Tag Archives: advanced

Training JAVA FUNDAMENTALS FOR NON C PROGRAMMERS – 5 days

Class overview :

This course is paced to provide a solid foundation in Java for programmers without syntax experience in a C-based language. Intensive and hands-on, the course emphasizes becoming productive quickly as a Java 5.0 programmer.

Class goals :

Learning the basic structure and syntax of the language, students will also learn object-oriented principles and how they are applied in Java applications. The course then covers several of the provided API packages, such as I/O streams, collections, Swing GUI programming, and accessing a database with JDBC. Appendices on threading and J2EE are also available for further study.

Content of JAVA FUNDAMENTALS FOR NON C PROGRAMMERS

Learning the basic structure and syntax of the language, students will also learn object-oriented principles and how they are applied in Java applications. The course then covers several of the provided API packages, such as I/O streams, collections, Swing GUI programming, and accessing a database with JDBC. Appendices on threading and J2EE are also available for further study.

JAVA FUNDAMENTALS FOR NON C PROGRAMMERS
Training JAVA FUNDAMENTALS FOR NON C PROGRAMMERS

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

This course is paced to provide a solid foundation in Java for programmers without syntax experience in a C-based language. Intensive and hands-on, the course emphasizes becoming productive quickly as a Java 5.0 programmer.

Training JAVA 2 Programming Language – 5 days

Class overview :

Java 2: Programming Language introduces the foundations of Java 2 Standard Edition (J2SE) technology. Students will explore concepts and perform hands-on exercises to apply what they learn. Java is the language of choice for the Internet. Java enhances productivity by allowing the inheritance of methods and properties from the well-organized Java Class Library. Students will build Graphical User Interfaces and handle various events. Students will explore multi-threading and how it can improve the performance of applications. Students will also use many methods of the Graphics class to draw shapes.

Class goals :

  • An Introduction to Java
  • Datatypes, Variables, and Methods
  • Object Orientation, Part 1
  • Construction Time
  • Object-Orientation, Part 2
  • Java Language-Statements and Expressions
  • Branching and Looping
  • The Java Class Library
  • Exploring java.lang

Content of JAVA 2 Programming Language

Class objectives help students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:

  • List the benefits and roles of the Java programming language.
  • Utilize primitive datatypes, variables, constants, literals, and methods.
  • Implement classes and properties, and understand abstraction and encapsulation.
  • Differentiate between an application and an applet, and pass parameters to both.
  • Use inheritance, interfaces, packages, modifiers, as well as archive files.
  • Use operators and expressions to perform calculations and typecasting.
  • Control the flow of programs with branching and looping.
  • Explore the packages and interfaces in the Java Class Library.
  • Explore the java.lang package and use methods from the String and Math classes.
  • Change fonts and colors in the display; use Graphics and Image classes to draw to the display.
  • Handle key and mouse events.
  • Explore the applet architecture, detect and process errors, and explore threads.
  •  Explore the AWT package and build a GUI interface.
JAVA 2 Programming Language
Training JAVA 2 Programming Language

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Java 2: Programming Language introduces the foundations of Java 2 Standard Edition (J2SE) technology. Students will explore concepts and perform hands-on exercises to apply what they learn. Java is the language of choice for the Internet. Java enhances productivity by allowing the inheritance of methods and properties from the well-organized Java Class Library. Students will build Graphical User Interfaces and handle various events. Students will explore multi-threading and how it can improve the performance of applications. Students will also use many methods of the Graphics class to draw shapes.

Training Java 2 Enterprise Development With BEA WebLogic – 5 days

Class overview :

This course provides you with the background and skills required to design and develop enterprise applications in Java using J2EE technologies. You will use WebLogic server as the application and web server and will learn about configuring WebLogic, deploying applications, and monitoring applications using WebLogic’s monitoring tools. During the course you will write many components of a sample e-commerce application and deploy the application to WebLogic.

