In this Comprehensive ColdFusion 9 Training course, students will spend the first part of the week learning the basics of ColdFusion and the second part of the week learning advanced ColdFusion techniques.
Class goals :
– Learn to get data from a database and display it on the page
– Learn to insert, Edit and Delete records from a database
– Learn to pass data from one page and receive it on another using HTML Forms
– Learn to create Dynamic Form Fields including Dynamic Select Lists
– Learn to build a Search Interface
– Learn to use Session Variables to provide Password Protection
– Learn to call ColdFusion Components (CFCs) and Custom Tags
– Learn to send email with ColdFusion
– Learn to send email with ColdFusion
– Learn sophisticated data management techniques
– Learn to build and use Custom Tags
– Learn to build and use ColdFusion Components (CFCs)
– Learn to handle errors properly
– Learn to work with ColdFusion and XML
In this course, students will learn the skills necessary to configure and administer Citrix XenServer 5.6, Citrix XenCenter, and Citrix Provisioning Services 5.6. Through hands-on labs, students will gain experience configuring a XenServer virtualization server; creating XenServer resource pools and connecting to remote storage; using XenMotion and automatic virtual machine placement; and creating, assigning and administering virtual disks.
Class goals :
Upon successful completion of this course, learners are able to demonstrate the following objectives:
This course provides the foundation to manage, configure and monitor advanced features and components of Citrix NetScaler 9.0 Platinum Edition. Interactive discussion and hands-on labs guide learners through advanced administration tasks such as troubleshooting, configuring application security with the Citrix Application Firewall feature, tuning the NetScaler for high traffic, configuring Authentication Authorization and Accounting for system management, and configuring Advanced Policies using service callouts.
Class goals :
Upon successful completion of this course, learners are able to:
Identify common web attacks and vulnerabilities
Write PERL compatible regular expressions
Configure Citrix Application Firewall 9.0 to protect web applications
Troubleshoot Citrix Application Firewall 9.0
Install and configure Citrix EdgeSight for NetScaler to monitor web application performance
Install, configure, and use Citrix Command Center to manage NetScaler devices
Configure and use additional advanced features of NetScaler 9.0 including NetScaler Web Logging, HTTP Callout, and AAA authentication for web applications
Content of Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Application Attacks (Application Attack Description; Goals of Application Attacks; Most Common Types of Web Application Attacks; The Application Firewall Solution; Business Problems)
The Benefits of Application Firewall (Application Layer Protection; Positive Security Model; Negative Security Model; Deep Stream Inspection; Adaptive Learning Engine; Web Application Vulnerabilities; Security Audits and Application Firewalls)
Payment Card Industry Data Security Standard (Importance of PCI; Common Coding Vulnerabilities; PCI-DSS Report; Packet Processing and Inspection; Request Process; Response Process; Deployment Considerations)
Profiles and Policies (Profiles; Policies)
Profiles and Policies
Profiles (Profile Types; Default Profiles; Creating a Profile in the Configuration Utility; Creating a Profile in the Command-Line Interface; Action Settings; Sessionization and Security Checks; Profile Settings; Error Page; HTML Comment Stripping; XML Error Object; Other Profile Settings)
Policies (Policy Creation; Policy Binding; Policy State; Policy Priorities; Creating a Policy in the Configuration Utility; Creating Policies in the Command-Line Interface; Binding and Prioritizing a Policy in the Configuration Utility; Binding Policies in the Command-Line Interface)
Engine Settings
Regular Expressions
Regular Expressions
Forms of Regular Expressions
Using Regular Expressions
Metacharacters and Literal Characters
Metacharacters
Escapes
Quantifiers
Backreferencing
Lookaheads
Regular Expression Scope
Attacks and Protections
Security Checks (Profile Types; Common Security Checks; HTML Security Checks; XML Security Checks; Request-Side and Response-Side Checks)
HTTPS Web Applications
Buffer Overflow Exploits (Goals of a Buffer Overflow Attack; Consequences of a Buffer Overflow Attack)
Buffer Overflow Protection (Default Maximum Values; Modifying Buffer Overflow Settings)
