Computer Science net Java, Ccna, Linux}

download Computer Science net Java, Ccna, Linux}

of 36

Transcript of Computer Science net Java, Ccna, Linux}

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    1/36

    www.intechlogies.com

    JAVA MODULE

    J2SE (JAVA 2 STANDERD EDITION)

    Introduction To Java Understanding Requirement: Why Java Why Java is important to the Internet

    Introduction To Java Virtual Machine Java Virtual Machine Architecture Class loading process by Class loaders

    Bootstrap Loader Extension Loader System Loader

    Relationship between Loaders Role of Just in Time Compiler (JIT) Execution Engine

    An Overview Of Java And Buzzwords Data Types, Variables ad Arrays Operators Control statements Object oriented Paradigms Abstraction The Three OOP Principles (Encapsulation, Inheritance and Polymorphism)

    Java Classes And OOP Implementation Class Fundamentals Command Line Arguments Learning static initializer Declaration of Objects Instance Variable Hiding Overloading and Overriding of Methods Up casting Down casting Understanding of Access Controls Private, public and protected Learning Nested and Inner Classes Dynamic method Dispatching Using Abstract Classes Using final to prevent Overriding & Inheritance Garbage Collection

    Packages And Interfaces

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    2/36

    www.intechlogies.com

    Defining a Package Understanding CLASSPATH Access Protection Importing Packages Defining and implementing an Interface Abstract classes Vs Interfaces Adapter Classes Anonymous Classes

    Exception Handling Fundamentals of exception handling Types of exceptions Learning exception handlers Try and catch Multiple catch clauses Nested try statements Throw, throws and finally Creating custom exceptions Assertion

    String Handling Learning String Operations Learning Character Extraction Learning String Comparison Understanding of String Buffer Class String builder Class

    New in JDK 5/6 Premain Method, Object size Auto boxing, UN boxing Java Compiler API Generics Annotations

    Vargs Static Import For Each ENUM

    Windows Programming Swing Introduction to JFC Controls Event Delegation Model Event Classes Event Listeners

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    3/36

    www.intechlogies.com

    Applet Applet Basics Architecture and Skelton Simple Applet Display Methods The Html Applet Tag Inter Applet Communication Trusted Applet (Applet with Database)

    Multi-threaded Programming The Java Thread Model Creating a Thread: Extending Thread Implementing Runnable Creating Multiple Threads and Context Switching Synchronization: Methods and Statement Inter-thread Communication Thread Local Dead Lock Thread pool Executer Class Shutdown Hookup Re-entrant Locking

    I/O Streams File Handling Binary Streams Character Streams Data Streams Serialization Scanner Stream Tokenizer Gzip Output Stream Class Data Encryption & Decryption

    Networking URL, Inet Address Socket and Server Socket Datagram Socket, URL connection Socket Factories

    Reflection API Determining the class of an Object Getting information about Classs modifiers, fields, methods, constructors

    and super classes

    Finding out constant and method declaration belong to an interface Creating an instance of a class whose name is not known until runtime Getting and setting value of an object if the method is unknown until runtime

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    4/36

    www.intechlogies.com

    Invoking a method of an object if the method id unknown until runtime Creating a new array whose size and component type are not know until

    runtime

    Invoking Private Members of a class

    ADVANCE JAVE & J2EE (JAVA 2 ENTERPRISE EDITION)

    Collection Framework The Collection Interfaces(List, Set, Sorted Set) The Collection Classes (Array List, Linked List, Hash Set, Tree Set) Accessing a Collection via an Iterator Working with Maps Working with Comparators, Comparable The Collection Algorithms The Legacy Classes and Interfaces (Enumeration, Vector, Dictionary, Hash

    table)

    Date and Time HandlingSystem Properties & Internationalization

    Usage of Property file Define the Locale Resource Bundle Fetching text from Resource Bundle

    Remote Method Invocation (RMI) Distributed Applications RMI Architecture Implementation Call-back Mechanism