Class goals :

  • Java 2, Enterprise Edition (J2EE)
  • Overview of BEA WebLogic
  • Building, Deploying, and Testing Enterprise Applications
  • Building a Sample Application
  • Container-managed Persistence (CMP) Entity Beans
  • Bean-managed Persistence (BMP) Entity Beans
  • Stateless Session Beans
  • Stateful Session Beans
  • Message-Driven Beans
  • The View
  • The Controller
  • Advanced WebLogic Server Concepts

Content of Java 2 Enterprise Development With BEA WebLogic

  • Develop with RMI, JNDI, JMS, and JDBC.
  • Use container-managed and bean-managed transactions.
  • Write JSPs and servlets.
  • Write Entity Enterprise JavaBeans (EJBs) using container-managed or bean-managed persistence.
  • Write Stateless and Stateful Session EJBs.
  • Write Message-Driven EJBs.
  • Unit test your J2EE applications.
  • Build your J2EE applications using Ant.
  • Implement the Model-View-Controller design pattern.
  • Use the Value Object design pattern.
  • Use the DAO design pattern.
  • Configure and monitor WebLogic 6.1.
  • Load test EJBs in WebLogic 6.1.
Java 2 Enterprise Development With BEA WebLogic
Training Java 2 Enterprise Development With BEA WebLogic

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

This course provides you with the background and skills required to design and develop enterprise applications in Java using J2EE technologies. You will use WebLogic server as the application and web server and will learn about configuring WebLogic, deploying applications, and monitoring applications using WebLogic’s monitoring tools. During the course you will write many components of a sample e-commerce application and deploy the application to WebLogic.

Training J2 Using IBM VisualAge To Create Java Applications – 5 days

Class overview :

Java 2: Using IBM VisualAge to Create Java Applications introduces the major elements of the VisualAge Java programming environment.

Class goals :

Build Your First Applet and Applications Using VisualAge

Using the Basic VisualAge SmartGuides

The VisualAge Environment

The Visual Composition Editor

Creating Connections Between Java Beans

Reusable Form Fragments

Creating “Invisible” Beans from Scratch

Content of J2 Using IBM VisualAge To Create Java Applications

Upon successful completion of this course, students will be able to:

  • Create applications and applets in VisualAge.
  • Use many of the VisualAge SmartGuides.
  • Navigate through the features of the VisualAge environment, and be ableto use the debugger.
  • Use the Visual Composition Editor to create GUI-rich visual applications.
  • Use Connections in the Visual Composition Editor to specify eventhandling and property-to-property connections.
  • Create reusable, “visible” form-fragment beans.
  • Create new “invisible” beans that have events and properties.
  • Use advanced Swing techniques in VisualAge, including using TabbedPanes and ScrollPanes, and specifying the data model of various beans,such as JLists.
  • Understand and modify the code that the VisualAge Visual CompositionEditor generates.
  • Access databases using the Java JDBC libraries.
  • Access databases using specialized database beans, such as the Select and DBNavigator beans in the Visual Composition Editor.
  • Create custom database-aware TableModels beans for use with Swing JTables.
J2 Using IBM VisualAge To Create Java Applications
Training J2 Using IBM VisualAge To Create Java Applications

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Java 2: Using IBM VisualAge to Create Java Applications introduces the major elements of the VisualAge Java programming environment.

Training J 2Object Oriented Analysis And Design Using UML – 5 days

Class overview :

Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process

Class goals :

  • Know the Purpose and Parts of the UML
  • Drive the Development of a System Using Use Cases
  • Describe How Objects Interact Using a Sequence Diagram
  • Create Class and Object Diagrams
  • Interface-based Design
  • Layer your System into Packages
  • Model Dynamic Behavior using Collaboration,

Statechart, and Activity Diagrams

  • Using Component and Deployment Diagrams
  • Manage and Schedule the Software Development Process

Content of J 2Object Oriented Analysis And Design Using UML

Students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:

  • Know the purpose and parts of UML.
  • Drive the development of a system based on Use Cases.
  • Use the CRC method to identify classes.
  • Describe how objects interact using a Sequence Diagram.
  • Create Class and Object Diagrams.
  • Use Interface-based Design.
  • Layer your system into packages.
  • Model Dynamic Behavior using Collaboration,

Statechart, and Activity Diagrams.

