Choose your language:

France
Germany
Hong Kong

India
Ireland
Japan
Malaysia
Netherlands
New Zealand

Singapore

Sweden
United Kingdom
United States
Course Code

IN1458

Duration

4 Days

Practical experience in Java programming is mandatory.
During this advanced Java 8 workshop, participants will learn the more advanced Java APIs and programming techniques including Lambda, Generics and Concurrency. The concepts taught in this course are reinforced by hands-on lab exercises using Eclipse.
This course is designed for Java programmers.
Upon completion of this course, participants will learn:
  • Java Virtual Machine (JVM)
  • Lambda expressions and JVM support
  • Best practices for handling exceptions 
  • Multi-threading in Java
  • How to effectively package applications
  • Advanced features of Java Database Connectivity (JDBC)
  • Reflection
  • Internationalization and Localization
  • Selecting the appropriate Java SE 6 collection
  • Implementing security through cryptography, authorization, authentication and SSL
Java Virtual Machine
Architecture of the JVM
Version implications
Application Execution
Reference Objects
Lambda Expressions

Packaging Applications
JAR Files
Structure and Content
Application Entry Points
Versioning
Sealing Packages
Signing and Verification of JARs
JAR Version improvements

Best Practices for Exception Handling
Choosing an Exception Type
Designing Custom Exceptions
Managing Thrown Exceptions
Exception Chains

Threading and Concurrency
Multithreading
Locks and Executors
Concurrent Collections
Atomic Variables

Networking
Socket Based Servers
Socketless Servers

Advanced JDBC
Recent JDBC Enhancements
Working with ResultSet
Working with RowSet
Connection Pooling
Resource Management
Security Concerns
Advanced Types

Performance
Process and Issues
Architecture of the JVM
Memory Management
CPU Performance
Threading
Profiling and Benchmarking
Code Optimization
Design Optimization
Impact of Exceptions and Reflection

Writing Effective Java
Creating and Destroying Objects
Factory Methods
Finalizers
Common Methods
Classes and Interfaces
Immutability
Composition vs. Inheritance
Exceptions
Threads
Synchronization
Serialization
readObject() Considerations

Data Structures
Generics and Collections
Java 6 Collection Framework
Updated and Modified Collection Classes
Efficient Strings and Arrays
String Alternatives
Array Copying
Introduction to Algorithmic Analysis
Choosing a Collection
Customizing Collections
Security
Internationalization
Fundamentals of Localization
Localizing Strings, Numbers and Dates

Java Security
Java Security Architecture
JVM Security features
Access Control and Policy Files
Security Manager and Application Permissions
Byte Code verifier
Class loaders
Class loader tunnels
Signing code
Trusted code
Java permission management
Extending Java permissions
JDK Tools: jarsigner, policytool, keytool
Java Security Model in the WebSphere Environment
Permissions and WebSphere-based Applications
Security Features within the WebSphere Administrative Console

Cryptography Introduction and the JCA
Key Generation, Exchange, and Encryption
Java Cryptography Architecture and Extensions (JCA, JCE)
Public and Private Keys
Digital Signatures
Digital Certificates
Message Digests

Declarative Authorization and Secure Coding Practices
Container Based Security
Security: Declarative and Programmatic
Application Isolation in a J2EE Environment
Secure Associations
Security Roles and Role Mappings
Security Levels
Secure Coding Practices
Input Validation
Injection Flaws
Handling Cross-Site Scripting Conditions

Defining Security Settings
Enabling Security
Defining Security Roles and Method Permissions
Defining Security Constraints and Security Role References
Custom User Registries
LDAP User Registry Settings
Single Sign-on Properties
Security Configuration Files
Security Tips

Java Authentication
Authentication Mechanisms
Basic and Form Authentication
Authentication vs. Authorization
Lazy Authentication
LTPA
User Registries and Supported LDAP Servers
JNDI-supported Authentication
JAAS
JAAS vs. standard Java Security Model

Secure Sockets Layer
Secure Sockets Layer (SSL) Basics
SSL Key Exchange
GSS
SASL protocols
Java Secure Sockets Extension (JSSE)

Establishing SSL on WebSphere

Send Us a Message
First Name
*
Last Name
*
Company
*
Email
*
Address Line 1
*
Address Line 2
City
*
*
Zip Code
Telephone
*
*
Choose one
*
Comments