    Database Programming Using JDBC JDBC Drivers 4 Ways of Getting Database Connection Statements, Callable statement, prepared statement Metadata, Result Set Metadata, Database Metadata Scrollable & Updatable Result Set Batch Updates Data Source & Connection Pooling Row sets Traction (Commit, Rollback, save point)

    Introduction to J2EE Architecture

    Single, Two, Three, N Tier Web Components

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    5/36

    www.intechlogies.com

    Business Components Container Types Container Services Java Naming and Directory Interface Java Transaction Service Java Messaging Service Java Authentication &authorization Service

    Introduction to UML User Cases Diagrams

    Introduction to XML Document Type Definition (DTD) XML Parsers (Document Object Module Simple API for XML (SAX) )

    Java Servlet Introduction to Web Programming Advantages of Servlets Servlet Lifecycle Request Dispatching Session Tracking Event Listeners Filters File uploading/downloading Security

    Java Server Pages (JSP) & JSTL JSP Architecture JSP Elements JSP Objects Custom Tags Using tags of JSTL

    Expression Language Exception Handling in JSP

    Enterprise Java Beans (EJB 3.0) JAVA Persistence API Introduction Architecture Types of EJB

    Session Beans

    Introduction Static management

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    6/36

    www.intechlogies.com

    Life Cycle Stateless State full

    Entity Beans Introduction Persistence Life Cycle Types Container Managed Persistent (CMP)2.0 Introduction Primary Key Class EJB Methods EJB QL Syntax Clauses Bean Management Persistent (BMP) Introduction Implementation EJB Relationships

    Message Drive Beans & JMS Messaging Overview Messaging Models Point to Point Model Topic Subscriber Model JMS Implementation

    Transactions Introduction ACID Properties Transaction Requirements Container Managed Transactions Bean Managed Transactions Distributed Transactions Two Phase Commit

    J2EE Design Patterns Why Design Patterns Front Controller Composite View Session Faade Service Locator Data Access Object Value Object

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    7/36

    www.intechlogies.com

    Singleton Pattern, Factory PatternJava Mail

    Email System and Protocols Architecture Sending Mails Receiving Mails Handling Attachments Replying & Forwarding

    Introduction to Web Services A Conceptual Overview of Web Services Web Services Requirements SOAP WSDL UDDI

    STRUTS 2.0 CURRICULAM

    Struts 2 Framework MVC/Model2 Filter Dispatcher Action Result Interceptors /Value Stack, OGNL & Data Transfer Action Context

    Working With Struts 2 Actions Introducing Struts 2 actions Packaging your actions Implementing actions

    Transferring data onto objects File uploading: a case study

    Adding Workflow With Interceptors Why intercept requests? Interceptors in action Surveying the built-in Struts 2 interceptors Declaring interceptors Building your own interceptors

    Data Transfer: OGNL And Type Conversion Data transfer and type conversion:

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    8/36

    www.intechlogies.com

    OGNL and Struts 2 Built-in type converters Customizing type conversion

    Building A View: Tags An overview of Struts tags Data tags Control tags Miscellaneous tags Using JSTL and other native tags A brief primer for the ONGL expression language

    UI Component Tags Why we need UI component tags Tags, templates, and themes UI Component tag reference

    Integrating With Spring And Hibernate/JPA Why use spring with Struts 2? Adding spring to Struts 2 Why use the Java Persistence API with Struts 2?

    Exploring The Validation Framework Getting familiar with the validation framework Wiring your action for validation Wiring a custom validator Validation framework advanced topics

    Understanding Internationalization The Struts 2 framework and Java i18n A Struts 2 i18n demo Struts 2 i18n: the details Overriding the frameworks default locale determination

    DATABASE CURRICULAM

    SQL Basic Introduction Select Where Insert Update Delete

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    9/36

    www.intechlogies.com

    SQL Advanced SQL Order By SQL AND & OR SQL In

    SQL Between SQL Join SQL Union SQL Create SQL Drop SQL Alter Decode SQL SQL Group By SQL Select Into SQL Create View Creating Index

