computer science net java, ccna, linux}
Post on 06-Apr-2018
240 Views
Preview:
TRANSCRIPT
-
8/3/2019 Computer Science net Java, Ccna, Linux}
1/36
www.intechlogies.com
JAVA MODULE
J2SE (JAVA 2 STANDERD EDITION)
Introduction To Java Understanding Requirement: Why Java Why Java is important to the Internet
Introduction To Java Virtual Machine Java Virtual Machine Architecture Class loading process by Class loaders
Bootstrap Loader Extension Loader System Loader
Relationship between Loaders Role of Just in Time Compiler (JIT) Execution Engine
An Overview Of Java And Buzzwords Data Types, Variables ad Arrays Operators Control statements Object oriented Paradigms Abstraction The Three OOP Principles (Encapsulation, Inheritance and Polymorphism)
Java Classes And OOP Implementation Class Fundamentals Command Line Arguments Learning static initializer Declaration of Objects Instance Variable Hiding Overloading and Overriding of Methods Up casting Down casting Understanding of Access Controls Private, public and protected Learning Nested and Inner Classes Dynamic method Dispatching Using Abstract Classes Using final to prevent Overriding & Inheritance Garbage Collection
Packages And Interfaces
-
8/3/2019 Computer Science net Java, Ccna, Linux}
2/36
www.intechlogies.com
Defining a Package Understanding CLASSPATH Access Protection Importing Packages Defining and implementing an Interface Abstract classes Vs Interfaces Adapter Classes Anonymous Classes
Exception Handling Fundamentals of exception handling Types of exceptions Learning exception handlers Try and catch Multiple catch clauses Nested try statements Throw, throws and finally Creating custom exceptions Assertion
String Handling Learning String Operations Learning Character Extraction Learning String Comparison Understanding of String Buffer Class String builder Class
New in JDK 5/6 Premain Method, Object size Auto boxing, UN boxing Java Compiler API Generics Annotations
Vargs Static Import For Each ENUM
Windows Programming Swing Introduction to JFC Controls Event Delegation Model Event Classes Event Listeners
-
8/3/2019 Computer Science net Java, Ccna, Linux}
3/36
www.intechlogies.com
Applet Applet Basics Architecture and Skelton Simple Applet Display Methods The Html Applet Tag Inter Applet Communication Trusted Applet (Applet with Database)
Multi-threaded Programming The Java Thread Model Creating a Thread: Extending Thread Implementing Runnable Creating Multiple Threads and Context Switching Synchronization: Methods and Statement Inter-thread Communication Thread Local Dead Lock Thread pool Executer Class Shutdown Hookup Re-entrant Locking
I/O Streams File Handling Binary Streams Character Streams Data Streams Serialization Scanner Stream Tokenizer Gzip Output Stream Class Data Encryption & Decryption
Networking URL, Inet Address Socket and Server Socket Datagram Socket, URL connection Socket Factories
Reflection API Determining the class of an Object Getting information about Classs modifiers, fields, methods, constructors
and super classes
Finding out constant and method declaration belong to an interface Creating an instance of a class whose name is not known until runtime Getting and setting value of an object if the method is unknown until runtime
-
8/3/2019 Computer Science net Java, Ccna, Linux}
4/36
www.intechlogies.com
Invoking a method of an object if the method id unknown until runtime Creating a new array whose size and component type are not know until
runtime
Invoking Private Members of a class
ADVANCE JAVE & J2EE (JAVA 2 ENTERPRISE EDITION)
Collection Framework The Collection Interfaces(List, Set, Sorted Set) The Collection Classes (Array List, Linked List, Hash Set, Tree Set) Accessing a Collection via an Iterator Working with Maps Working with Comparators, Comparable The Collection Algorithms The Legacy Classes and Interfaces (Enumeration, Vector, Dictionary, Hash