Deny URL Protection (The Deny URL List; Adding a Deny URL in the Command-Line Interface; Deleting a Deny URL in the Command-Line Interface)
SQL Injection (How SQL Injection Works)
HTML SQL Injection Protection (SQL Keywords and Special Characters; Modifying SQL Injection Action Settings; XML SQL Injection Security Check; Cross-Site Scripting; Attacking the Trust Relationship; How Cross-Site Scripting Attacks Work; Results of a Cross-Site Scripting Attack; Preventing Cross-Site Scripting Attacks; HTML Cross-Site Scripting Protection; Cross-Site Scripting Action Settings; Transform Cross-Site Scripts; Check Complete URLs for Cross-Site Scripting; Additional Action Settings; Relaxations; Modifying Cross-Site Scripting Action Settings; Adding a Cross-Site Scripting Relaxation Using the Command-Line Interface; Deleting a Cross-Site Scripting Relaxation Using the Command-Line Interface; XML Cross-Site Scripting Security Check)
Command Injection (Command Injection Examples)
Field Format Protection (Field Types and Field Formats; Predefined Field Types; Custom Field Types; Field Format Configuration; Default Field Format; Confidential Fields; Adding a Custom Field Type; Setting a Default Field Type; Modifying Field Format Settings; Adding a Confidential Field; Modifying a Confidential Field)
Cookie Tampering and Poisoning (Types of Cookies; How Cookies Are Added; Web Server Sessions)
Cookie Consistency Protection (Sessionization and Cookies; Relaxations; Adding a Cookie Consistency Relaxation in the Command-Line Interface; Deleting a Cookie Relaxation in the Command-Line Interface)
Form/Hidden Field Manipulation (Example of Hidden Field Manipulation)
Form Field Consistency Protection (Field Consistencies; User Sessions; Adding a Form Field Consistency Relaxation Using the Command-Line Interface; Deleting a Form Field Consistency Relaxation Using the Command-Line Interface)
Forceful Browsing (Forceful Browsing Protection)
Start URLs (The Start URL List; Sessionization and Start URLs; Modify Start URL Check; Adding a Start URL in the Command-Line Interface; Deleting a Start URL in the Command-Line Interface)
Backdoors and Misconfigurations
URL Closure (Enforcing URL Closure in the Configuration Utility; Enforcing URL Closure in the Command-Line Interface)
Identity Theft Attacks (Types of Identity Theft Attacks; Application Firewall Protection Against Identity Theft)
HTTP Connection Management and NetScaler HTTP Behavior (Client Keep-Alive; Connection IP Address Control; Maximum Requests and Maximum Connections; Connection Idle Settings; Trackable Connections)
TCP Buffering (Down-State Flush and Access Down Connection Settings; TCP Optimization; Advertised Window Size; Window Scaling; Selective Acknowledgement)
Surge Queue
Surge Protection (Request and Response Rates; Throttle Rate; Disabling Surge Protection in the Configuration Utility; Disabling Surge Protection for a Service in the Configuration Utility; Setting Thresholds in the Configuration Utility)
Priority Queuing (Enabling Priority Queuing in the Configuration Utility; Creating a Priority Queuing Policy in the Configuration Utility; Binding Priority Queuing Policies in the Configuration Utility; Weighted Queuing)
HTTP Denial-of-Service Protection (Enabling HTTP DoS Protection in the Configuration Utility; Adding a HTTP DoS Policy in the Configuration Utility; Challenged JavaScript Responses; Client Detection Tuning and JavaScript Challenge Response Rate; HTTP DoS Protection Deployment Guidelines; Attack Characteristics)
IP Rate Limiting (Rate Control by Subnet Example; IP Rate Limiting Best Practices)
Authentication, Authorization, and Auditing
Users, Groups and Command Policies (Authentication, Authorization, and Auditing; Systems and AAA Users Groups; Local Accounts; External Authentication)
External Authentication for System Users (Authentication Actions and Policies; Configuring Local Authentication; Configuring External Authentication with Explicit Accounts; Configuring External Authentication with Group Extraction; Creating an External Authentication Policy; Creating local groups in the Command-Line Interface; Binding Groups in the Command-Line Interface; Creating an LDAP Authentication Action in the Command-Line Interface; Creating an Authentication Policy in the Command-Line Interface; Binding the Policy in the Command Line Interface; Authentication Troubleshooting; External Authentication Common Issues)
AAA for Traffic Management (Enabling AAA for Traffic Management; AAA for Application Traffic; Basic AAA Setup for Application Traffic; Workflow for AAA Traffic Management)