    SQL Functions Aggregate Functions Scalar Functions

    Working with dates

    Introduction to PL

    Working with Procedures and Functions

    Working with Triggers

    Working with Sequences

    HIBERNATE 3.0

    Introduction to Mapping Objects to Relational Databases Serialization 2 XML 2 Object oriented database systems Mapping

    Introduction to Hibernate Hibernate architecture Hibernate configuration Hibernates support for other technologies Installing hibernate A Hello World stand alone application

    Creating Persistent Classes Mapping a basic Java class Mapping a class with binary data Mapping a serializable class

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    10/36

    www.intechlogies.com

    Mapping a class with data/calendar attributes Mapping read only class Mapping classes using versioning/timestamps

    Mapping Inheritance With Java Classes Tableper-class hierarchy mapping Table-per-subclass hierarchy mapping Table-per-concrete-class hierarchy mapping Persisting interfaces

    Working With Collections Associations Lazy initializations Mapping maps/sorted maps Mapping set/sorted sets Mapping lists Mapping arrays Mapping a bidirectional association

    Using Persistent Objects Persisting objects Loading data into an object Updating and finding objects

    Scalar Queries And Hibernate Query Language Queries Named queries SQL queries Hibernate query language

    Hibernate Caching Setting up a session factory cache Using the persistent object cache

    Using the query cache Setting up EH cache

    Hibernate Transaction And Locking Configurations Database support Using transactions The transaction API Transaction example using Oracle Locking

    Hibernate And Xdoclet

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    11/36

    www.intechlogies.com

    Introduction to XDoclet Using Xdoclet with hibernate Hibernate XDoclet tags and description

    Hibernate And Eclipse Hibernator Hiber Clipse hibernate synchronizer

    Integration Of Struts 2, Hibernate And Spring Struts and Hibernate Spring and Hibernate Struts, Hibernate and Spring

    SPRING 2.5

    What Is Spring Spring modules Understanding dependency injection Applying aspects-oriented programming

    Basic Bean Wiring Containing your beans Creating beans Injecting into bean properties Auto wiring Controlling bean creation

    Advanced Bean Wiring Declaring parent and child beans Applying method injection

    Injecting non-Spring beans Registering custom property editors

    Advising Beans Introducing AOP Creating classic Spring aspects Creating advice Defining point cuts and advisors Using proxy factory beans Autoproxying

    Hitting The Database

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    12/36

    www.intechlogies.com

    Learning Springs data access philosophy Configuring a data source Using JDBC with Spring Working with JDBC templates Using Springs DAO support classes for JDBC Integrating hibernating with Spring Caching

    Spring And POJO-Based Remote Services An overview of Spring remoting Working with RMI Remoting with hessian and burlap Using Springs http Invoker Spring and Web services

    Building Contract-First Web Services In Spring Introducing Spring-WS Defining the contract (first) Handling messages with service endpoints Wiring it all together Consuming Spring-WS web services

    Spring And Enterprise Java Beans Wiring EJBs in Spring Spring and EJB3

    Handling Web Requests Getting started with Spring MVC Mapping requests to controllers Handling requests with controllers Handling exceptions

    Integrating With Other Frameworks

    Using Spring with Struts Registering the Spring plug-in with Struts Writing Spring ware Struts action Delegating to Spring-configured actions What about Struts 2? Working Spring into web work 2/Struts 2

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    13/36

    www.intechlogies.com

    LINUX MODULE

    RH124 Red Hat System Administration

    Get Started with the GNOME Graphical Desktop Get started with GNOME and edit text files with gedit

    Manage Files Graphically with Nautilus Access documentation, both locally and online

    Get Help in a Graphical Environment Configure the date and time and configure a printer

    Configure Local Services Understand basic disk concepts and manage system disks

    Manage Physical Storage I Understand logical volume concepts and manage logical volumes

    Manage Logical Volumes Manage CPU, memory, and disk utilization

    Monitor System Resources Manage system software locally and using Red Hat Network (RHN)

    Manage System Software Understand basic shell concepts, execute simple commands, and use basic

    job control techniques

    Get Started with Bash Use man and info pages and find documentation in /usr/share/doc