table)
Date and Time HandlingSystem Properties & Internationalization
Usage of Property file Define the Locale Resource Bundle Fetching text from Resource Bundle
Remote Method Invocation (RMI) Distributed Applications RMI Architecture Implementation Call-back Mechanism
Database Programming Using JDBC JDBC Drivers 4 Ways of Getting Database Connection Statements, Callable statement, prepared statement Metadata, Result Set Metadata, Database Metadata Scrollable & Updatable Result Set Batch Updates Data Source & Connection Pooling Row sets Traction (Commit, Rollback, save point)
Introduction to J2EE Architecture
Single, Two, Three, N Tier Web Components
-
8/3/2019 Computer Science net Java, Ccna, Linux}
5/36
www.intechlogies.com
Business Components Container Types Container Services Java Naming and Directory Interface Java Transaction Service Java Messaging Service Java Authentication &authorization Service
Introduction to UML User Cases Diagrams
Introduction to XML Document Type Definition (DTD) XML Parsers (Document Object Module Simple API for XML (SAX) )
Java Servlet Introduction to Web Programming Advantages of Servlets Servlet Lifecycle Request Dispatching Session Tracking Event Listeners Filters File uploading/downloading Security
Java Server Pages (JSP) & JSTL JSP Architecture JSP Elements JSP Objects Custom Tags Using tags of JSTL
Expression Language Exception Handling in JSP
Enterprise Java Beans (EJB 3.0) JAVA Persistence API Introduction Architecture Types of EJB
Session Beans
Introduction Static management
-
8/3/2019 Computer Science net Java, Ccna, Linux}
6/36
www.intechlogies.com
Life Cycle Stateless State full
Entity Beans Introduction Persistence Life Cycle Types Container Managed Persistent (CMP)2.0 Introduction Primary Key Class EJB Methods EJB QL Syntax Clauses Bean Management Persistent (BMP) Introduction Implementation EJB Relationships
Message Drive Beans & JMS Messaging Overview Messaging Models Point to Point Model Topic Subscriber Model JMS Implementation
Transactions Introduction ACID Properties Transaction Requirements Container Managed Transactions Bean Managed Transactions Distributed Transactions Two Phase Commit
J2EE Design Patterns Why Design Patterns Front Controller Composite View Session Faade Service Locator Data Access Object Value Object
-
8/3/2019 Computer Science net Java, Ccna, Linux}
7/36
www.intechlogies.com
Singleton Pattern, Factory PatternJava Mail
Email System and Protocols Architecture Sending Mails Receiving Mails Handling Attachments Replying & Forwarding
Introduction to Web Services A Conceptual Overview of Web Services Web Services Requirements SOAP WSDL UDDI
STRUTS 2.0 CURRICULAM
Struts 2 Framework MVC/Model2 Filter Dispatcher Action Result Interceptors /Value Stack, OGNL & Data Transfer Action Context
Working With Struts 2 Actions Introducing Struts 2 actions Packaging your actions Implementing actions
Transferring data onto objects File uploading: a case study
Adding Workflow With Interceptors Why intercept requests? Interceptors in action Surveying the built-in Struts 2 interceptors Declaring interceptors Building your own interceptors
Data Transfer: OGNL And Type Conversion Data transfer and type conversion:
-
8/3/2019 Computer Science net Java, Ccna, Linux}
8/36
www.intechlogies.com
OGNL and Struts 2 Built-in type converters Customizing type conversion
Building A View: Tags An overview of Struts tags Data tags Control tags Miscellaneous tags Using JSTL and other native tags A brief primer for the ONGL expression language
UI Component Tags Why we need UI component tags Tags, templates, and themes UI Component tag reference
Integrating With Spring And Hibernate/JPA Why use spring with Struts 2? Adding spring to Struts 2 Why use the Java Persistence API with Struts 2?
Exploring The Validation Framework Getting familiar with the validation framework Wiring your action for validation Wiring a custom validator Validation framework advanced topics
Understanding Internationalization The Struts 2 framework and Java i18n A Struts 2 i18n demo Struts 2 i18n: the details Overriding the frameworks default locale determination
DATABASE CURRICULAM
SQL Basic Introduction Select Where Insert Update Delete
-
8/3/2019 Computer Science net Java, Ccna, Linux}
9/36
www.intechlogies.com
SQL Advanced SQL Order By SQL AND & OR SQL In
SQL Between SQL Join SQL Union SQL Create SQL Drop SQL Alter Decode SQL SQL Group By SQL Select Into SQL Create View Creating Index
SQL Functions Aggregate Functions Scalar Functions
Working with dates
Introduction to PL
Working with Procedures and Functions
Working with Triggers
Working with Sequences
HIBERNATE 3.0
Introduction to Mapping Objects to Relational Databases Serialization 2 XML 2 Object oriented database systems Mapping
Introduction to Hibernate Hibernate architecture Hibernate configuration Hibernates support for other technologies Installing hibernate A Hello World stand alone application
Creating Persistent Classes Mapping a basic Java class Mapping a class with binary data Mapping a serializable class
-
8/3/2019 Computer Science net Java, Ccna, Linux}
10/36
www.intechlogies.com
Mapping a class with data/calendar attributes Mapping read only class Mapping classes using versioning/timestamps
Mapping Inheritance With Java Classes Tableper-class hierarchy mapping Table-per-subclass hierarchy mapping Table-per-concrete-class hierarchy mapping Persisting interfaces
Working With Collections Associations Lazy initializations Mapping maps/sorted maps Mapping set/sorted sets Mapping lists Mapping arrays Mapping a bidirectional association
Using Persistent Objects Persisting objects Loading data into an object Updating and finding objects
Scalar Queries And Hibernate Query Language Queries Named queries SQL queries Hibernate query language
Hibernate Caching Setting up a session factory cache Using the persistent object cache
Using the query cache Setting up EH cache
Hibernate Transaction And Locking Configurations Database support Using transactions The transaction API Transaction example using Oracle Locking
Hibernate And Xdoclet
-
8/3/2019 Computer Science net Java, Ccna, Linux}
11/36
www.intechlogies.com
Introduction to XDoclet Using Xdoclet with hibernate Hibernate XDoclet tags and description
Hibernate And Eclipse Hibernator Hiber Clipse hibernate synchronizer
Integration Of Struts 2, Hibernate And Spring Struts and Hibernate Spring and Hibernate Struts, Hibernate and Spring
SPRING 2.5
What Is Spring Spring modules Understanding dependency injection Applying aspects-oriented programming
Basic Bean Wiring Containing your beans Creating beans Injecting into bean properties Auto wiring Controlling bean creation
Advanced Bean Wiring Declaring parent and child beans Applying method injection
Injecting non-Spring beans Registering custom property editors
Advising Beans Introducing AOP Creating classic Spring aspects Creating advice Defining point cuts and advisors Using proxy factory beans Autoproxying
Hitting The Database
-
8/3/2019 Computer Science net Java, Ccna, Linux}
12/36
www.intechlogies.com
Learning Springs data access philosophy Configuring a data source Using JDBC with Spring Working with JDBC templates Using Springs DAO support classes for JDBC Integrating hibernating with Spring Caching
Spring And POJO-Based Remote Services An overview of Spring remoting Working with RMI Remoting with hessian and burlap Using Springs http Invoker Spring and Web services
Building Contract-First Web Services In Spring Introducing Spring-WS Defining the contract (first) Handling messages with service endpoints Wiring it all together Consuming Spring-WS web services
Spring And Enterprise Java Beans Wiring EJBs in Spring Spring and EJB3
Handling Web Requests Getting started with Spring MVC Mapping requests to controllers Handling requests with controllers Handling exceptions
Integrating With Other Frameworks
Using Spring with Struts Registering the Spring plug-in with Struts Writing Spring ware Struts action Delegating to Spring-configured actions What about Struts 2? Working Spring into web work 2/Struts 2
-
8/3/2019 Computer Science net Java, Ccna, Linux}
13/36
www.intechlogies.com
LINUX MODULE
RH124 Red Hat System Administration
Get Started with the GNOME Graphical Desktop Get started with GNOME and edit text files with gedit
Manage Files Graphically with Nautilus Access documentation, both locally and online
Get Help in a Graphical Environment Configure the date and time and configure a printer
Configure Local Services Understand basic disk concepts and manage system disks
Manage Physical Storage I Understand logical volume concepts and manage logical volumes
Manage Logical Volumes Manage CPU, memory, and disk utilization
Monitor System Resources Manage system software locally and using Red Hat Network (RHN)
Manage System Software Understand basic shell concepts, execute simple commands, and use basic
job control techniques
Get Started with Bash Use man and info pages and find documentation in /usr/share/doc
Get Help in a Textual Environment Understand basic network concepts; configure, manage, and test network
settings
Establish Network Connectivity Manage users and groups
-
8/3/2019 Computer Science net Java, Ccna, Linux}
14/36
www.intechlogies.com
Administer Users and Groups Understand Linux file system hierarchy and pathnames; manage files from
the command line
Manage Files from the Command Line Understand Linux file access mechanisms; manage file access from the GUI
and the command line
Secure Linux File Access Share and connect to a desktop; use SSH and rsync
Administer Remote Systems Manage services; configure SSH and remote desktops
Configure General Services Manage file system attributes and swap space
Manage Physical Storage II Install Red Hat Enterprise Linux and configure the system with firstboot
Install Linux Graphically Understand basic virtualization concepts; install and manage virtual machines
Manage Virtual Machines Understand run levels and manage GRUB
Control the Boot Process Deploy an FTP server and a web server
Deploy File Sharing Services Manage a firewall; understand SE Linux concepts and manage SE Linux
Secure Network Services Get a hands-on review of the concepts covered in this course
Comprehensive Review Create and manage kick start configuration files; perform installations using
kick start
-
8/3/2019 Computer Science net Java, Ccna, Linux}
15/36
www.intechlogies.com
RH135 Red Hat System Administration II
Automated Installations of Red Hat Enterprise Linux Access the command line locally and remotely; gain administrative privileges
from the command line
Accessing the Command Line Use hard links, archives and compression, and vim
Intermediate Command Line Tools Use regular expressions to search patterns in files and output; redirect and
pipe output
Regular Expressions, Pipelines, and I/O Redirection Configure network settings; troubleshoot network issues
Network Configuration and Troubleshooting Create and format simple partitions, swap partitions, and encrypted
partitions
Managing Simple Partitions and File systems Implement LVM and LVM snapshots
Managing Flexible Storage with the Logical Volume
Manager (LVM) Implement NFS, CIFS, and autofs
Access Network File Sharing Services; NFS and CIFS Manage user accounts including password aging
Managing User Accounts
Connect to a central LDAP directory service
Network User Accounts with LDAP Manage group memberships, file permissions, and access control lists (ACL)
Controlling Access to Files Activate and deactivate SE Linux; set file contexts; manage SE Linux Booleans
; analyze SE Linux logs
Managing SE Linux Manage software and query information with yum; configure client-side yum
repository files
-
8/3/2019 Computer Science net Java, Ccna, Linux}
16/36
www.intechlogies.com
Installing and Managing Software Managing services; verify connectivity to a service
Managing Installed Services Managing logs with rsyslog and logrotate
Analyzing and Storing Logs Identify and terminate processes, change the priority of a process, and use
cronand at to schedule processes
Managing Processes Understand the boot process and resolve boot problems
System Recovery Techniques List, load, and remove modules; use kernel arguments
Tuning and Maintaining the Kernel Automate system administration tasks utilizing Bash scripts and text-based
tools
Bash Scripting and Tools
Secure files with GnuPG
File Security with GnuPG Use yum plugins to manage packages; understand the design of packages;
build a simple package
Software Management Profile running services, then capture and analyze network traffic
Network Monitoring Configure system to route traffic and customize network parameters with
sysctl
Route Network Traffic Secure network traffic through SSH port forwarding and ip tables
filtering/network address translation (NAT)
Secure Network Traffic Configure an NTP server
-
8/3/2019 Computer Science net Java, Ccna, Linux}
17/36
www.intechlogies.com
NTP Server Configuration Manage local file system integrity; monitor systems over time and system
logging
System Monitoring and Logs Access centralized storage (iSCSI) and encrypt file systems
Centralized and Secure Storage Understand SSL certificates and deploy an SSL-encapsulated web service
SSL-encapsulated Web Services Configure an SMTP server for basic operation (null client, receiving mail,
Smart host relay)
Basic SMTP Configuration Configure a web server with virtual hosts, dynamic content, and
authenticated directories
Web Server Additional Configuration Given a virtualized environment, begin to administrate multiple systems
using prerequisite skills
RH255 Red Hat System Administration III
Getting Started with the Classroom Environment Configure system to use Kerberos to verify credentials and grant privileges via
sudo
Enhance User Security Understand DNS resource records and configure a caching-only name server
Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based
tools
File Security with GnuPG Use yum plugins to manage packages; understand the design of packages;
build a simple package
Software Management Profile running services, then capture and analyze network traffic
-
8/3/2019 Computer Science net Java, Ccna, Linux}
18/36
www.intechlogies.com
Network Monitoring Configure system to route traffic and customize network parameters with
sysctl
Route Network Traffic Secure network traffic through SSH port forwarding and iptables
filtering/network address translation (NAT)
Secure Network Traffic Configure an NTP server
NTP Server Configuration Manage local file system integrity; monitor systems over time and system
logging
System Monitoring and Logs Access centralized storage (iSCSI) and encrypt file systems
Centralized and Secure Storage Understand SSL certificates and deploy an SSL-encapsulated web service
SSL-encapsulated Web Services Configure an SMTP server for basic operation (null client, receiving mail,
smart host relay)
Basic SMTP Configuration Configure a web server with virtual hosts, dynamic content, and
authenticated directories
Web Server Additional Configuration Given a virtualized environment, begin to administrate multiple systems
using prerequisite skills
Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail,
smarthost relay)
File Sharing with NFS Configure file sharing between hosts with NFS
File Sharing with CIFS
Configure file and print sharing between hosts with CIFS
-
8/3/2019 Computer Science net Java, Ccna, Linux}
19/36
www.intechlogies.com
File Sharing with FTP Configure file sharing with anonymous FTP
Troubleshooting Boot Process
Understand the boot process and recover unbootable systems with rescuemode
-
8/3/2019 Computer Science net Java, Ccna, Linux}
20/36
-
8/3/2019 Computer Science net Java, Ccna, Linux}
21/36
www.intechlogies.com
IMPLEMENT AN IP ADDRESSING SCHEME AND IP SERVICES TOMEET
NETWORK REQUIREMENTS IN A MEDIUM-SIZE ENTERPRISEBRANCH
OFFICE NETWORK Describe the operation and benefits of using private and public IP addressing Explain the operation and benefits of using DHCP and DNS Configure, verify and troubleshoot DHCP and DNS operation on a router Implement static and dynamic addressing services for hosts in a LAN
environment
Calculate and apply an addressing scheme including VLSM IP addressing to anetwork
Determine the appropriate classless addressing scheme using VLSM andsummarizationto satisfy addressing requirements in a LAN/WAN
environment
Describe IPv6 addresses Identify and correct common problems associated with IP addressing and
hostConfigurations
CONFIGURE, VERIFY, AND TROUBLESHOOT BASIC ROUTEROPERATION
AND ROUTING ON CISCO DEVICES Describe basic routing concepts (including: packet forwarding, router lookup
process)
Select the appropriate media, cables, ports, and connectors to connectrouters toother network devices and hosts
Configure, verify, and troubleshoot RIPv2 Connect, configure, and verify operation status of a device interface Verify device configuration and network connectivity using ping, trace
route,telnet, SSH or other utilities
Manage IOS configuration files. (including: save, edit, upgrade, restore) Manage Cisco IOS Compare and contrast methods of routing and routing protocols Configure, verify, and troubleshoot OSPF Configure, verify, and troubleshoot EIGRP Verify network connectivity (including: using ping, trace route, and telnet or
SSH) Troubleshoot routing issues Verify router hardware and software operation using SHOW & DEBUG
commands.