Configuration (Creating an Authentication Virtual Server; Creating an Authentication Virtual Server in the Command-Line Interface; Binding an SSL Certificate in the Command-Line Interface; Binding a Virtual Server to an Authentication Policy in the Command-Line Interface; Configuring a Virtual Server to use an Authentication Virtual Server in the Command-Line Interface; Configuring Authorization Policies for Traffic Management; Setting the Default Traffic Management Authentication Action to Deny in the Command-Line Interface; Creating an Authorization Policy to Allow Access
Audit Logging (Audit Logging Troubleshooting)
HTTP Service Callouts
HTTP Callouts
Configuring HTTP Callouts (Configuring HTTP Callouts in the Configuration Utility; Configuring HTTP Callouts in the Command-Line Interface; Callout Examples; HTTP Callout Response Parsing)
HTTP Callout Use Cases (Scenario 1: Filter Clients Based on an IP Address Blacklist; Scenario 2: Fetch and Update Content; HTTP Callout Auditing)
EdgeSight for NetScaler Server Components (Component Installation Scenarios)
EdgeSight for NetScaler Installation Considerations (Installing EdgeSight for Netscaler; SQL Server; SQL Reporting Services; EdgeSight for NetScaler Components; Installing EdgeSight Database Components; Installing EdgeSight Report Console and Data Collector Components; EdgeSight Post-Installation Wizard; Upgrading EdgeSight for NetScaler)
Reporting Services Initial Configuration (NetScaler Configuration Overview; Configuring HTML Injection; Editing the prebody.js script; Configuration Example in the Command-Line Interface; Add NetScaler System to EdgeSight for NetScaler Data Collector; Topology Data Collectors with SSL)
EdgeSight Charts and Reports
EdgeSight Troubleshooting (Troubleshooting OS Components; Troubleshooting HTML Injection; Troubleshooting Injection Request; Troubleshooting Unknown Device; Troubleshooting from the NetScaler Command-Line Interface)
Command Center
Command Center Introduction (Command Center NetScaler Features; NetScaler and WANScaler Support)
Command Center Clients (Connecting to Command Center)
Server Requirements (Disk Space Requirements; MySQL Considerations; MicrosoftSQL Server 2005 Considerations)
Port Setting Requirements (Command Center Installation; Linux Considerations; Installation; Capacity Planning; Backup; Installation Modes; Installation Considerations)
Command Center Functionality (Command Center Home Page; Discovery; Fault Management; Configuration Management; Change Management; Centralized Certificate Management; Performance Monitoring)
Command Center Administration (Security Administration; Administration Operations; Administration Configuration; Server Details)
Command Center Troubleshooting (Microsoft SQL Database Issues; Discovery Issues; Performance Data Issues; Linux Command-Line Interface Access Issues; Reporting Issues)
NetScaler Web Logging
NetScaler Web Logging Introduction (Architecture Overview; Communication Process)
NetScaler System Configuration (Enabling Web Logging in the Configuration Utility; Enabling Web Logging in the Command-Line Interface; Configuring the Buffer Size in the Configuration Utility; Configuring the Buffer Size in the Command-Line Interface)
NSWL Client Installation (Logging System Components; Installing the NSWL Client on Windows; NSWL Options; Windows Service Registry Key)
NSWL Client Configuration (NetScaler IP Addresses; Log Filters; Defining Log Properties; Running NSWL; Verifying the Configuration)
Troubleshooting Web Logging (NSWL Troubleshooting; NetScaler Troubleshooting; Buffer Overflow)
Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This CNS-203-1I Basic Administration for Citrix NetScaler 9.2 course (also known as CNS2031I, CNS-2031I, CNS-2031 and CNS2031) covers the initial configuration and administration of Citrix NetScaler 9.2. Learners gain an understanding of NetScaler features such as load balancing, SSL offload, classic and advanced expressions, caching, compression, content switching, and AppExpert templates.
Class goals :
Upon successful completion of this course, learners are able to:
Identify deployment considerations and network placement options
This CAG-200-1I Implementing Citrix Access Gateway 9.0 Enterprise Edition course (also known as CAG2001I, CAG2001, CAG-2001 and CAG-2001I) covers information administrators and other IT professionals need to successfully deploy and manage Access Gateway 9.0 Enterprise Edition and the Access Gateway Plug-ins.
