Acceleration
  • Configuring HDX MediaStream for Flash
  • Configuring SpeedScreen Latency Reduction
  • Configuring HDX 3D Progressive Display

Configuring Citrix XenApp

  • Citrix Administrator Accounts and Permissions
  • Adding Administrator Accounts
  • Configuring Administrator Permissions
  • Configuring Folder Permissions
  • Configuration Logging
  • Creating the Configuration Logging Database
  • Configuring Configuration Logging
  • Data Collectors and License Servers
  • Configuring Data Collectors
  • Specifying the License Server
  • Performance Settings
  • Optimizing CPU Utilization
  • Implementing Virtual Memory Management
  • Administration Settings
  • Configuring Health Monitoring and Recovery
  • Configuring Remote Console Connections
  • Configuring ICA Connection Limits
  • Configuring Shadow Settings
  • Power and Capacity Management

Configuring Load Management

  • Load Balancing Process
  • Load Calculation
  • Load Evaluator Configuration
  • Creating Custom Load Evaluators
  • Assigning Load Evaluators to Servers and Applications
  • Load Monitoring
  • Monitoring Load Evaluator Usage
  • Monitoring Load Evaluator Rule Activity
  • Logging Load Manager Activity

Delivering Applications with XenApp

  • Application Installation
  • Shadow Isolation Environments
  • Creating an Isolation Environment
  • Configuring Isolation Environment Settings
  • Associating an Application with an Isolation Environment
  • Installation Manager Overview
  • Installation Manager Packaging
  • Rolling Back the Packager
  • Packaging an Application
  • Packaging a File or Folder Contents
  • Packaging an Unattended Installation
  • Package Delivery
  • Adding a Package to the Installation Manager Database
  • Installing a Package
  • Publishing a Package
  • Installation Manager Administration
  • Configuring Installation Manager Properties
  • Creating Server Groups
  • Creating and Using Package Groups
  • Viewing Package Status
  • Uninstalling a Package

Configuring Printing

  • Architecture and Communication
  • Printer Provisioning
  • Secure Client Printing
  • Workspace Control
  • Network Considerations
  • Print Drivers
  • Client Printers
  • Enabling Client Printer Auto-creation
  • Creating Auto-retained Printers
  • Creating Permanent Client Printers
  • Creating Auto-restored Client Printers
  • Network Printers
  • Importing Print Servers
  • Assigning Network Printers to Users
  • Managing Printer Bandwidth
  • Print Driver Management
  • Replicating Print Drivers
  • Maintaining Print Driver Compatibility Lists
  • Configuring Print Driver Mappings
  • Assigning Printer Creation Settings to Published Applications
  • Common Printing Configuration Missteps

Streaming Applications

  • Application Streaming Components Overview
  • Application Streaming Communications
  • Citrix Offline Plug-in
  • Citrix Streaming Profiler
  • Installing the Streaming Profiler
  • Profile Configuration
  • Setting Profiler Preferences
  • Configuring Profiles
  • Configuring Inter-isolation Communication
  • Viewing and Changing Profile Properties
  • Changing Target Properties
  • Adding a Target to a Profile
  • Deleting a Target from a Profile
  • Upgrading an Application in a Target
  • Deleting an Obsolete Version of a Target
  • Streaming Application Configuration
  • Publishing a Streaming Application
  • Changing the Application Type
  • Specifying an Alternate Profile for a Published Application
  • Enabling the Least-Privileged User Account
  • Using a Policy for Application Delivery
  • Configuring Sites for Streaming Applications
  • Offline Access Management
  • Providing Offline Access
  • Customizing the Offline License Setting
  • Caching Applications for Offline Access

Securing Access to Published Resources

  • SecureICA Encryption
  • Configuring SecureICA Encryption in a Policy Configuring
  • SecureICA Encryption Through a Published Application
  • Citrix SSL Relay
  • Configuring Citrix SSL Relay
  • Access Gateway
  • Secure Gateway
  • Using Digital Certificates
  • Installing the Secure Gateway
  • Configuration for the Secure Gateway
  • Configuring the Secure Ticket Authority
  • Configuring the Access Method
  • Configuring the Web Interface Secure Gateway Settings
  • Secure Gateway Monitoring
  • Security Best Practices
Citrix XenApp 5 for Windows Server 2003: Administration
Training Citrix XenApp 5 for Windows Server 2003: Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Tomcat 6.0 Admin for Windows – 3 days

Class overview :

This Tomcat 6.0 Administration for Windows class covers the important topics of administering the Tomcat 6.0 server including installation, directory structure, configuration using server.xml, web application deployment, the manager tool, JNDI data sources, logging, and monitoring and management of the server. Note: Where applicable, differences or changes in Version 7.0 will be addressed.

Class goals :

– Learn about the history of Tomcat.
– Learn how to install Tomcat
– Learn about the directory structure and batch files.
– Learn how to configure Tomcat.
– Learn how to work with Web applications.
– Learn to work with the Tomcat Manager including how to assign security roles.
– Learn to work with JNDI data sources and JDBC
– Learn about security and permissions.
– Learn how to generate a keystore file.
– Learn logging techniques.
– Learn how to monitor Tomcat’s performance.
– Learn about clustering including directory setup.

Content of Training Tomcat 6.0 Admin for Windows

  1. Tomcat Introduction
    1. History of Tomcat
    2. Version Number and Features
    3. Tomcat Components
      1. Catalina
      2. Jasper
      3. Coyote
    4. JEE Overview
      1. MVC Design Pattern
      2. Servlets/JSP
      3. Directory Structure
      4. JNDI
  2. Installing Tomcat
    1. Download
    2. Installation
    3. Environment Variables
    4. Starting the Server
    5. Verifying Server Operation
    6. Stopping the Server
  3. Tomcat Directory Structure
    1. Batch files in /bin
      1. .exe files
    2. /conf
      1. server.xml
      2. context.xml
      3. web.xml
    3. /logs
    4. /webapps
    5. /lib
    6. /work
    7. /temp
  4. Configuring Tomcat
    1. Role of serverxml
    2. Instance Layout
      1. Server
      2. Service
      3. Virtual Host
      4. Context
    3. serverxml elements
      1. <Server>
      2. <Service>
      3. <Connector>
      4. <Engine>
      5. <Host>
      6. <Context>
      7. <Realm>
      8. <Valve>
  5. Deploying Web Applications
    1. JEE Specification for Web Applications
      1. Servlets and JSP
      2. Model View Controller (MVC) Design Pattern
      3. Directory Structure
      4. web.xml
    2. Document Base
    3. Context and the Document Base
    4. Default Context Descriptor
    5. Placing the Web Application Folders and Files under the Application Base
    6. Deploying a WAR file
    7. AutoDeploy
  6. The Tomcat Manager
    1. /manager Web Application
    2. Managing Web Applications
      1. Deploying
      2. Listing Deployed Applications
      3. Reload Existing Applications
      4. Starting/Stopping
      5. Undeploying
    3. Listing Server Status
    4. Listing Security Roles in the User Database
  7. JNDI Data Sources and JDBC
    1. JNDI
    2. JDBC
      1. Drivers
      2. Data Sources in JDBC 20 and Later
      3. Connection Pooling
    3. Commons Database Connection Pooling
      1. Installation
      2. Guarding against Application Program Failure
      3. Configuration
    4. Data Source Definition
      1. Web Application contextxml
      2. contextxml in /conf
      3. GlobalNamingResources in serverxml
    5. Troubleshooting
  8. Security
    1. Web Application Security
    2. Java SecurityManager
      1. Overview
      2. Standard Permissions
      3. Tomcat Permissions
      4. Starting Tomcat with a Security Manager Using the Default Policy File
    3. Secure Socket Layer (SSL)
      1. Generating a keystore File
      2. Modifications to serverxml for SSL Support in Tomcat
    4. tomcat-usersxml
  9. Logging
    1. Logging Overview
    2. Web Application Logging Techniques
      1. javautillogging
      2. javaxservletServletContext
      3. log4j
  10. Monitoring and Performance Tuning Tomcat
    1. Tomcat
    2. JVM
    3. JMX (Java Management Extensions)
    4. JMX MBeans in Tomcat
      1. Engine
      2. JKMain
      3. String Cache
      4. Server
      5. Users
    5. Configuring Tomcat to use MBeans
    6. Accessing MBeans
      1. jconsole
      2. jVisualVM
      3. PSI Probe
  11. Clustering
    1. Using Clustering for Replication and Load Balancing
    2. Running Multiple Instances of Tomcat
      1. Directory Setup
      2. Port Number Modifications
      3. All to All with DeltaManager
      4. Backup to One Cluster with BackupManager
    3. Enabling Session Replication
      1. Session Persistence Using Shared File System
      2. Session Persistence Using Shared Database
      3. Session Persistence using Shared Database: Database Table
      4. In-memory Replication Using SimpleTcpCluster
    4. Load Balancing Using mod_jk Connector to Apache2x Web Server
Tomcat 6.0 Admin for Windows
Training Tomcat 6.0 Admin for Windows