Implement basic router securityEXPLAIN AND SELECT THE APPROPRIATE ADMINISTRATIVE
TASKSREQUIRED FOR A WLAN Describe standards associated with wireless media
including: IEEE, WI-FI Alliance, ITU/FCC)
Identify and describe the purpose of the components in a small wirelessnetwork. (Including: SSID, BSS, ESS)
-
8/3/2019 Computer Science net Java, Ccna, Linux}
22/36
www.intechlogies.com
Identify the basic parameters to configure on a wireless network to ensurethat
devices connect to the correct access point
Compare and contrast wireless security features and capabilities of WPAsecurity
(including: open, WEP, WPA-1/2)
IMPLEMENT, VERIFY, AND TROUBLESHOOT NAT AND ACLS INA
MEDIUM-SIZE ENTERPRISE BRANCH OFFICE NETWORK Describe the purpose and types of ACLs Configure and apply ACLs based on network filtering requirements using CLI Configure and apply an ACL to limit telnet and SSH access to the router using
CLI
Verify and monitor ACLs in a network environment Troubleshoot ACL issues Explain the basic operation of NAT Configure NAT (Static , Dynamic , Overload )for given network requirements
using CLI
IMPLEMENT, VERIFY, AND TROUBLESHOOT NAT AND ACLS IN A MEDIUM-SIZE ENTERPRISE BRANCH OFFICE NETWORK Troubleshoot NAT issues
IMPLEMENT AND VERIFY WAN LINKS Describe different methods for connecting to a WAN Configure and verify a basic WAN serial connection Configure and verify Frame Relay on Cisco routers Troubleshoot WAN implementation issues Configure and verify a PPP connection between Cisco routers
Labs:Lab 1: Build a network
Lab 3: Router initial configuration and enable IP
Lab 4: Verify initial configuration using setup command
Lab 6: Command history and editing featuresLab 7: Examine Router Elements
Lab 8: Using Cisco Discover Protocol
Lab 9: Copy and manipulate configuration files
Lab 10: Config passwords/identification/banners
Lab 11: Config Router to be a TFTP Server
Lab 12: Loading the IOS from ROM, TFTP, or flash
Lab 13: Working with an IOS software image
Lab 14: Configure IP Addresses
Lab 15: Configure IP Host Table
Lab 16: Verify IP AddressesLab 17: Add RIP routing protocol to configuration
Lab 18: Add IGRP routing protocol to configuration
-
8/3/2019 Computer Science net Java, Ccna, Linux}
23/36
www.intechlogies.com
Lab 19: Configuring Standard Access-Lists
Lab 20: Configuring Extended Access Lists
Lab 21: Configuring Frame Relay
Lab 22: Monitoring Frame Relay
-
8/3/2019 Computer Science net Java, Ccna, Linux}
24/36
www.intechlogies.com
.NET MODULE
CORE .NET CONCEPTIntroduction
Use of .net D.N.A architecture (One tier, two tier, three tier, n-tier)
The Common Language Run Time Clr Architecture and services Intermediate Language Just in time compiler Disassembling the il code
Syntax and Data Type Language fundamental Data type and control structure Value and ref data type Cts type Conditional operator C# operator Looping syntax Array Structure
OOPs Concepts Classes Encapsulating attribute Define constructor Define method and their type Overloading methods and constructor Define property and their types Invoking property and methods
Events and Delegates Understanding delegates Simple delegate Delegate implementation anonymous methods Multicast delegates Generic delegates Understand events System define events Events process cycle
-
8/3/2019 Computer Science net Java, Ccna, Linux}
25/36
www.intechlogies.com
Event handlers User defined events Creating and binding user events
Inheritance Implementations Inheritance hierarchies Method overloading, overriding and hiding Abstract and seald class Exposing interface Interface polymorphism Class access modifiers Partial class
Collection Array list Stack Queue Hash table
Generics Collection List Dictionary Stacks
Queue
File Handling System io namespace Stream reader and stream writer File class Directory class Path class Reading and writing a file
Forms and Control Building windows application Programming forms and control Constructing MDI forms Implementation of MDI child and parents
Exception Handling Means of bug and exceptions Role of .net exception handling
System level exception Application level exception Try and catch block
-
8/3/2019 Computer Science net Java, Ccna, Linux}
26/36
www.intechlogies.com
Finally block Throw exception on request Costume exception
Multithreading Understanding multithreading process The system threading namespace The thread and the thread start class Thread life cycle Thread safety concepts Thread synchronization Understanding thread pool Understanding role of thread background worker component
Serialization Understand object serialization Serialization formats (Binary, Soap formatter and XML serializar)
Assembly And Deployment Role of .net assembly Building and consume a single/ multi file assembly Private assembly Shared assembly Creating multiple version of a single assembly Removing DLL hell problem
Reflection System reflection namespace Core reflection classes Accessing assembly through reflection Method info Member info Property info Browsing and querying members Invoking methods and property and runtime Reflection on shared assembly
Remoting Introduction of remoting Remoting architecture and scenario Creating .net remoting object Hosting a remort object Activation type (Singleton, single call) Creating channels
-
8/3/2019 Computer Science net Java, Ccna, Linux}
27/36
www.intechlogies.com
ADO .NET
Evaluation of ADO Difference between ADO and ADO.Net Providers Connected and disconnected architectures
Ado .net Structure The connection object Command object Dataset object Data reader object Data adapter object
Working with Dataset Creating tables in dataset Data column, row and table Updating, Inserting and modification in data table Changing data base using command builder Working with command and connection
Command and Connection Classes Implementation and difference of execute Non-query and execute scalar Executing stored procedure Creating parameter and sql injection
Data Reader Reading data in connected environment Moving and accessing value of record Execute reader
Data View Row filter Sorting Update, insert and delete via data view
Data Relation Creating relations Applying relation on data set
Adding Constraints Foreign key constraints Unique constraints Define primary key
-
8/3/2019 Computer Science net Java, Ccna, Linux}
28/36
www.intechlogies.com
Transactions Introduction of transaction (ACID) Transaction class Commit and rollback actions
Implementation of save point
ASP.NET
Introduction to ASP.NET Need of web application Http protocol Static and dynamic page Concept working of lis and browser Difference between asp and asp.net
Introduction to Html Creating simple html page Html tags Hosting a html page Lis virtual directory Request transfer throws Get and Post methods
Server Pages Using ASP.NET
Creating server pages Understanding page life cycle Handling page requesting Http response object Auto event wireup Tracing and debugging asp.net page
State Management Http cookies Cookie creation Scope of cookie and their merits
Http Session Session clean-up and creation Implementation session setting in web.config file Session state using sql server Session state using state service
Http Application Understand application life cycle Implementation and use of application object Working with Global.net
-
8/3/2019 Computer Science net Java, Ccna, Linux}
29/36
www.intechlogies.com
Query String Methods Implementation of query string Transfer value through query string Getting value by request object Scope
State Management Using Post Back URL Context handler Class Is cross post back Page object working Previous page process
View State Understanding view state Store and retrieve value from view state
State Management Using Hidden Field And Profile Creating profile Using resources namespace Reading and writing value in profile
Server And Validation Controls
Text box, Combo box, List box and checkbox Validation controls Working with range, regular expression and compare Use control validate property Custom validator control Implementation of client and server side validation
Data Bind Controls Working with repeater control Working with data list control Working with grid view control Working with form view control Working with details view control Working with navigation control
Navigation Control Site map Use of site map Binding a site map Tree view Property of tree view
-
8/3/2019 Computer Science net Java, Ccna, Linux}
30/36
www.intechlogies.com
Define a node relation Binding with site map Property of menu view Define an items relation
Caching Types of caching Page fragment caching Caching with http cache policy class Post cache substitution Data caching
Skins Theme and CSS Creating style sheet Apply style sheet Creating rules Creating element settings Theme folder and skin Handling theme conflict Using CSS in theme Apply dynamic theme
Master Pages
Creating master page Default contents Master page with CSS and table layout Applying master page through configuration file Nested master page Master page and relative path
Exception Handling In Web Application Code level handling Using try, Catch and finally Page level handling Application level handling Server object exception methods Exception handling in global .ASAX Custom error handling Setting costume error tag
Globalization And Localization Introduction of multilingual application
Understanding culture and UL culture Culture info class Overriding initialize culture
-
8/3/2019 Computer Science net Java, Ccna, Linux}
31/36
www.intechlogies.com
Auto attribute Local and global resources
Web Services Introduction of web service The SOAP architecture SOAP and web service SOAP essentials Web service attribute WSDL documentations Disco and disco map file Transaction in web service Publishing and consuming a web service
Ajax Introduction to Ajax Creating Ajax enabled website Understanding and working with update panel Role of script manager Creating a Ajax enabled web service
Security and Windows Types of security Define form base security Form authentication class and their methods Declare user into web configuration Apply password formats Window based security IIs setting regarding windows authentication
Passport Concept of passport security Passport url
Login Controls Creating the data source Configure connection string and membership provider Creating a authentication user Login, login status, login view control Password recovery control Create user control
-
8/3/2019 Computer Science net Java, Ccna, Linux}
32/36
www.intechlogies.com
XML Introduction of XML XML documentation structure Wff format of XML
Parsers dom and sax XML classes Reading and writing XML file
ADVANCE .NET
Understanding Lambda Expressions
Object Initialization and Anonymous Types
Extension methods
LINQ Understanding the role of Linq Linq query expression Linq and non generic collection Linq to datasheet Linq to sql
Windows Communication Foundation (W.C.F) W.C.F project template Composition of W.C.F Building and hosting W.C.F service Building a W.C.F client application
Window Workflow Foundation (W.W.F) W.F.F assembly, namespace and project Building workflow enable application The WF engine hosting Web service with work flow
.NET 2010Language and IDE Features
Examine visual studio 2010 code editor UI improvements : from intellisense to zoom, Learn new language features
including dynamic language support, Lambda expression improvements,
Named and optional parameters in c# 4.0
Parallel computing Add simple parallel support Task parallel library Plinq
-
8/3/2019 Computer Science net Java, Ccna, Linux}
33/36
www.intechlogies.com
Examine variance (covariance and contra variance) and hoe these featuremake interface work the way you always thought they should
In-process side-by-side executionData Enhancements: The Entity Framework (E.D.M)
ASP .net 4.0 dynamic data support Overview of entity framework How to create an entity data module Various techniques for using linq to entities to query data in a sql server data
base
Overview of ADO .net data services Create and call ADO .net service
ASP .NET Web Forms Improvements (M.V.C 2.0)
Client data control Client templates Client data context ASP .NET AJAX 4.0: New AJAX support for data driven web Visual web designer enhancements ASP .NET core services, web configuration file verification Output caching URL routing Named parameter syntax Deploy web application using new visual studio 2010 features
WPF Overview Examine the various flavors of WPF application Working with window and application class types
WPF Control and its feature Survey the core WPF control types Review the WPF control programming model Understand the role of WPF control commands Work with the WPF ink API Use Microsoft expression blend to build user interface WPF Layouts And Style Support
WPF Control Extensions Design template Custom control Content extension WPF commands
-
8/3/2019 Computer Science net Java, Ccna, Linux}
34/36
www.intechlogies.com
WPF data binding Code behind MVVM pattern
THE SQL SERVERMANAGEMENT STUDIO
Query Window The foundation statements of T_SQL Started with SELECT statement Adding Data with the INSERT statement Changing what you've Got with the UPDATE statement
Joins Inner joins Outer joins Cross joins
The Union
The Create Statement Create database Create table
The Alter Statement Alter database Alter table
The Drop Statement
Constraints Types of constraints Domain constraints Entity constraints Referential integrity constraints Constraints naming Key constraints Primary key constraints Foreign key constraints Unique constraints Check constraints Default constraints Disabling constraints
-
8/3/2019 Computer Science net Java, Ccna, Linux}
35/36
www.intechlogies.com
Rules Defaults Determining which tables and datatypes Use a given rule or default
Triggers for Data integrity Choosing what to use
Adding More To Our Queries What is a subquery? Building a nested subquery Correlated subqueries How correlated subqueries work Correlated subqueries in the Where clause Dealing with null data- the isnull function derived tables The exists operator Using exists in other ways Mixing data types: cast and convert
Understanding Indexes How data is accessed in SQL server Creating, altering, and Dropping indexes The create index statement
Views Simple views Views as filters More complex views Editing views with T-SQL Dropping views
Stored Procedures Basic syntax Changing stored procedures with Alter Dropping sprocs Handling errors
Transactions Begin tran Commit tran Rollback tran Save tran
Triggers What is a trigger? With encryption 0
-
8/3/2019 Computer Science net Java, Ccna, Linux}
36/36
The for/after vs the instead of clause With append Not for replication Using triggers for data integrity rules Dealing with requirements sourced from other tables Using triggers to check the delta of an update using triggers for custom error messages Other common uses of triggers Other triggers issues Triggers can be nested Triggers can be recursive Dropping triggers
Using XML
Retrieving XML by using FOR XML Shredding XML by using OPEN XML Introducing Xquery Using the XML data type
top related