Class goals :
Upon successful completion of this course, learners are able to:
Understand how the Access Gateway Enterprise Edition differs from the Standard and Advanced Editions
Perform the initial configuration of the Access Gateway server
Install Access Gateway Plug-ins for Windows, ActiveX and Java
Configure VPN virtual servers
Create policies to customize VPN behaviour
Customize client experience and login pages
Configure Access Gateway to integrate with XenApp and WANScaler
Create and configure policies and profiles
Content of Implementing Citrix Access Gateway 9.0 Enterprise Edition
Deploying the Citrix Access Gateway
Access Gateway Features
Access Gateway Product Line
Identifying Access Gateway Hardware Platforms
Identifying the Access Gateway Hardware Components
Identifying Network Placement Options
WANScaler Integration
Identifying Deployment Considerations
Performing an Initial Installation and Configuration
Access Gateway Installation
Logging in to the Access Gateway
Setting the Password
Managing Licensing
Enabling Access Gateway Features
Initial Configuration
Understanding Virtual Local Area Networks
Running the Access Gateway Wizard
Saving the Configuration
Performing Basic Administration
Access Gateway Administrative Tools
Introducing the Configuration Utility
Introducing the Command-Line Interface
Introducing FreeBSD
Using Third-Party Tools
Access Gateway Management
Performing an Upgrade
Managing Role-Based Administration
Configuring Policies
Policy Structure
Policy Types and Their Uses
Policy Expressions
Identifying Qualifiers
Identifying Operators
Identifying Operands, Wildcards and Context-Sensitive Fields
Policy Priority
Policy Manager
Using Policy Manager
Creating Policy Expressions
Configuring Access Policies
Endpoint Analysis
Configuring Pre-Authentication Policies
Authentication Policies
Configuring Authentication Policies
Authorization Policies
Configuring Authorization Policies
Session Policies
Configuring Credential Passing
Timeout Settings
Configuring Timeout Settings
Client Cleanup
Configuring Client Cleanup
Split Tunneling
Configuring Split Tunneling
Providing User Access
Plugin Options and Configuration
Displaying Client Options and the Configuration Window
Connection Methods
Deploying Access Gateway Plugins
Configuring Clientless Access
Client Software Selection
Configuring Access Choices
Customizing the User Experience
Intranet Applications
Configuring Intranet Applications
Intranet IP Addresses.
Configuring Intranet IP Addresses
Traffic Policies
Configuring Traffic Policies
TCP Compression Policies
Configuring TCP Compression Policies
Login Page Customization
Securing XenApp Connections
XenApp Overview
ICA Proxy Mode
Configuring ICA Proxy Mode
Binding the Secure Ticket Authority
Configuring Web Interface Failover
Web Interface Connections through Access Gateway
Configuring Web Interface for Access Gateway Connections
File Type Association
Configuring File Type Association
SmartAccess
Configuring SmartAccess
Configuring XenApp for SmartAccess
Configuring Access Scenario Fallback
Auditing and Logging
Syslog and Nslog Auditing
Configuring Audit Servers
Configuring Global Auditing Parameters
Configuring Auditing Policies
Binding Auditing Policies
Viewing Recent Audit Messages
Viewing Historical Audit Messages
Access Gateway Log Management
Monitoring Tool
User Connection Management
Historical Reporting
Configuring High Availability
Introduction to High Availability
High Availability Node Configuration
Configuring Nodes
Verifying High Availability Status
Performing Synchronization
Performing a Forced Failover
High Availability Management
Training Implementing Citrix Access Gateway 9.0 Enterprise Edition
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This CTX1259CI course (also known as: CTX-1259, CTX1259, CTX-1259CI) provides the foundation necessary to effectively deploy and administer Citrix XenApp 5 for Windows Server 2003 and its components, including Web Interface, Application Streaming, Load Manager, Installation Manager and Secure Gateway.
Class goals :
Upon successful completion of this Citrix course, learners are able to perform the following:
Install XenApp in a Windows Server 2003 environment
Install and distribute Citrix XenApp Plugins
Create and customize Web Interface sites
Publish applications, server desktops and content
Configure XenApp Web and XenApp Services sites
Configure, apply and prioritize policies in a XenApp environment
Create and assign load evaluators
Configure printers and printer policies and manage print drivers and printer bandwidth
Create and configure XenApp administrator accounts and their permissions
Configure HDX settings
Configure SecureICA encryption, SSL Relay and Secure Gateway
Install and distribute applications, service packs and hotfixes
Content of Citrix XenApp 5 for Windows Server 2003: Administration
This Tomcat 6.0 Administration for Windows class covers the important topics of administering the Tomcat 6.0 server including installation, directory structure, configuration using server.xml, web application deployment, the manager tool, JNDI data sources, logging, and monitoring and management of the server. Note: Where applicable, differences or changes in Version 7.0 will be addressed.
Class goals :
– Learn about the history of Tomcat.
– Learn how to install Tomcat
– Learn about the directory structure and batch files.
– Learn how to configure Tomcat.
– Learn how to work with Web applications.
– Learn to work with the Tomcat Manager including how to assign security roles.
– Learn to work with JNDI data sources and JDBC
– Learn about security and permissions.
– Learn how to generate a keystore file.
– Learn logging techniques.
– Learn how to monitor Tomcat’s performance.
– Learn about clustering including directory setup.
Content of Training Tomcat 6.0 Admin for Windows
Tomcat Introduction
History of Tomcat
Version Number and Features
Tomcat Components
Catalina
Jasper
Coyote
JEE Overview
MVC Design Pattern
Servlets/JSP
Directory Structure
JNDI
Installing Tomcat
Download
Installation
Environment Variables
Starting the Server
Verifying Server Operation
Stopping the Server
Tomcat Directory Structure
Batch files in /bin
.exe files
/conf
server.xml
context.xml
web.xml
/logs
/webapps
/lib
/work
/temp
Configuring Tomcat
Role of serverxml
Instance Layout
Server
Service
Virtual Host
Context
serverxml elements
<Server>
<Service>
<Connector>
<Engine>
<Host>
<Context>
<Realm>
<Valve>
Deploying Web Applications
JEE Specification for Web Applications
Servlets and JSP
Model View Controller (MVC) Design Pattern
Directory Structure
web.xml
Document Base
Context and the Document Base
Default Context Descriptor
Placing the Web Application Folders and Files under the Application Base
Deploying a WAR file
AutoDeploy
The Tomcat Manager
/manager Web Application
Managing Web Applications
Deploying
Listing Deployed Applications
Reload Existing Applications
Starting/Stopping
Undeploying
Listing Server Status
Listing Security Roles in the User Database
JNDI Data Sources and JDBC
JNDI
JDBC
Drivers
Data Sources in JDBC 20 and Later
Connection Pooling
Commons Database Connection Pooling
Installation
Guarding against Application Program Failure
Configuration
Data Source Definition
Web Application contextxml
contextxml in /conf
GlobalNamingResources in serverxml
Troubleshooting
Security
Web Application Security
Java SecurityManager
Overview
Standard Permissions
Tomcat Permissions
Starting Tomcat with a Security Manager Using the Default Policy File
Secure Socket Layer (SSL)
Generating a keystore File
Modifications to serverxml for SSL Support in Tomcat
tomcat-usersxml
Logging
Logging Overview
Web Application Logging Techniques
javautillogging
javaxservletServletContext
log4j
Monitoring and Performance Tuning Tomcat
Tomcat
JVM
JMX (Java Management Extensions)
JMX MBeans in Tomcat
Engine
JKMain
String Cache
Server
Users
Configuring Tomcat to use MBeans
Accessing MBeans
jconsole
jVisualVM
PSI Probe
Clustering
Using Clustering for Replication and Load Balancing
Running Multiple Instances of Tomcat
Directory Setup
Port Number Modifications
All to All with DeltaManager
Backup to One Cluster with BackupManager
Enabling Session Replication
Session Persistence Using Shared File System
Session Persistence Using Shared Database
Session Persistence using Shared Database: Database Table
In-memory Replication Using SimpleTcpCluster
Load Balancing Using mod_jk Connector to Apache2x Web Server
Training Tomcat 6.0 Admin for Windows
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Service-Oriented Architectures (SOA) package business processes as services, enabling organizations to become more agile by integrating internal and external systems, regardless of their platform.