    Get Help in a Textual Environment Understand basic network concepts; configure, manage, and test network

    settings

    Establish Network Connectivity Manage users and groups

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    14/36

    www.intechlogies.com

    Administer Users and Groups Understand Linux file system hierarchy and pathnames; manage files from

    the command line

    Manage Files from the Command Line Understand Linux file access mechanisms; manage file access from the GUI

    and the command line

    Secure Linux File Access Share and connect to a desktop; use SSH and rsync

    Administer Remote Systems Manage services; configure SSH and remote desktops

    Configure General Services Manage file system attributes and swap space

    Manage Physical Storage II Install Red Hat Enterprise Linux and configure the system with firstboot

    Install Linux Graphically Understand basic virtualization concepts; install and manage virtual machines

    Manage Virtual Machines Understand run levels and manage GRUB

    Control the Boot Process Deploy an FTP server and a web server

    Deploy File Sharing Services Manage a firewall; understand SE Linux concepts and manage SE Linux

    Secure Network Services Get a hands-on review of the concepts covered in this course

    Comprehensive Review Create and manage kick start configuration files; perform installations using

    kick start

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    15/36

    www.intechlogies.com

    RH135 Red Hat System Administration II

    Automated Installations of Red Hat Enterprise Linux Access the command line locally and remotely; gain administrative privileges

    from the command line

    Accessing the Command Line Use hard links, archives and compression, and vim

    Intermediate Command Line Tools Use regular expressions to search patterns in files and output; redirect and

    pipe output

    Regular Expressions, Pipelines, and I/O Redirection Configure network settings; troubleshoot network issues

    Network Configuration and Troubleshooting Create and format simple partitions, swap partitions, and encrypted

    partitions

    Managing Simple Partitions and File systems Implement LVM and LVM snapshots

    Managing Flexible Storage with the Logical Volume

    Manager (LVM) Implement NFS, CIFS, and autofs

    Access Network File Sharing Services; NFS and CIFS Manage user accounts including password aging

    Managing User Accounts

    Connect to a central LDAP directory service

    Network User Accounts with LDAP Manage group memberships, file permissions, and access control lists (ACL)

    Controlling Access to Files Activate and deactivate SE Linux; set file contexts; manage SE Linux Booleans

    ; analyze SE Linux logs

    Managing SE Linux Manage software and query information with yum; configure client-side yum

    repository files

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    16/36

    www.intechlogies.com

    Installing and Managing Software Managing services; verify connectivity to a service

    Managing Installed Services Managing logs with rsyslog and logrotate

    Analyzing and Storing Logs Identify and terminate processes, change the priority of a process, and use

    cronand at to schedule processes

    Managing Processes Understand the boot process and resolve boot problems

    System Recovery Techniques List, load, and remove modules; use kernel arguments

    Tuning and Maintaining the Kernel Automate system administration tasks utilizing Bash scripts and text-based

    tools

    Bash Scripting and Tools

    Secure files with GnuPG

    File Security with GnuPG Use yum plugins to manage packages; understand the design of packages;

    build a simple package

    Software Management Profile running services, then capture and analyze network traffic

    Network Monitoring Configure system to route traffic and customize network parameters with

    sysctl

    Route Network Traffic Secure network traffic through SSH port forwarding and ip tables

    filtering/network address translation (NAT)

    Secure Network Traffic Configure an NTP server

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    17/36

    www.intechlogies.com

    NTP Server Configuration Manage local file system integrity; monitor systems over time and system

    logging

    System Monitoring and Logs Access centralized storage (iSCSI) and encrypt file systems

    Centralized and Secure Storage Understand SSL certificates and deploy an SSL-encapsulated web service

    SSL-encapsulated Web Services Configure an SMTP server for basic operation (null client, receiving mail,

    Smart host relay)

    Basic SMTP Configuration Configure a web server with virtual hosts, dynamic content, and

    authenticated directories

    Web Server Additional Configuration Given a virtualized environment, begin to administrate multiple systems

    using prerequisite skills

    RH255 Red Hat System Administration III

    Getting Started with the Classroom Environment Configure system to use Kerberos to verify credentials and grant privileges via

    sudo

    Enhance User Security Understand DNS resource records and configure a caching-only name server

    Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based

    tools

    File Security with GnuPG Use yum plugins to manage packages; understand the design of packages;

    build a simple package

    Software Management Profile running services, then capture and analyze network traffic

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    18/36

    www.intechlogies.com

    Network Monitoring Configure system to route traffic and customize network parameters with

    sysctl

    Route Network Traffic Secure network traffic through SSH port forwarding and iptables

    filtering/network address translation (NAT)

    Secure Network Traffic Configure an NTP server

    NTP Server Configuration Manage local file system integrity; monitor systems over time and system

    logging

    System Monitoring and Logs Access centralized storage (iSCSI) and encrypt file systems

    Centralized and Secure Storage Understand SSL certificates and deploy an SSL-encapsulated web service

    SSL-encapsulated Web Services Configure an SMTP server for basic operation (null client, receiving mail,

    smart host relay)

    Basic SMTP Configuration Configure a web server with virtual hosts, dynamic content, and

    authenticated directories

    Web Server Additional Configuration Given a virtualized environment, begin to administrate multiple systems

    using prerequisite skills

    Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail,

    smarthost relay)

    File Sharing with NFS Configure file sharing between hosts with NFS

    File Sharing with CIFS

    Configure file and print sharing between hosts with CIFS

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    19/36

    www.intechlogies.com

    File Sharing with FTP Configure file sharing with anonymous FTP

    Troubleshooting Boot Process

    Understand the boot process and recover unbootable systems with rescuemode

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    20/36

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    21/36

    www.intechlogies.com

    IMPLEMENT AN IP ADDRESSING SCHEME AND IP SERVICES TOMEET

    NETWORK REQUIREMENTS IN A MEDIUM-SIZE ENTERPRISEBRANCH

    OFFICE NETWORK Describe the operation and benefits of using private and public IP addressing Explain the operation and benefits of using DHCP and DNS Configure, verify and troubleshoot DHCP and DNS operation on a router Implement static and dynamic addressing services for hosts in a LAN

    environment

    Calculate and apply an addressing scheme including VLSM IP addressing to anetwork

    Determine the appropriate classless addressing scheme using VLSM andsummarizationto satisfy addressing requirements in a LAN/WAN

    environment

    Describe IPv6 addresses Identify and correct common problems associated with IP addressing and

    hostConfigurations

    CONFIGURE, VERIFY, AND TROUBLESHOOT BASIC ROUTEROPERATION

    AND ROUTING ON CISCO DEVICES Describe basic routing concepts (including: packet forwarding, router lookup

    process)

    Select the appropriate media, cables, ports, and connectors to connectrouters toother network devices and hosts

    Configure, verify, and troubleshoot RIPv2 Connect, configure, and verify operation status of a device interface Verify device configuration and network connectivity using ping, trace

    route,telnet, SSH or other utilities

    Manage IOS configuration files. (including: save, edit, upgrade, restore) Manage Cisco IOS Compare and contrast methods of routing and routing protocols Configure, verify, and troubleshoot OSPF Configure, verify, and troubleshoot EIGRP Verify network connectivity (including: using ping, trace route, and telnet or

    SSH) Troubleshoot routing issues Verify router hardware and software operation using SHOW & DEBUG

    commands.

    Implement basic router securityEXPLAIN AND SELECT THE APPROPRIATE ADMINISTRATIVE

    TASKSREQUIRED FOR A WLAN Describe standards associated with wireless media

    including: IEEE, WI-FI Alliance, ITU/FCC)

    Identify and describe the purpose of the components in a small wirelessnetwork. (Including: SSID, BSS, ESS)

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    22/36

    www.intechlogies.com

    Identify the basic parameters to configure on a wireless network to ensurethat

    devices connect to the correct access point

    Compare and contrast wireless security features and capabilities of WPAsecurity

    (including: open, WEP, WPA-1/2)

    IMPLEMENT, VERIFY, AND TROUBLESHOOT NAT AND ACLS INA

    MEDIUM-SIZE ENTERPRISE BRANCH OFFICE NETWORK Describe the purpose and types of ACLs Configure and apply ACLs based on network filtering requirements using CLI Configure and apply an ACL to limit telnet and SSH access to the router using

    CLI

    Verify and monitor ACLs in a network environment Troubleshoot ACL issues Explain the basic operation of NAT Configure NAT (Static , Dynamic , Overload )for given network requirements

    using CLI

    IMPLEMENT, VERIFY, AND TROUBLESHOOT NAT AND ACLS IN A MEDIUM-SIZE ENTERPRISE BRANCH OFFICE NETWORK Troubleshoot NAT issues

    IMPLEMENT AND VERIFY WAN LINKS Describe different methods for connecting to a WAN Configure and verify a basic WAN serial connection Configure and verify Frame Relay on Cisco routers Troubleshoot WAN implementation issues Configure and verify a PPP connection between Cisco routers

    Labs:Lab 1: Build a network

    Lab 3: Router initial configuration and enable IP

    Lab 4: Verify initial configuration using setup command

    Lab 6: Command history and editing featuresLab 7: Examine Router Elements

    Lab 8: Using Cisco Discover Protocol

    Lab 9: Copy and manipulate configuration files

    Lab 10: Config passwords/identification/banners

    Lab 11: Config Router to be a TFTP Server

    Lab 12: Loading the IOS from ROM, TFTP, or flash

    Lab 13: Working with an IOS software image

    Lab 14: Configure IP Addresses

    Lab 15: Configure IP Host Table

    Lab 16: Verify IP AddressesLab 17: Add RIP routing protocol to configuration

    Lab 18: Add IGRP routing protocol to configuration

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    23/36

    www.intechlogies.com

    Lab 19: Configuring Standard Access-Lists

    Lab 20: Configuring Extended Access Lists

    Lab 21: Configuring Frame Relay

    Lab 22: Monitoring Frame Relay

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    24/36

    www.intechlogies.com

    .NET MODULE

    CORE .NET CONCEPTIntroduction

    Use of .net D.N.A architecture (One tier, two tier, three tier, n-tier)

    The Common Language Run Time Clr Architecture and services Intermediate Language Just in time compiler Disassembling the il code

    Syntax and Data Type Language fundamental Data type and control structure Value and ref data type Cts type Conditional operator C# operator Looping syntax Array Structure

    OOPs Concepts Classes Encapsulating attribute Define constructor Define method and their type Overloading methods and constructor Define property and their types Invoking property and methods

    Events and Delegates Understanding delegates Simple delegate Delegate implementation anonymous methods Multicast delegates Generic delegates Understand events System define events Events process cycle

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    25/36

    www.intechlogies.com

    Event handlers User defined events Creating and binding user events

    Inheritance Implementations Inheritance hierarchies Method overloading, overriding and hiding Abstract and seald class Exposing interface Interface polymorphism Class access modifiers Partial class

    Collection Array list Stack Queue Hash table

    Generics Collection List Dictionary Stacks

    Queue

    File Handling System io namespace Stream reader and stream writer File class Directory class Path class Reading and writing a file

    Forms and Control Building windows application Programming forms and control Constructing MDI forms Implementation of MDI child and parents

    Exception Handling Means of bug and exceptions Role of .net exception handling

    System level exception Application level exception Try and catch block

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    26/36

    www.intechlogies.com

    Finally block Throw exception on request Costume exception

    Multithreading Understanding multithreading process The system threading namespace The thread and the thread start class Thread life cycle Thread safety concepts Thread synchronization Understanding thread pool Understanding role of thread background worker component

    Serialization Understand object serialization Serialization formats (Binary, Soap formatter and XML serializar)

    Assembly And Deployment Role of .net assembly Building and consume a single/ multi file assembly Private assembly Shared assembly Creating multiple version of a single assembly Removing DLL hell problem

    Reflection System reflection namespace Core reflection classes Accessing assembly through reflection Method info Member info Property info Browsing and querying members Invoking methods and property and runtime Reflection on shared assembly

    Remoting Introduction of remoting Remoting architecture and scenario Creating .net remoting object Hosting a remort object Activation type (Singleton, single call) Creating channels

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    27/36

    www.intechlogies.com

    ADO .NET

    Evaluation of ADO Difference between ADO and ADO.Net Providers Connected and disconnected architectures

    Ado .net Structure The connection object Command object Dataset object Data reader object Data adapter object

    Working with Dataset Creating tables in dataset Data column, row and table Updating, Inserting and modification in data table Changing data base using command builder Working with command and connection

    Command and Connection Classes Implementation and difference of execute Non-query and execute scalar Executing stored procedure Creating parameter and sql injection

    Data Reader Reading data in connected environment Moving and accessing value of record Execute reader

    Data View Row filter Sorting Update, insert and delete via data view

    Data Relation Creating relations Applying relation on data set

    Adding Constraints Foreign key constraints Unique constraints Define primary key

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    28/36

    www.intechlogies.com

    Transactions Introduction of transaction (ACID) Transaction class Commit and rollback actions

    Implementation of save point

    ASP.NET

    Introduction to ASP.NET Need of web application Http protocol Static and dynamic page Concept working of lis and browser Difference between asp and asp.net

    Introduction to Html Creating simple html page Html tags Hosting a html page Lis virtual directory Request transfer throws Get and Post methods

    Server Pages Using ASP.NET

    Creating server pages Understanding page life cycle Handling page requesting Http response object Auto event wireup Tracing and debugging asp.net page

    State Management Http cookies Cookie creation Scope of cookie and their merits

    Http Session Session clean-up and creation Implementation session setting in web.config file Session state using sql server Session state using state service

    Http Application Understand application life cycle Implementation and use of application object Working with Global.net

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    29/36

    www.intechlogies.com

    Query String Methods Implementation of query string Transfer value through query string Getting value by request object Scope

    State Management Using Post Back URL Context handler Class Is cross post back Page object working Previous page process

    View State Understanding view state Store and retrieve value from view state

    State Management Using Hidden Field And Profile Creating profile Using resources namespace Reading and writing value in profile

    Server And Validation Controls

    Text box, Combo box, List box and checkbox Validation controls Working with range, regular expression and compare Use control validate property Custom validator control Implementation of client and server side validation

    Data Bind Controls Working with repeater control Working with data list control Working with grid view control Working with form view control Working with details view control Working with navigation control

    Navigation Control Site map Use of site map Binding a site map Tree view Property of tree view

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    30/36

    www.intechlogies.com

    Define a node relation Binding with site map Property of menu view Define an items relation

    Caching Types of caching Page fragment caching Caching with http cache policy class Post cache substitution Data caching

    Skins Theme and CSS Creating style sheet Apply style sheet Creating rules Creating element settings Theme folder and skin Handling theme conflict Using CSS in theme Apply dynamic theme

    Master Pages

    Creating master page Default contents Master page with CSS and table layout Applying master page through configuration file Nested master page Master page and relative path

    Exception Handling In Web Application Code level handling Using try, Catch and finally Page level handling Application level handling Server object exception methods Exception handling in global .ASAX Custom error handling Setting costume error tag

    Globalization And Localization Introduction of multilingual application

    Understanding culture and UL culture Culture info class Overriding initialize culture

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    31/36

    www.intechlogies.com

    Auto attribute Local and global resources

    Web Services Introduction of web service The SOAP architecture SOAP and web service SOAP essentials Web service attribute WSDL documentations Disco and disco map file Transaction in web service Publishing and consuming a web service

    Ajax Introduction to Ajax Creating Ajax enabled website Understanding and working with update panel Role of script manager Creating a Ajax enabled web service

    Security and Windows Types of security Define form base security Form authentication class and their methods Declare user into web configuration Apply password formats Window based security IIs setting regarding windows authentication

    Passport Concept of passport security Passport url

    Login Controls Creating the data source Configure connection string and membership provider Creating a authentication user Login, login status, login view control Password recovery control Create user control

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    32/36

    www.intechlogies.com

    XML Introduction of XML XML documentation structure Wff format of XML

    Parsers dom and sax XML classes Reading and writing XML file

    ADVANCE .NET

    Understanding Lambda Expressions

    Object Initialization and Anonymous Types

    Extension methods

    LINQ Understanding the role of Linq Linq query expression Linq and non generic collection Linq to datasheet Linq to sql

    Windows Communication Foundation (W.C.F) W.C.F project template Composition of W.C.F Building and hosting W.C.F service Building a W.C.F client application

    Window Workflow Foundation (W.W.F) W.F.F assembly, namespace and project Building workflow enable application The WF engine hosting Web service with work flow

    .NET 2010Language and IDE Features

    Examine visual studio 2010 code editor UI improvements : from intellisense to zoom, Learn new language features

    including dynamic language support, Lambda expression improvements,

    Named and optional parameters in c# 4.0

    Parallel computing Add simple parallel support Task parallel library Plinq

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    33/36

    www.intechlogies.com

    Examine variance (covariance and contra variance) and hoe these featuremake interface work the way you always thought they should

    In-process side-by-side executionData Enhancements: The Entity Framework (E.D.M)

    ASP .net 4.0 dynamic data support Overview of entity framework How to create an entity data module Various techniques for using linq to entities to query data in a sql server data

    base

    Overview of ADO .net data services Create and call ADO .net service

    ASP .NET Web Forms Improvements (M.V.C 2.0)

    Client data control Client templates Client data context ASP .NET AJAX 4.0: New AJAX support for data driven web Visual web designer enhancements ASP .NET core services, web configuration file verification Output caching URL routing Named parameter syntax Deploy web application using new visual studio 2010 features

    WPF Overview Examine the various flavors of WPF application Working with window and application class types

    WPF Control and its feature Survey the core WPF control types Review the WPF control programming model Understand the role of WPF control commands Work with the WPF ink API Use Microsoft expression blend to build user interface WPF Layouts And Style Support

    WPF Control Extensions Design template Custom control Content extension WPF commands

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    34/36

    www.intechlogies.com

    WPF data binding Code behind MVVM pattern

    THE SQL SERVERMANAGEMENT STUDIO

    Query Window The foundation statements of T_SQL Started with SELECT statement Adding Data with the INSERT statement Changing what you've Got with the UPDATE statement

    Joins Inner joins Outer joins Cross joins

    The Union

    The Create Statement Create database Create table

    The Alter Statement Alter database Alter table

    The Drop Statement

    Constraints Types of constraints Domain constraints Entity constraints Referential integrity constraints Constraints naming Key constraints Primary key constraints Foreign key constraints Unique constraints Check constraints Default constraints Disabling constraints

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    35/36

    www.intechlogies.com

    Rules Defaults Determining which tables and datatypes Use a given rule or default

    Triggers for Data integrity Choosing what to use

    Adding More To Our Queries What is a subquery? Building a nested subquery Correlated subqueries How correlated subqueries work Correlated subqueries in the Where clause Dealing with null data- the isnull function derived tables The exists operator Using exists in other ways Mixing data types: cast and convert

    Understanding Indexes How data is accessed in SQL server Creating, altering, and Dropping indexes The create index statement

    Views Simple views Views as filters More complex views Editing views with T-SQL Dropping views

    Stored Procedures Basic syntax Changing stored procedures with Alter Dropping sprocs Handling errors

    Transactions Begin tran Commit tran Rollback tran Save tran

    Triggers What is a trigger? With encryption 0

  • 8/3/2019 Computer Science net Java, Ccna, Linux}

    36/36

    The for/after vs the instead of clause With append Not for replication Using triggers for data integrity rules Dealing with requirements sourced from other tables Using triggers to check the delta of an update using triggers for custom error messages Other common uses of triggers Other triggers issues Triggers can be nested Triggers can be recursive Dropping triggers

    Using XML

    Retrieving XML by using FOR XML Shredding XML by using OPEN XML Introducing Xquery Using the XML data type