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Service-Oriented Architecture (SOA): A Comprehensive Hands-On Introduction – 3 days

Class overview :

Service-Oriented Architectures (SOA) package business processes as services, enabling organizations to become more agile by integrating internal and external systems, regardless of their platform.

Class goals :

  • Design modern Service-Oriented Architectures (SOA)
  • Evaluate and analyze your organization to map it as a « set of services »
  • Develop logical service model designs using the Service-Oriented Modeling Framework (SOMF)
  • Convert logical designs into service contracts that can be implemented in any development environment
  • Select the right service technology to support each of the four service-oriented business scenarios
  • Orchestrate services to implement interoperable solutions

Content of Service-Oriented Architecture (SOA): A Comprehensive Hands-On Introduction

Overview of SOA

  • Integrating business processes with SOA
  • Deriving services from the organization’s goals and purpose
  • Merging SOA design and project management processes

Architecting Services

Service-Oriented design process

  • Progressing from conceptual services to buildable services
  • Structuring business requirements into SOA
  • Aligning services with the organization

Following an architectural road map

  • Working forward to deliver applications
  • Recycling backwards to support change

Mapping Services to Your Organization

Discovering conceptual services

  • Defining the service domain
  • Drilling down into atomic services
  • Consolidating into composite services

Refining the conceptual design

  • Identifying the underlying resource for the service
  • Leveraging legacy assets for inclusion in the SOA
  • Selecting cross-boundary services

Modeling Services

Developing logical services

  • Integrating consumers
  • Exploiting the four composition styles
  • Hierarchies
  • Star
  • Network
  • Circular

Achieving effective designs

  • Supporting loose coupling
  • Handling sequential processing
  • Establishing relationships between consumers and services

Addressing the business needs

  • Designing for reuse and integration
  • Aligning services with the organization to improve responsibility

Factoring in brokers

  • Identifying « services for services »
  • Leveraging the seven categories of brokers
  • Transform
  • Filter
  • Gateway
  • Monitor
  • Enricher
  • Locator
  • Router
  • Aggregator

Converting Designs to Specifications

Specifying operations

  • Deriving operations from use cases
  • Identifying design flaws early to take corrective action

Communicating the specification

  • Building on the three principles of contract design
  • Expressing the service as a contract

Messaging for interoperability

  • Evolving messages from the SOA design
  • Formatting the operation’s messages

Finalizing the service design

  • Specifying operations and endpoints
  • Binding messages to operations

Transitioning from Design to Implementation

Supporting implementation

  • Enabling parallel development with contract-first design
  • Optimizing infrastructure for SOA scenarios
  • Interoperability
  • Internal backbone
  • Ajax
  • Implementing components of the SOA

Building services

  • Creating services from the SOA modeling process
  • Developing service consumers

Orchestrating services

  • Assembling services to deliver new functionality
  • Dealing with long running processes

Avoiding Common Problems

Applying « Lessons Learned » to improve designs

  • Facilitating asynchronous services
  • Dealing with change and growth

Ensuring performance

  • « Chatty » vs. « Chunky » messages
  • Avoiding the failures of applying object-oriented design to services

Managing the SOA Environment

Instituting governance at run time and design time

  • Advancing up the Services Integration Maturity Model
  • Leveraging Enterprise Services Buses (ESB)
  • Integrating key tools in managing your SOA environment
Service-Oriented Architecture (SOA): A Comprehensive Hands-On Introduction
Training Service-Oriented Architecture (SOA): A Comprehensive Hands-On Introduction

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Virtualization Technologies: A Comprehensive Hands-On Introduction – 4 days

Class overview :

Virtual machines allow a computer to run multiple operating systems simultaneously, letting you partition servers to isolate applications, improve portability and migration, or create entire testing labs within a single PC.

Class goals :

  • Employ VMware and Microsoft virtual machine (VM) technologies
  • Combine Windows and Linux workstations and servers on a single platform
  • Leverage VMs to build testing, support and training environments
  • Partition physical servers to decrease operating costs
  • Migrate from physical to virtual machines
  • Manage VMs on VMware ESX and Microsoft Hyper-V

Content of Virtualization Technologies: A Comprehensive Hands-On Introduction

Virtualization Concepts

Overview of virtual machines

  • Defining virtual machines (servers and workstations)
  • Advantages of deploying VMs

Virtual machine products

  • VMware Workstation
  • Server
  • ESX
  • Microsoft Virtual PC
  • Hyper-V
  • Other alternatives

Creating Virtual Machines

Comparing workstation products

  • Functionality
  • Performance
  • Contrasting Windows and Linux hosts

Abstracting hardware

  • Partitioning shared resources
  • Accessing raw and virtual disks
  • Virtualizing CPU and memory resources

Deploying virtual workstation software

  • Planning for automatic installations
  • Designing virtual networks
  • Bridged, NAT and host-only networking
  • Controlling guest OS access

Building guest operating systems

  • Allocating host resources
  • Configuring virtual hard drives
  • Enhancing VMs using virtualization tools
  • Managing peripheral devices
  • Mapping to floppy and CD images

Exploiting Virtual Workstation Functionality

Creating support platforms

  • Readying multiple operating systems
  • Managing display modes
  • Suspending and resuming virtual workstations

Expanding application support

  • Extending legacy application life
  • Widening platform options
  • Resolving version conflicts

Constructing a test environment

  • Accessing host files
  • Taking and restoring snapshots

Developing training environments

  • Protecting guest operating systems
  • Exploiting nonpersistent disks

Partitioning Servers

Establishing requirements

  • Justifying server virtualization
  • Partitioning via hardware and software
  • Recognizing server functionality needs

Choosing virtual server hosts

  • Evaluating performance and features
  • Considering security implications

Executing Server VMs

  • Working in interactive mode
  • Implementing headless operation

Managing virtual servers remotely

  • Exploiting remote management consoles
  • Connecting to the Web interfaces
  • Securing remote management

Deploying virtual servers

  • Automating tasks via scripting
  • Migrating physical to virtual servers
  • Optimizing performance
  • Accessing Storage Area Networks (SANs)

Clustering virtual machines

  • Distributing workloads via network load balancing (NLB)
  • Establishing fault tolerance by utilizing clustering services

Data Center Virtualization with ESX

Building the architecture

  • Examining ESX architecture
  • Planning and configuration

Leveraging ESX features

  • Networking with vSwitches and port groups
  • Optimizing resource utilization

Managing Microsoft Hyper-V

Maintaining virtual machines

  • Contrasting Hyper-V and ESX architecture
  • Implementing remote management tools

Securing virtual machine deployments

  • Implementing permissions
  • Reducing attack surface with Server Core
Virtualization Technologies: A Comprehensive Hands-On Introduction
Training Virtualization Technologies: A Comprehensive Hands-On Introduction

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training XML for Java Developers – 4 days

Class overview :

This four-day course builds skills in Java’s XML processing APIs. The course is intended for students with a working knowledge of XML — and possibly DTDs or XML Schema — who want to build XML applications or components using the Java language. Everything in the course adheres to W3C and Java standards for completely portable code.

Class goals :

– Understand the use of SAX and DOM APIs for XML parsing.
– Understand the need for JAXP as an additional layer to the standard contract between applications and parsers.
– Parse element and attribute content, processing instructions, and other document information using SAX.
– Parse documents using the DOM.
– Modify, create and delete information in an XML document using the DOM.
– Write simple and complex queries into XML document content using XPath.
– Use XSLT for XML-to-XML, XML-to-HTML, or XML-to-text transformations.
– Build standalone and web applications that build on XSLT transformation logic.
– Use JAXB to generate persistent Java object models based on XML Schema.
– Implement XML persistence using the JAXB.

Content of Training XML for Java Developers

  1. XML Parsing Using Java
    1. The Java API for XML Processing (JAXP)
      1. Parsing XML
      2. SAX and DOM
      3. What the W3C Says
      4. What the W3C Doesn’t Say
      5. Sun and Apache
      6. JAXP
      7. Parser Factories
      8. Pluggable Parsers
      9. Parser Features and Properties
    2. The Simple API for XML (SAX)
      1. Origins of SAX
      2. The SAX Parser
      3. The SAX Event Model
      4. Reading Document Content
      5. Handling Namespaces
      6. SAX Features for Namespaces
      7. Parsing Attributes
      8. Error Handling
      9. DTD Validation
      10. Schema Validation
      11. Handling Processing Instructions
    3. The Document Object Model (DOM)
      1. Origins of the DOM
      2. DOM Levels
      3. DOM2 Structure
      4. The Document Builder
      5. DOM Tree Model
      6. DOM Interfaces
      7. Document, Node and NodeList Interfaces
      8. Element and Text Interfaces
      9. Finding Elements By Name
      10. Walking the Child List
      11. The Attribute Interface
      12. Traversing Associations
      13. The JAXP Transformer Class
      14. Sources and Results
      15. Combining SAX and DOM Processing
      16. Namespaces and the DOM
    4. Manipulating XML Information with the DOM
      1. Modifying Documents
      2. Modifying Elements
      3. Modifying Attributes
      4. Managing Children
      5. Seeking a Document Location
      6. The ProcessingInstruction Interface
      7. Creating New Documents
  2. XML Transformations Using Java
    1. Using the JAXP for Transformations
      1. XPath, XSLT and Java
      2. The Transformer Class
      3. The TransformerFactory Class
      4. Sources and Results
      5. Identity Transformations
      6. Creating Transformations from Stylesheets
      7. Template Parameters
      8. Output Methods and Properties
      9. Evaluating XPath Expressions
    2. XPath
      1. Use of XPath in Other XML Technologies
      2. XPath Expressions
      3. The Axis
      4. The Node Test
      5. The Predicate
      6. XPath Types
      7. XPath Functions
      8. Implied Context
      9. Querying with XPath
      10. XPath and the DOM
    3. Templates and Production
      1. Rule-Based Transformations
      2. Templates and Template Matching
      3. Built-In Template Rules
      4. Recursion Through Templates
      5. Template Context
      6. Output Methods
      7. Controlling Whitespace
      8. Literal Replacement Elements
      9. Formalizing Text, Elements and Attributes
      10. Defining Target Vocabulary
      11. Generating Processing Instructions
    4. XSLT: Dynamic Content and Flow Control
      1. Web Applications Using XSLT
      2. J2EE and JAXP
      3. Deriving Source Content
      4. Getting Source Values
      5. Attribute Value Templates
      6. Copying Source Elements and Trees
      7. Looping
      8. Conditionals
  3. The Java API for XML Binding
    1. The Java API for XML Binding
      1. The Need for Data Binding
      2. XML Schema
      3. Two Paths
      4. JAXB Compilation
      5. Mapping Schema Types to Java
      6. Java-to-XML Mapping Using Annotations
      7. Marshaling and Unmarshaling
      8. Working with JAXB Object Models
XML for Java Developers
Training XML for Java Developers

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …