Advanced Java Programming Training

Answers to Popular Questions:

Yes, this class can be tailored to meet your specific training needs.
Yes, we provide Java Programming consulting services.
Yes, group discounts are provided.

Course Description

Client/server applications can be written utilizing both the and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.
Course Length: 5 Days
Course Tuition: $2090 (US)


Either Java Programming or Java Fundamentals for Non-C Programmers is required.

Course Outline


Advanced I/O - Object Serialization
What is Serialization?
Serializable Objects
Writing an Object
Reading an Object
Handling Exceptions
Customizing Serialization
Controlling Serialization

Advanced I/O - New I/O
The java.nio package
Buffers and Channels
Buffer Implementations
Buffer Methods
ByteBuffer Methods
File Locking
Transferring Data Between Channels
Character Sets

Introduction to Reflection
The Class Class
The reflect Package
Exception Handling and Reflection
Dynamic Programming

Advanced JDBC
JDBC SQL Escape Syntax
The execute() Method
Batch Updates
Updatable Result Sets
Large Objects
Working with Savepoints

Networking with Sockets
Clients and Servers
Ports, Addresses and Protocols
The Socket Class
Communication Using I/O
The ServerSocket Class
Concurrent Servers
The URL Class
The URLConnection Class

Remote Method Invocation
Distributed Applications
Steps to Create a Remote Object
An RMI Client
An RMI Server
RMI Classes and Interfaces
Class Distribution
RMI Utilities
Parameter Passing and Serialization
Advanced RMI
Client Callbacks
Dynamic Class Loading
Activatable Objects
Registering Activatable Objects
Security and Activation
JNDI and RMI Registry
Managing Security Policies
Untrusted Code
Security Managers
The Java Security Model
Policy Entries
Policy Files
Using the Policy Tool
Securing Applets
Securing Applications

Keys, Signatures, and Certificates
Jar Files
Data Security Concerns
Message Digests
Digital Signatures
Using keytool
Using jarsigner
Certificate Chains
Managing Keys and Certificates
Security Policies for Signed Code

Encryption with the javax.crypto Package
Cryptography Concepts
Encryption Keys
Cipher Algorithms
Modes and Padding Schemes
The Cipher Class
Encrypting and Decrypting Data
Cipher Output Stream
Cipher Input Stream
Encryption using Password Ciphers
Exchanging Encrypted Keys
Sealed Objects Java Authentication and Authorization Service (JAAS)
Authentication and Authorization
JAAS Overview
Subjects, Principals, and PrivilegedActions
Authentication with the NTLoginModule
Defining Permissions in Policy Files
NameCallback and PasswordCallback
The Policy Class

Java Naming and Directory Interface (JNDI)
Naming and Directory Services
Namespaces and Contexts
Naming Operations
Directory Operations
DNS Lookups with JNDI
Parsing XML with Java - JAXP
The Java API for XML Processing
Introduction to SAX Parsing
SAXParser and JAXP
SAX Event Methods
Introduction to DOM
Parsing DOM with JAXP
Native Methods
Overview of Java Native Methods and JNI
How to Create and Use Native Methods
Native Method Declaration
Using javah
Creating the Implementation Code
Using the Native Methods
Passing Arguments
Calling Java Methods in Native Code
JNI Signatures

Java Design Patterns - Creational Patterns
What are Design Patterns?
What are Creational Patterns?
Singleton - Introduction
Singleton - Implementation
Singleton - When to Use?
Factory Method - Introduction
Factory Method - Implementation
Factory Method - When to Use?
Builder - Introduction
Builder - Implementation
Builder - When to Use?

Java Design Patterns - Structural Patterns
What are Structural Patterns?
Facade - Introduction
Facade - Implementation
Facade - When to Use?
Adapter - Introduction
Adapter - Implementation
Adapter - When to Use?
Composite - Introduction
Composite - Implementation
Composite - When to Use?

Java Design Patterns - Behavioral Patterns
What are Behavioral Patterns?
Template - Introduction
Template - Implementation
Template - When to Use?
State - Introduction
State - Implementation
State - When to Use?
Observer - Introduction
Observer - Implementation
Observer - When to Use?

Appendix A JDBC SQL Programming
Error Checking and the SQLException Class
The SQLWarning Class
JDBC Types
Executing SQL Queries
Executing SQL Updates
Using a PreparedStatement
Parameterized Statements
Stored Procedures
Transaction Management

Appendix B Eclipse
Introduction to Eclipse
Installing Eclipse
Running Eclipse for the First Time
Editors, Views, and Perspectives
Setting up a Project
Creating a New Java Application
Running a Java Application
Shortcut Key Sequences
More Shortcut Key Sequences
Setting the Classpath
Importing Existing Java Code into Eclipse

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.