  • Use Component and Deployment Diagrams.
  • Manage and Schedule the Software Development Process.
J 2Object Oriented Analysis And Design Using UML
Training J 2Object Oriented Analysis And Design Using UML

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process

Training ADVANCED JAVA PROGRAMMING – 5 days

Class overview :

Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.

Class goals :

Java programmers who wish to increase their depth of knowledge in Java programming and explore the uses of the various advanced packages.

Content of ADVANCED JAVA PROGRAMMING

Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.

ADVANCED JAVA PROGRAMMING
Training ADVANCED JAVA PROGRAMMING

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.

Training Introduction To Objective C For IOS Development Iphone Ipad – 1 day

Class overview :

Objective-C is the language for developing iPhone and iPad applications. This class teaches the fundamentals of the programming language. It includes an introduction to XCode, the software development tool for Objective-C; c++ underlying concepts; program control flow and functions; object-oriented programming concepts and practice, including object handling within Objective-C; memory management in Objective-C; and an in-depth review of the Foundation classes.

Class goals :

  • Learn how to use XCode for developing Objective-C programs.
  • Learn how to manage variables and build your own functions in Objective-C.
  • Learn the fundamental concepts of object oriented programming, and how to create and use objects in Objective-C.
  • Understand the memory management model for Objective-C, and options for the developer.
  • Learn about the Foundation classes for data manipulation, and their use in Objective-C programming.

Content of Introduction To Objective C For IOS Development Iphone Ipad

Upon class completion students will gain a strong foundation and understanding for the Objective C language.  Students can then take the next step towards learning XCode which will help in developing Mobile Apps for iPhone.

Introduction To Objective C For IOS Development Iphone Ipad
Training Introduction To Objective C For IOS Development Iphone Ipad

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Objective-C is the language for developing iPhone and iPad applications. This class teaches the fundamentals of the programming language. It includes an introduction to XCode, the software development tool for Objective-C; c++ underlying concepts; program control flow and functions; object-oriented programming concepts and practice, including object handling within Objective-C; memory management in Objective-C; and an in-depth review of the Foundation classes.

Training Citrix XenApp 6.5 Advanced Administration – 5 days

Class overview :

This course provides learners with the skills necessary to monitor, maintain, optimize and troubleshoot Citrix XenApp 6.5 environments running on Windows Server 2008 R2 software. Learners are introduced to the tools used to monitor the XenApp farm, record farm activity and generate reports.

Class goals :

On completion of this course, students will have learnt about:

  • Troubleshooting the XenApp environment
  • Scaling the XenApp environment
  • Creating farm redundancy
  • Maintaining the XenApp environment
  • Optimizing the XenApp environment
  • Optimizing printing
  • Monitoring XenApp with standard utilities
  • Monitoring XenApp with EdgeSight
  • Securing XenApp

Content of Citrix XenApp 6.5 Advanced Administration

Module 1: Troubleshooting the XenApp Environment

  • Troubleshooting Methodology
  • Logon Issues
  • User Sessions
  • Server Resources
  • Exercise 1-1: Troubleshooting an AppCenter Issue
  • Exercise 1-2: Troubleshooting Web Interface and XML Issues
  • Exercise 1-3: Troubleshooting Launching a Hosted Application
  • Exercise 1-4: Troubleshooting Streaming Applications

Module 2: Scaling the XenApp Environment

  • Farm Configuration Recommendations
  • Farm Scalability
  • Scripted Installation
  • Server Build Scripting
  • XenApp Server Templates
  • Data Store Database Migration
  • Dedicated Data Collector
  • Web Interface Planning
  • Delivery Services
  • XenApp and XenDesktop Integration
  • XenApp and Provisioning Services Integration
  • XenApp and Merchandising Server Integration
  • Exercise 2-1: Preparing to Clone a XenApp Server
  • Exercise 2-2: Cloning a XenApp Server
  • Exercise 2-3: Preparing a XenApp Server for Scripted Configuration
  • Exercise 2-4: Performing a Scripted Configuration

Module 3: Creating Farm Redundancy

  • Eliminating Single Points of Failure
  • Disaster Recovery
  • Load Balancing
  • XenApp and NetScaler Integration
  • Exercise 3-1: Load Balancing Web Interface and XML Services Using Citrix NetScaler
  • Exercise 3-2: Testing Load Balancing through Citrix NetScaler
  • Exercise: 3-3: Installing and Configuring Web Interface on Citrix NetScaler

Module 4: Maintaining the XenApp Environment

  • Farm Setting Migration
  • Data Store Database Maintenance
  • Data Store Database Recovery
  • Local Host Cache
  • XML Service Overview
  • Routine Operations
  • Power and Capacity Management
  • Exercise 4-1: Updating the Mozilla Firefox Streaming Profile
  • Exercise 4-2: Performing Data Store Maintenance Commands
  • Exercise 4-3: Configuring Power and Capacity Management
  • Exercise 4-4: Creating a Restart Schedule for the XenApp Servers

Module 5: Optimizing the XenApp Environment

  • Performance Tuning
  • Windows Server Tuning for XenApp
  • XenApp Tuning
  • Virtual Memory Optimization
  • CPU Optimization
  • Virtual Machine Sizing
  • Multi-Streaming
  • Accelerating ICA Traffic with Branch Repeater
  • QoS through Branch Repeater
  • Exercise 5-1: Enabling Multi-Stream ICA Policies for Specific ICA Traffic
  • Exercise 5-2: Enabling CPU and Memory Optimization

Module 6: Optimizing the User Environment

  • Access methods
  • Application Compatibility
  • Application Streaming
  • General Guidelines For Improving Application Performance
  • User Profiles
  • Session Pre-Launch
  • User Connection Configuration
  • Exercise 6-1: Configuring Profile Management
  • Exercise 6-2: Profiling an Application Requiring A Service
  • Exercise 6-3: Configuring Session Pre-Launch

Module 7: Optimizing Printing

  • Printing Architecture Review
  • Managing Printers
  • Citrix Universal Printer
  • Printing Performance Policies
  • Non-Native Printer Drivers
  • Printer Driver Isolation
  • Printing Tools
  • Troubleshooting Printing
  • Exercise 7-1: Verifying Printer Driver Compatibility with XenApp
  • Exercise 7-2: Replicating Print Drivers Using PowerShell
  • Exercise 7-3: Troubleshooting a Printer Issue with the Citrix Group Policy Modeling Wizard

Module 8: Securing XenApp

  • Setting Rights and Permissions
  • XenVault
  • SSL Certificates
  • XenApp Security with Access Gateway
  • Exercise 8-1: Creating and Distributing a Root CA Certificate
  • Exercise 8-2: Encrypting External ICA Traffic Using ICA Proxy
  • Exercise 8-3: Restricting External Application Access
  • Exercise 8-4: Encrypting XML Traffic With SSL Relay

Module 9: Monitoring XenApp with Standard Utilities

  • XenApp Monitoring
  • XenApp Utilities
  • Citrix Utilities
  • Third-party tools
  • Execise 9-1: Using Desktop Director to View Session Data
  • Exercise 9-2: Monitoring XenApp using Performance Monitor
  • Exercise 9-3: Monitoring XenApp Using Command Line Utilities

Module 10: Monitoring XenApp with EdgeSight

  • EdgeSight Components
  • Real-Time Information
  • Reports
  • Alerts
  • Active Application Monitoring
  • Exercise 10-1: Viewing EdgeSight Historical Data
  • Exercise 10-2: Viewing EdgeSight Real-Time Data
Citrix XenApp 6.5 Advanced Administration
Training Citrix XenApp 6.5 Advanced Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition – 5 days

Class overview :

This course provides the foundation to manage, configure and monitor advanced features and components of Citrix NetScaler 9.0 Platinum Edition. Interactive discussion and hands-on labs guide learners through advanced administration tasks such as troubleshooting, configuring application security with the Citrix Application Firewall feature, tuning the NetScaler for high traffic, configuring Authentication Authorization and Accounting for system management, and configuring Advanced Policies using service callouts.

Class goals :

Upon successful completion of this course, learners are able to:

  • Identify common web attacks and vulnerabilities
  • Write PERL compatible regular expressions
  • Configure Citrix Application Firewall 9.0 to protect web applications
  • Troubleshoot Citrix Application Firewall 9.0
  • Install and configure Citrix EdgeSight for NetScaler to monitor web application performance
  • Install, configure, and use Citrix Command Center to manage NetScaler devices
  • Configure and use additional advanced features of NetScaler 9.0 including NetScaler Web Logging, HTTP Callout, and AAA authentication for web applications

Content of Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Troubleshooting

  • Troubleshooting Resources (Citrix Knowledge Center; Citrix Product Documentation; Citrix Technical Support; Collected NetScaler Data; Troubleshooting Log)
  • NetScaler System Overview (NetScaler Processes)
  • nCore Configuration Architecture
  • Built-In Tools (Nsconmsg; Network Traffic Capture; show and stat Commands; Reporting Tool; Shell Tools; Command-Line Interface Tools; Configuration Utility Tools)
  • Third-Party Tools (Network Protocol Analyzers; Web Browser Plug-ins; SNMP Browsers; FTP Clients)

Introducing Application Firewall

  • Application Attacks (Application Attack Description; Goals of Application Attacks; Most Common Types of Web Application Attacks; The Application Firewall Solution; Business Problems)
  • The Benefits of Application Firewall (Application Layer Protection; Positive Security Model; Negative Security Model; Deep Stream Inspection; Adaptive Learning Engine; Web Application Vulnerabilities; Security Audits and Application Firewalls)
  • Payment Card Industry Data Security Standard (Importance of PCI; Common Coding Vulnerabilities; PCI-DSS Report; Packet Processing and Inspection; Request Process; Response Process; Deployment Considerations)
  • Profiles and Policies (Profiles; Policies)

Profiles and Policies

  • Profiles (Profile Types; Default Profiles; Creating a Profile in the Configuration Utility; Creating a Profile in the Command-Line Interface; Action Settings; Sessionization and Security Checks; Profile Settings; Error Page; HTML Comment Stripping; XML Error Object; Other Profile Settings)
  • Policies (Policy Creation; Policy Binding; Policy State; Policy Priorities; Creating a Policy in the Configuration Utility; Creating Policies in the Command-Line Interface; Binding and Prioritizing a Policy in the Configuration Utility; Binding Policies in the Command-Line Interface)
  • Engine Settings

Regular Expressions

  • Regular Expressions
  • Forms of Regular Expressions
  • Using Regular Expressions
  • Metacharacters and Literal Characters
  • Metacharacters
  • Escapes
  • Quantifiers
  • Backreferencing
  • Lookaheads
  • Regular Expression Scope

Attacks and Protections

  • Security Checks (Profile Types; Common Security Checks; HTML Security Checks; XML Security Checks; Request-Side and Response-Side Checks)
  • HTTPS Web Applications
  • Buffer Overflow Exploits (Goals of a Buffer Overflow Attack; Consequences of a Buffer Overflow Attack)
  • Buffer Overflow Protection (Default Maximum Values; Modifying Buffer Overflow Settings)
  • Parameter Manipulation (Parameter Manipulation Example)
  • Server Misconfiguration
  • Deny URL Protection (The Deny URL List; Adding a Deny URL in the Command-Line Interface; Deleting a Deny URL in the Command-Line Interface)
  • SQL Injection (How SQL Injection Works)
  • HTML SQL Injection Protection (SQL Keywords and Special Characters; Modifying SQL Injection Action Settings; XML SQL Injection Security Check; Cross-Site Scripting; Attacking the Trust Relationship; How Cross-Site Scripting Attacks Work; Results of a Cross-Site Scripting Attack; Preventing Cross-Site Scripting Attacks; HTML Cross-Site Scripting Protection; Cross-Site Scripting Action Settings; Transform Cross-Site Scripts; Check Complete URLs for Cross-Site Scripting; Additional Action Settings; Relaxations; Modifying Cross-Site Scripting Action Settings; Adding a Cross-Site Scripting Relaxation Using the Command-Line Interface; Deleting a Cross-Site Scripting Relaxation Using the Command-Line Interface; XML Cross-Site Scripting Security Check)
  • Command Injection (Command Injection Examples)
  • Field Format Protection (Field Types and Field Formats; Predefined Field Types; Custom Field Types; Field Format Configuration; Default Field Format; Confidential Fields; Adding a Custom Field Type; Setting a Default Field Type; Modifying Field Format Settings; Adding a Confidential Field; Modifying a Confidential Field)
  • Cookie Tampering and Poisoning (Types of Cookies; How Cookies Are Added; Web Server Sessions)
  • Cookie Consistency Protection (Sessionization and Cookies; Relaxations; Adding a Cookie Consistency Relaxation in the Command-Line Interface; Deleting a Cookie Relaxation in the Command-Line Interface)
  • Form/Hidden Field Manipulation (Example of Hidden Field Manipulation)
  • Form Field Consistency Protection (Field Consistencies; User Sessions; Adding a Form Field Consistency Relaxation Using the Command-Line Interface; Deleting a Form Field Consistency Relaxation Using the Command-Line Interface)
  • Forceful Browsing (Forceful Browsing Protection)
  • Start URLs (The Start URL List; Sessionization and Start URLs; Modify Start URL Check; Adding a Start URL in the Command-Line Interface; Deleting a Start URL in the Command-Line Interface)
  • Backdoors and Misconfigurations
  • URL Closure (Enforcing URL Closure in the Configuration Utility; Enforcing URL Closure in the Command-Line Interface)
  • Identity Theft Attacks (Types of Identity Theft Attacks; Application Firewall Protection Against Identity Theft)
  • Credit Card Protection (Predefined Credit Cards; Credit Card Settings)
  • Protecting Credit Cards (Protecting Credit Cards in the Configuration Utility; Protecting Credit Cards in the Command-Line Interface)
  • Errors Triggering Sensitive Information Leaks
  • Safe Object Protection (Defining a Safe Object; Adding a Safe Object; Adaptive Learning for Security; Learning Over Time; Learning Thresholds; Generalized and Simple Rules; Learned Rules; Enabling Learning; Setting Learning Thresholds; Managing Learned Rules)

Application Firewall Troubleshooting

  • Application Firewall and Applications (HTTP Headers; HTML Comment Stripping)
  • Configuration Issues (Policy Issues; Profile Issues; Suggested Actions)

Queuing and Connection Tuning

  • HTTP Connections (Keep-alive HTTP Connections; HTTP 1.0 and 1.1 Behavior; Pipelined Requests)
  • HTTP Connection Management and NetScaler HTTP Behavior (Client Keep-Alive; Connection IP Address Control; Maximum Requests and Maximum Connections; Connection Idle Settings; Trackable Connections)
  • TCP Buffering (Down-State Flush and Access Down Connection Settings; TCP Optimization; Advertised Window Size; Window Scaling; Selective Acknowledgement)
  • Surge Queue
  • Surge Protection (Request and Response Rates; Throttle Rate; Disabling Surge Protection in the Configuration Utility; Disabling Surge Protection for a Service in the Configuration Utility; Setting Thresholds in the Configuration Utility)
  • Priority Queuing (Enabling Priority Queuing in the Configuration Utility; Creating a Priority Queuing Policy in the Configuration Utility; Binding Priority Queuing Policies in the Configuration Utility; Weighted Queuing)
  • HTTP Denial-of-Service Protection (Enabling HTTP DoS Protection in the Configuration Utility; Adding a HTTP DoS Policy in the Configuration Utility; Challenged JavaScript Responses; Client Detection Tuning and JavaScript Challenge Response Rate; HTTP DoS Protection Deployment Guidelines; Attack Characteristics)
  • IP Rate Limiting (Rate Control by Subnet Example; IP Rate Limiting Best Practices)

Authentication, Authorization, and Auditing

  • Users, Groups and Command Policies (Authentication, Authorization, and Auditing; Systems and AAA Users Groups; Local Accounts; External Authentication)
  • External Authentication for System Users (Authentication Actions and Policies; Configuring Local Authentication; Configuring External Authentication with Explicit Accounts; Configuring External Authentication with Group Extraction; Creating an External Authentication Policy; Creating local groups in the Command-Line Interface; Binding Groups in the Command-Line Interface; Creating an LDAP Authentication Action in the Command-Line Interface; Creating an Authentication Policy in the Command-Line Interface; Binding the Policy in the Command Line Interface; Authentication Troubleshooting; External Authentication Common Issues)
  • AAA for Traffic Management (Enabling AAA for Traffic Management; AAA for Application Traffic; Basic AAA Setup for Application Traffic; Workflow for AAA Traffic Management)
  • Configuration (Creating an Authentication Virtual Server; Creating an Authentication Virtual Server in the Command-Line Interface; Binding an SSL Certificate in the Command-Line Interface; Binding a Virtual Server to an Authentication Policy in the Command-Line Interface; Configuring a Virtual Server to use an Authentication Virtual Server in the Command-Line Interface; Configuring Authorization Policies for Traffic Management; Setting the Default Traffic Management Authentication Action to Deny in the Command-Line Interface; Creating an Authorization Policy to Allow Access
  • Audit Logging (Audit Logging Troubleshooting)

HTTP Service Callouts

  • HTTP Callouts
  • Configuring HTTP Callouts (Configuring HTTP Callouts in the Configuration Utility; Configuring HTTP Callouts in the Command-Line Interface; Callout Examples; HTTP Callout Response Parsing)
  • HTTP Callout Use Cases (Scenario 1: Filter Clients Based on an IP Address Blacklist; Scenario 2: Fetch and Update Content; HTTP Callout Auditing)

EdgeSight for NetScaler

  • Data Flow Overview
  • JavaScript Response Injection (User Metrics; NetScaler Metrics; NetScaler Metric Example; Data Validity)
  • EdgeSight for NetScaler Server Components (Component Installation Scenarios)
  • EdgeSight for NetScaler Installation Considerations (Installing EdgeSight for Netscaler; SQL Server; SQL Reporting Services; EdgeSight for NetScaler Components; Installing EdgeSight Database Components; Installing EdgeSight Report Console and Data Collector Components; EdgeSight Post-Installation Wizard; Upgrading EdgeSight for NetScaler)
  • Reporting Services Initial Configuration (NetScaler Configuration Overview; Configuring HTML Injection; Editing the prebody.js script; Configuration Example in the Command-Line Interface; Add NetScaler System to EdgeSight for NetScaler Data Collector; Topology Data Collectors with SSL)
  • EdgeSight Charts and Reports
  • EdgeSight Troubleshooting (Troubleshooting OS Components; Troubleshooting HTML Injection; Troubleshooting Injection Request; Troubleshooting Unknown Device; Troubleshooting from the NetScaler Command-Line Interface)

Command Center

  • Command Center Introduction (Command Center NetScaler Features; NetScaler and WANScaler Support)
  • Command Center Clients (Connecting to Command Center)
  • Server Requirements (Disk Space Requirements; MySQL Considerations; MicrosoftSQL Server 2005 Considerations)
  • Port Setting Requirements (Command Center Installation; Linux Considerations; Installation; Capacity Planning; Backup; Installation Modes; Installation Considerations)
  • Command Center Functionality (Command Center Home Page; Discovery; Fault Management; Configuration Management; Change Management; Centralized Certificate Management; Performance Monitoring)
  • Command Center Administration (Security Administration; Administration Operations; Administration Configuration; Server Details)
  • Command Center Troubleshooting (Microsoft SQL Database Issues; Discovery Issues; Performance Data Issues; Linux Command-Line Interface Access Issues; Reporting Issues)

NetScaler Web Logging

  • NetScaler Web Logging Introduction (Architecture Overview; Communication Process)
  • NetScaler System Configuration (Enabling Web Logging in the Configuration Utility; Enabling Web Logging in the Command-Line Interface; Configuring the Buffer Size in the Configuration Utility; Configuring the Buffer Size in the Command-Line Interface)
  • NSWL Client Installation (Logging System Components; Installing the NSWL Client on Windows; NSWL Options; Windows Service Registry Key)
  • NSWL Client Configuration (NetScaler IP Addresses; Log Filters; Defining Log Properties; Running NSWL; Verifying the Configuration)
  • Troubleshooting Web Logging (NSWL Troubleshooting; NetScaler Troubleshooting; Buffer Overflow)
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training XML for Java Developers – 4 days

Class overview :

This four-day course builds skills in Java’s XML processing APIs. The course is intended for students with a working knowledge of XML — and possibly DTDs or XML Schema — who want to build XML applications or components using the Java language. Everything in the course adheres to W3C and Java standards for completely portable code.