Class goals :
Design modern Service-Oriented Architectures (SOA)
Evaluate and analyze your organization to map it as a « set of services »
Develop logical service model designs using the Service-Oriented Modeling Framework (SOMF)
Convert logical designs into service contracts that can be implemented in any development environment
Select the right service technology to support each of the four service-oriented business scenarios
Orchestrate services to implement interoperable solutions
Content of Service-Oriented Architecture (SOA): A Comprehensive Hands-On Introduction
Overview of SOA
Integrating business processes with SOA
Deriving services from the organization’s goals and purpose
Merging SOA design and project management processes
Architecting Services
Service-Oriented design process
Progressing from conceptual services to buildable services
Structuring business requirements into SOA
Aligning services with the organization
Following an architectural road map
Working forward to deliver applications
Recycling backwards to support change
Mapping Services to Your Organization
Discovering conceptual services
Defining the service domain
Drilling down into atomic services
Consolidating into composite services
Refining the conceptual design
Identifying the underlying resource for the service
Leveraging legacy assets for inclusion in the SOA
Selecting cross-boundary services
Modeling Services
Developing logical services
Integrating consumers
Exploiting the four composition styles
Hierarchies
Star
Network
Circular
Achieving effective designs
Supporting loose coupling
Handling sequential processing
Establishing relationships between consumers and services
Addressing the business needs
Designing for reuse and integration
Aligning services with the organization to improve responsibility
Factoring in brokers
Identifying « services for services »
Leveraging the seven categories of brokers
Transform
Filter
Gateway
Monitor
Enricher
Locator
Router
Aggregator
Converting Designs to Specifications
Specifying operations
Deriving operations from use cases
Identifying design flaws early to take corrective action
Communicating the specification
Building on the three principles of contract design
Expressing the service as a contract
Messaging for interoperability
Evolving messages from the SOA design
Formatting the operation’s messages
Finalizing the service design
Specifying operations and endpoints
Binding messages to operations
Transitioning from Design to Implementation
Supporting implementation
Enabling parallel development with contract-first design
Optimizing infrastructure for SOA scenarios
Interoperability
Internal backbone
Ajax
Implementing components of the SOA
Building services
Creating services from the SOA modeling process
Developing service consumers
Orchestrating services
Assembling services to deliver new functionality
Dealing with long running processes
Avoiding Common Problems
Applying « Lessons Learned » to improve designs
Facilitating asynchronous services
Dealing with change and growth
Ensuring performance
« Chatty » vs. « Chunky » messages
Avoiding the failures of applying object-oriented design to services
Managing the SOA Environment
Instituting governance at run time and design time
Advancing up the Services Integration Maturity Model
Leveraging Enterprise Services Buses (ESB)
Integrating key tools in managing your SOA environment
Training Service-Oriented Architecture (SOA): A Comprehensive Hands-On Introduction
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Virtual machines allow a computer to run multiple operating systems simultaneously, letting you partition servers to isolate applications, improve portability and migration, or create entire testing labs within a single PC.
Class goals :
Employ VMware and Microsoft virtual machine (VM) technologies
Combine Windows and Linux workstations and servers on a single platform
Leverage VMs to build testing, support and training environments
Partition physical servers to decrease operating costs
Migrate from physical to virtual machines
Manage VMs on VMware ESX and Microsoft Hyper-V
Content of Virtualization Technologies: A Comprehensive Hands-On Introduction
Virtualization Concepts
Overview of virtual machines
Defining virtual machines (servers and workstations)
Advantages of deploying VMs
Virtual machine products
VMware Workstation
Server
ESX
Microsoft Virtual PC
Hyper-V
Other alternatives
Creating Virtual Machines
Comparing workstation products
Functionality
Performance
Contrasting Windows and Linux hosts
Abstracting hardware
Partitioning shared resources
Accessing raw and virtual disks
Virtualizing CPU and memory resources
Deploying virtual workstation software
Planning for automatic installations
Designing virtual networks
Bridged, NAT and host-only networking
Controlling guest OS access
Building guest operating systems
Allocating host resources
Configuring virtual hard drives
Enhancing VMs using virtualization tools
Managing peripheral devices
Mapping to floppy and CD images
Exploiting Virtual Workstation Functionality
Creating support platforms
Readying multiple operating systems
Managing display modes
Suspending and resuming virtual workstations
Expanding application support
Extending legacy application life
Widening platform options
Resolving version conflicts
Constructing a test environment
Accessing host files
Taking and restoring snapshots
Developing training environments
Protecting guest operating systems
Exploiting nonpersistent disks
Partitioning Servers
Establishing requirements
Justifying server virtualization
Partitioning via hardware and software
Recognizing server functionality needs
Choosing virtual server hosts
Evaluating performance and features
Considering security implications
Executing Server VMs
Working in interactive mode
Implementing headless operation
Managing virtual servers remotely
Exploiting remote management consoles
Connecting to the Web interfaces
Securing remote management
Deploying virtual servers
Automating tasks via scripting
Migrating physical to virtual servers
Optimizing performance
Accessing Storage Area Networks (SANs)
Clustering virtual machines
Distributing workloads via network load balancing (NLB)
Establishing fault tolerance by utilizing clustering services
Data Center Virtualization with ESX
Building the architecture
Examining ESX architecture
Planning and configuration
Leveraging ESX features
Networking with vSwitches and port groups
Optimizing resource utilization
Managing Microsoft Hyper-V
Maintaining virtual machines
Contrasting Hyper-V and ESX architecture
Implementing remote management tools
Securing virtual machine deployments
Implementing permissions
Reducing attack surface with Server Core
Training Virtualization Technologies: A Comprehensive Hands-On Introduction
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This four-day course builds skills in Java’s XML processing APIs. The course is intended for students with a working knowledge of XML — and possibly DTDs or XML Schema — who want to build XML applications or components using the Java language. Everything in the course adheres to W3C and Java standards for completely portable code.
Class goals :
– Understand the use of SAX and DOM APIs for XML parsing.
– Understand the need for JAXP as an additional layer to the standard contract between applications and parsers.
– Parse element and attribute content, processing instructions, and other document information using SAX.
– Parse documents using the DOM.
– Modify, create and delete information in an XML document using the DOM.
– Write simple and complex queries into XML document content using XPath.
– Use XSLT for XML-to-XML, XML-to-HTML, or XML-to-text transformations.
– Build standalone and web applications that build on XSLT transformation logic.
– Use JAXB to generate persistent Java object models based on XML Schema.
– Implement XML persistence using the JAXB.
Content of Training XML for Java Developers
XML Parsing Using Java
The Java API for XML Processing (JAXP)
Parsing XML
SAX and DOM
What the W3C Says
What the W3C Doesn’t Say
Sun and Apache
JAXP
Parser Factories
Pluggable Parsers
Parser Features and Properties
The Simple API for XML (SAX)
Origins of SAX
The SAX Parser
The SAX Event Model
Reading Document Content
Handling Namespaces
SAX Features for Namespaces
Parsing Attributes
Error Handling
DTD Validation
Schema Validation
Handling Processing Instructions
The Document Object Model (DOM)
Origins of the DOM
DOM Levels
DOM2 Structure
The Document Builder
DOM Tree Model
DOM Interfaces
Document, Node and NodeList Interfaces
Element and Text Interfaces
Finding Elements By Name
Walking the Child List
The Attribute Interface
Traversing Associations
The JAXP Transformer Class
Sources and Results
Combining SAX and DOM Processing
Namespaces and the DOM
Manipulating XML Information with the DOM
Modifying Documents
Modifying Elements
Modifying Attributes
Managing Children
Seeking a Document Location
The ProcessingInstruction Interface
Creating New Documents
XML Transformations Using Java
Using the JAXP for Transformations
XPath, XSLT and Java
The Transformer Class
The TransformerFactory Class
Sources and Results
Identity Transformations
Creating Transformations from Stylesheets
Template Parameters
Output Methods and Properties
Evaluating XPath Expressions
XPath
Use of XPath in Other XML Technologies
XPath Expressions
The Axis
The Node Test
The Predicate
XPath Types
XPath Functions
Implied Context
Querying with XPath
XPath and the DOM
Templates and Production
Rule-Based Transformations
Templates and Template Matching
Built-In Template Rules
Recursion Through Templates
Template Context
Output Methods
Controlling Whitespace
Literal Replacement Elements
Formalizing Text, Elements and Attributes
Defining Target Vocabulary
Generating Processing Instructions
XSLT: Dynamic Content and Flow Control
Web Applications Using XSLT
J2EE and JAXP
Deriving Source Content
Getting Source Values
Attribute Value Templates
Copying Source Elements and Trees
Looping
Conditionals
The Java API for XML Binding
The Java API for XML Binding
The Need for Data Binding
XML Schema
Two Paths
JAXB Compilation
Mapping Schema Types to Java
Java-to-XML Mapping Using Annotations
Marshaling and Unmarshaling
Working with JAXB Object Models
Training XML for Java Developers
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …