Beruflich Dokumente
Kultur Dokumente
Defining a Package Understanding CLASSPATH Access Protection Importing Packages Defining and implementing an Interface Abstract classes Vs Interfaces Adapter Classes Anonymous Classes
Exception Handling
Fundamentals of exception handling Types of exceptions Learning exception handlers Try and catch Multiple catch clauses Nested try statements Throw, throws and finally Creating custom exceptions Assertion
String Handling
Learning String Operations Learning Character Extraction Learning String Comparison Understanding of String Buffer Class String builder Class
Windows Programming
Swing Introduction to JFC Controls Event Delegation Model Event Classes Event Listeners www.intechlogies.com
Applet Applet Basics Architecture and Skelton Simple Applet Display Methods The Html Applet Tag Inter Applet Communication Trusted Applet (Applet with Database)
Multi-threaded Programming
The Java Thread Model Creating a Thread: Extending Thread Implementing Runnable Creating Multiple Threads and Context Switching Synchronization: Methods and Statement Inter-thread Communication Thread Local Dead Lock Thread pool Executer Class Shutdown Hookup Re-entrant Locking
I/O Streams
File Handling Binary Streams Character Streams Data Streams Serialization Scanner Stream Tokenizer Gzip Output Stream Class Data Encryption & Decryption
Networking
URL, Inet Address Socket and Server Socket Datagram Socket, URL connection Socket Factories
Reflection API
Determining the class of an Object Getting information about Classs modifiers, fields, methods, constructors and super classes Finding out constant and method declaration belong to an interface Creating an instance of a class whose name is not known until runtime Getting and setting value of an object if the method is unknown until runtime www.intechlogies.com
Invoking a method of an object if the method id unknown until runtime Creating a new array whose size and component type are not know until runtime Invoking Private Members of a class
Business Components Container Types Container Services Java Naming and Directory Interface Java Transaction Service Java Messaging Service Java Authentication &authorization Service
Introduction to UML
User Cases Diagrams
Introduction to XML
Document Type Definition (DTD) XML Parsers (Document Object Module Simple API for XML (SAX) )
Java Servlet
Introduction to Web Programming Advantages of Servlets Servlet Lifecycle Request Dispatching Session Tracking Event Listeners Filters File uploading/downloading Security
Session Beans
Introduction Static management www.intechlogies.com
Entity Beans
Introduction Persistence Life Cycle Types Container Managed Persistent (CMP)2.0 Introduction Primary Key Class EJB Methods EJB QL Syntax Clauses Bean Management Persistent (BMP) Introduction Implementation EJB Relationships
Transactions
Introduction ACID Properties Transaction Requirements Container Managed Transactions Bean Managed Transactions Distributed Transactions Two Phase Commit
Java Mail
Email System and Protocols Architecture Sending Mails Receiving Mails Handling Attachments Replying & Forwarding
UI Component Tags
Why we need UI component tags Tags, templates, and themes UI Component tag reference
Understanding Internationalization
The Struts 2 framework and Java i18n A Struts 2 i18n demo Struts 2 i18n: the details Overriding the frameworks default locale determination
DATABASE CURRICULAM
SQL Basic
Introduction Select Where Insert Update Delete www.intechlogies.com
SQL Advanced
SQL Order By SQL AND & OR SQL In SQL Between SQL Join SQL Union SQL Create SQL Drop SQL Alter Decode SQL SQL Group By SQL Select Into SQL Create View Creating Index
SQL Functions
Aggregate Functions Scalar Functions
Working with dates Introduction to PL Working with Procedures and Functions Working with Triggers Working with Sequences
HIBERNATE 3.0
Introduction to Mapping Objects to Relational Databases
Serialization 2 XML 2 Object oriented database systems Mapping
Introduction to Hibernate
Hibernate architecture Hibernate configuration Hibernates support for other technologies Installing hibernate A Hello World stand alone application
Mapping a class with data/calendar attributes Mapping read only class Mapping classes using versioning/timestamps
Hibernate Caching
Setting up a session factory cache Using the persistent object cache Using the query cache Setting up EH cache
Introduction to XDoclet Using Xdoclet with hibernate Hibernate XDoclet tags and description
SPRING 2.5
What Is Spring
Spring modules Understanding dependency injection Applying aspects-oriented programming
Advising Beans
Introducing AOP Creating classic Spring aspects Creating advice Defining point cuts and advisors Using proxy factory beans Autoproxying
Learning Springs data access philosophy Configuring a data source Using JDBC with Spring Working with JDBC templates Using Springs DAO support classes for JDBC Integrating hibernating with Spring Caching
www.intechlogies.com
LINUX MODULE
RH124 Red Hat System Administration Get Started with the GNOME Graphical Desktop
Get started with GNOME and edit text files with gedit
www.intechlogies.com
Comprehensive Review
Create and manage kick start configuration files; perform installations using kick start
www.intechlogies.com
Managing SE Linux
Manage software and query information with yum; configure client-side yum repository files www.intechlogies.com
Managing Processes
Understand the boot process and resolve boot problems
Software Management
Profile running services, then capture and analyze network traffic
Network Monitoring
Configure system to route traffic and customize network parameters with sysctl
www.intechlogies.com
Software Management
Profile running services, then capture and analyze network traffic
www.intechlogies.com
Network Monitoring
Configure system to route traffic and customize network parameters with sysctl
www.intechlogies.com
www.intechlogies.com
CCNA MODULE
DESCRIBE HOW A NETWORK WORKS
Describe the purpose and functions of various network devices Select the components required to meet a network specification Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network Describe the purpose and basic operation of the protocols in the OSI and TCP models Determine the path between two hosts across a network Describe the components required for network and Internet communications Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach Differentiate between LAN/WAN operation and features
CONFIGURE, VERIFY AND TROUBLESHOOT A SWITCH WITH VLANS AND INTERSWITCH COMMUNICATIONS
Select the appropriate media, cables, ports, and connectors to connect switchesto other network devices and hosts Explain the technology and media access control method for Ethernet networks Explain network segmentation and basic traffic management concepts Explain basic switching concepts and the operation of Cisco switches Perform and verify initial switch configuration tasks including remote access management IVerify network status and switch operation using basic utilities (including: ping, traceroute,telnet, SSH, arp, ipconfig), and SHOW & DEBUG commands Differentiate between LAN/WAN operation and features Identify, prescribe, and resolve common switched network media issuesconfiguration issues, auto negotiation, and switch hardware failures Describe enhanced switching technologies (including: VTP, STP, VLAN, PVSTP, 802.1q) Describe how VLANs create logically separate networks and the need forrouting between them Configure, verify, and troubleshoot VLANs Configure, verify, and troubleshoot trunking on Cisco switches Configure, verify, and troubleshoot interVLAN routing Configure, verify, and troubleshoot VTP Configure, verify, and troubleshoot STP operation Interpret the output of various show and debug commands to verify the operationalstatus of a Cisco switched network. Implement basic switch security (including: port security, trunk access, managementvlan other than vlan1, etc.)
www.intechlogies.com
IMPLEMENT AN IP ADDRESSING SCHEME AND IP SERVICES TOMEET NETWORK REQUIREMENTS IN A MEDIUM-SIZE ENTERPRISEBRANCH OFFICE NETWORK
Describe the operation and benefits of using private and public IP addressing Explain the operation and benefits of using DHCP and DNS Configure, verify and troubleshoot DHCP and DNS operation on a router Implement static and dynamic addressing services for hosts in a LAN environment Calculate and apply an addressing scheme including VLSM IP addressing to a network Determine the appropriate classless addressing scheme using VLSM and summarizationto satisfy addressing requirements in a LAN/WAN environment Describe IPv6 addresses Identify and correct common problems associated with IP addressing and hostConfigurations
CONFIGURE, VERIFY, AND TROUBLESHOOT BASIC ROUTEROPERATION AND ROUTING ON CISCO DEVICES
Describe basic routing concepts (including: packet forwarding, router lookup process) Select the appropriate media, cables, ports, and connectors to connect routers toother network devices and hosts Configure, verify, and troubleshoot RIPv2 Connect, configure, and verify operation status of a device interface Verify device configuration and network connectivity using ping, trace route,telnet, SSH or other utilities Manage IOS configuration files. (including: save, edit, upgrade, restore) Manage Cisco IOS Compare and contrast methods of routing and routing protocols Configure, verify, and troubleshoot OSPF Configure, verify, and troubleshoot EIGRP Verify network connectivity (including: using ping, trace route, and telnet or SSH) Troubleshoot routing issues Verify router hardware and software operation using SHOW & DEBUG commands. Implement basic router security
Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
IMPLEMENT, VERIFY, AND TROUBLESHOOT NAT AND ACLS INA MEDIUM-SIZE ENTERPRISE BRANCH OFFICE NETWORK
Describe the purpose and types of ACLs Configure and apply ACLs based on network filtering requirements using CLI Configure and apply an ACL to limit telnet and SSH access to the router using CLI Verify and monitor ACLs in a network environment Troubleshoot ACL issues Explain the basic operation of NAT Configure NAT (Static , Dynamic , Overload )for given network requirements using CLI IMPLEMENT, VERIFY, AND TROUBLESHOOT NAT AND ACLS IN A MEDIUM-SIZE ENTERPRISE BRANCH OFFICE NETWORK Troubleshoot NAT issues
Labs:
Lab 1: Build a network Lab 3: Router initial configuration and enable IP Lab 4: Verify initial configuration using setup command Lab 6: Command history and editing features Lab 7: Examine Router Elements Lab 8: Using Cisco Discover Protocol Lab 9: Copy and manipulate configuration files Lab 10: Config passwords/identification/banners Lab 11: Config Router to be a TFTP Server Lab 12: Loading the IOS from ROM, TFTP, or flash Lab 13: Working with an IOS software image Lab 14: Configure IP Addresses Lab 15: Configure IP Host Table Lab 16: Verify IP Addresses Lab 17: Add RIP routing protocol to configuration Lab 18: Add IGRP routing protocol to configuration www.intechlogies.com
Lab 19: Configuring Standard Access-Lists Lab 20: Configuring Extended Access Lists Lab 21: Configuring Frame Relay Lab 22: Monitoring Frame Relay
www.intechlogies.com
.NET MODULE
CORE .NET CONCEPT
Introduction
Use of .net D.N.A architecture (One tier, two tier, three tier, n-tier)
OOPs Concepts
Classes Encapsulating attribute Define constructor Define method and their type Overloading methods and constructor Define property and their types Invoking property and methods
Event handlers User defined events Creating and binding user events
Inheritance
Implementations Inheritance hierarchies Method overloading, overriding and hiding Abstract and seald class Exposing interface Interface polymorphism Class access modifiers Partial class
Collection
Array list Stack Queue Hash table
Generics Collection
List Dictionary Stacks Queue
File Handling
System io namespace Stream reader and stream writer File class Directory class Path class Reading and writing a file
Exception Handling
Means of bug and exceptions Role of .net exception handling System level exception Application level exception Try and catch block www.intechlogies.com
Multithreading
Understanding multithreading process The system threading namespace The thread and the thread start class Thread life cycle Thread safety concepts Thread synchronization Understanding thread pool Understanding role of thread background worker component
Serialization
Understand object serialization Serialization formats (Binary, Soap formatter and XML serializar)
Reflection
System reflection namespace Core reflection classes Accessing assembly through reflection Method info Member info Property info Browsing and querying members Invoking methods and property and runtime Reflection on shared assembly
Remoting
Introduction of remoting Remoting architecture and scenario Creating .net remoting object Hosting a remort object Activation type (Singleton, single call) Creating channels
www.intechlogies.com
ADO .NET
Evaluation of ADO
Difference between ADO and ADO.Net Providers Connected and disconnected architectures
Data Reader
Reading data in connected environment Moving and accessing value of record Execute reader
Data View
Row filter Sorting Update, insert and delete via data view
Data Relation
Creating relations Applying relation on data set
Adding Constraints
Foreign key constraints Unique constraints Define primary key www.intechlogies.com
Transactions
Introduction of transaction (ACID) Transaction class Commit and rollback actions Implementation of save point
ASP.NET
Introduction to ASP.NET
Need of web application Http protocol Static and dynamic page Concept working of lis and browser Difference between asp and asp.net
Introduction to Html
Creating simple html page Html tags Hosting a html page Lis virtual directory Request transfer throws Get and Post methods
State Management
Http cookies Cookie creation Scope of cookie and their merits
Http Session
Session clean-up and creation Implementation session setting in web.config file Session state using sql server Session state using state service
Http Application
Understand application life cycle Implementation and use of application object Working with Global.net www.intechlogies.com
View State
Understanding view state Store and retrieve value from view state
Navigation Control
Site map Use of site map Binding a site map Tree view Property of tree view www.intechlogies.com
Define a node relation Binding with site map Property of menu view Define an items relation
Caching
Types of caching Page fragment caching Caching with http cache policy class Post cache substitution Data caching
Master Pages
Creating master page Default contents Master page with CSS and table layout Applying master page through configuration file Nested master page Master page and relative path
Web Services
Introduction of web service The SOAP architecture SOAP and web service SOAP essentials Web service attribute WSDL documentations Disco and disco map file Transaction in web service Publishing and consuming a web service
Ajax
Introduction to Ajax Creating Ajax enabled website Understanding and working with update panel Role of script manager Creating a Ajax enabled web service
Passport
Concept of passport security Passport url
Login Controls
Creating the data source Configure connection string and membership provider Creating a authentication user Login, login status, login view control Password recovery control Create user control
www.intechlogies.com
XML
Introduction of XML XML documentation structure Wff format of XML Parsers dom and sax XML classes Reading and writing XML file
ADVANCE .NET
Understanding Lambda Expressions Object Initialization and Anonymous Types Extension methods
LINQ
Understanding the role of Linq Linq query expression Linq and non generic collection Linq to datasheet Linq to sql
.NET 2010
Language and IDE Features
Examine visual studio 2010 code editor UI improvements : from intellisense to zoom, Learn new language features including dynamic language support, Lambda expression improvements, Named and optional parameters in c# 4.0 Parallel computing Add simple parallel support Task parallel library Plinq www.intechlogies.com
Examine variance (covariance and contra variance) and hoe these feature make interface work the way you always thought they should In-process side-by-side execution
WPF Overview
Examine the various flavors of WPF application Working with window and application class types
www.intechlogies.com
Joins
Inner joins Outer joins Cross joins
www.intechlogies.com
Rules
Defaults Determining which tables and datatypes Use a given rule or default Triggers for Data integrity Choosing what to use
Understanding Indexes
How data is accessed in SQL server Creating, altering, and Dropping indexes The create index statement
Views
Simple views Views as filters More complex views Editing views with T-SQL Dropping views
Stored Procedures
Basic syntax Changing stored procedures with Alter Dropping sprocs Handling errors
Transactions
Begin tran Commit tran Rollback tran Save tran
Triggers
What is a trigger? With encryption 0 www.intechlogies.com
The for/after vs the instead of clause With append Not for replication Using triggers for data integrity rules Dealing with requirements sourced from other tables Using triggers to check the delta of an update using triggers for custom error messages Other common uses of triggers Other triggers issues Triggers can be nested Triggers can be recursive Dropping triggers
Using XML
Retrieving XML by using FOR XML Shredding XML by using OPEN XML Introducing Xquery Using the XML data type
www.intechlogies.com