Class goals :

– Understand the use of SAX and DOM APIs for XML parsing.
– Understand the need for JAXP as an additional layer to the standard contract between applications and parsers.
– Parse element and attribute content, processing instructions, and other document information using SAX.
– Parse documents using the DOM.
– Modify, create and delete information in an XML document using the DOM.
– Write simple and complex queries into XML document content using XPath.
– Use XSLT for XML-to-XML, XML-to-HTML, or XML-to-text transformations.
– Build standalone and web applications that build on XSLT transformation logic.
– Use JAXB to generate persistent Java object models based on XML Schema.
– Implement XML persistence using the JAXB.

Content of Training XML for Java Developers

  1. XML Parsing Using Java
    1. The Java API for XML Processing (JAXP)
      1. Parsing XML
      2. SAX and DOM
      3. What the W3C Says
      4. What the W3C Doesn’t Say
      5. Sun and Apache
      6. JAXP
      7. Parser Factories
      8. Pluggable Parsers
      9. Parser Features and Properties
    2. The Simple API for XML (SAX)
      1. Origins of SAX
      2. The SAX Parser
      3. The SAX Event Model
      4. Reading Document Content
      5. Handling Namespaces
      6. SAX Features for Namespaces
      7. Parsing Attributes
      8. Error Handling
      9. DTD Validation
      10. Schema Validation
      11. Handling Processing Instructions
    3. The Document Object Model (DOM)
      1. Origins of the DOM
      2. DOM Levels
      3. DOM2 Structure
      4. The Document Builder
      5. DOM Tree Model
      6. DOM Interfaces
      7. Document, Node and NodeList Interfaces
      8. Element and Text Interfaces
      9. Finding Elements By Name
      10. Walking the Child List
      11. The Attribute Interface
      12. Traversing Associations
      13. The JAXP Transformer Class
      14. Sources and Results
      15. Combining SAX and DOM Processing
      16. Namespaces and the DOM
    4. Manipulating XML Information with the DOM
      1. Modifying Documents
      2. Modifying Elements
      3. Modifying Attributes
      4. Managing Children
      5. Seeking a Document Location
      6. The ProcessingInstruction Interface
      7. Creating New Documents
  2. XML Transformations Using Java
    1. Using the JAXP for Transformations
      1. XPath, XSLT and Java
      2. The Transformer Class
      3. The TransformerFactory Class
      4. Sources and Results
      5. Identity Transformations
      6. Creating Transformations from Stylesheets
      7. Template Parameters
      8. Output Methods and Properties
      9. Evaluating XPath Expressions
    2. XPath
      1. Use of XPath in Other XML Technologies
      2. XPath Expressions
      3. The Axis
      4. The Node Test
      5. The Predicate
      6. XPath Types
      7. XPath Functions
      8. Implied Context
      9. Querying with XPath
      10. XPath and the DOM
    3. Templates and Production
      1. Rule-Based Transformations
      2. Templates and Template Matching
      3. Built-In Template Rules
      4. Recursion Through Templates
      5. Template Context
      6. Output Methods
      7. Controlling Whitespace
      8. Literal Replacement Elements
      9. Formalizing Text, Elements and Attributes
      10. Defining Target Vocabulary
      11. Generating Processing Instructions
    4. XSLT: Dynamic Content and Flow Control
      1. Web Applications Using XSLT
      2. J2EE and JAXP
      3. Deriving Source Content
      4. Getting Source Values
      5. Attribute Value Templates
      6. Copying Source Elements and Trees
      7. Looping
      8. Conditionals
  3. The Java API for XML Binding
    1. The Java API for XML Binding
      1. The Need for Data Binding
      2. XML Schema
      3. Two Paths
      4. JAXB Compilation
      5. Mapping Schema Types to Java
      6. Java-to-XML Mapping Using Annotations
      7. Marshaling and Unmarshaling
      8. Working with JAXB Object Models
XML for Java Developers
Training XML for Java Developers

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …