软件研发|项目外包|人才外包|软件技术咨询培训
在线客服
J2EE/JAVA系列课程
职业化J2EE工程师强化训练班
SCJP认证SL-275
J2EE SCED认证SL-314
J2EE高级架构设计
J2EE SCBCD认证EJB编程
J2EE认证SCEA架构设计
J2EE核心设计模式
J2ME无线开发培训
JBuilder使用与实践
EJB编程及实现
J2EE部署及中间件应用
J2EE项目开发

SCEA认证J2EE体系架构设计课程:Sun Certified Enterprise Architect for J2EE Technology
课程简介
本课程为J2EE体系架构设计课程,适合于有程序设计设计基础的人员学习
课程目标
通过J2EE SCEA认证
课程内容
Section 1: Concepts
 
 
  • Draw UML Diagrams
  • Interpret UML diagrams.
  • State the effect of encapsulation, inheritance, and use of interfaces on architectural characteristics.
 
Section 2: Common Architectures
 
 
  • Recognize the effect on each of the following characteristics of two tier, three tier and multi-tier architectures: scalability maintainability, reliability, availability, extensibility, performance, manageability, and security.
  • Recognize the effect of each of the following characteristics on J2EE technology: scalability maintainability, reliability, availability, extensibility, performance, manageability, and security.
  • Given an architecture described in terms of network layout, list benefits and potential weaknesses associated with it.
 
Section 3: Legacy Connectivity
 
 
  • Distinguish appropriate from inappropriate techniques for providing access to a legacy system from Java code given an outline description of that legacy system
 
Section 4: Enterprise JavaBeans Technology
 
 
  • List the required classes/interfaces that must be provided for an EJB technology.
  • Distinguish stateful and stateless Session beans.
  • Distinguish Session and Entity beans.
  • Recognize appropriate uses for Entity, Stateful Session, and Stateless Session beans.
  • State benefits and costs of Container Managed Persistence.
  • State the transactional behavior in a given scenario for an enterprise bean method with a specified transactional deployment descriptor.
  • Given a requirement specification detailing security and flexibility needs, identify architectures that would fulfill those requirements.
  • Identify costs and benefits of using an intermediate data-access object between an entity bean and the data resource.
 
Section 5: Enterprise JavaBeans Container Model
 
 
  • State the benefits of bean pooling in an EJB container.
  • State the benefits of Passivation in an EJB container.
  • State the benefit of monitoring of resources in an EJB container.
  • Explain how the EJB container does lifecycle management and has the capability to increase scalability.
 
Section 6: Protocols
 
 
  • Given a scenario description, distinguish appropriate from inappropriate protocols to implement that scenario.
  • Identify a protocol, given a list of some of its features, where the protocol is one of the following: HTTP, HTTPS, IIOP, JRMP.
  • Select from a list, common firewall features that might interfere with the normal operation of a given protocol.
 
Section 7: Applicability of J2EE Technology
 
 
  • Select from a list those application aspects that are suited to implementation using J2EE.
  • Select from a list those application aspects that are suited to implementation using EJB.
  • Identify suitable J2EE technologies for the implementation of specified application aspects.
 
Section 8: Design Patterns
 
 
  • From a list, select the most appropriate design pattern for a given scenario. Patterns will be limited to those documented in Gamma et al. and named using the names given in that book.
  • State the benefits of using design patterns.
  • State the name of a design pattern (for example, Gamma) given the UML diagram and/or a brief description of the pattern's functionality.
  • Select from a list benefits of a specified design pattern (for example, Gamma).
  • Identify the design pattern associated with a specified J2EE feature
 
Section 9: Messaging
 
 
  • Identify scenarios that are appropriate to implementation using messaging, EJB, or both.
  • List benefits of synchronous and asynchronous messaging.
  • Select scenarios from a list that are appropriate to implementation using synchronous and asynchronous messaging.
 
Section 10: Internationalization
 
 
  • State three aspects of any application that might need to be varied or customized in different deployment locales.
  • Match the following features of the Java 2 platform with descriptions of their functionality, purpose or typical uses: Properties, Locale, ResourceBundle, Unicode, java.text package, InputStreamReader and OutputStreamWriter.
 
Section 11: Security
 
 
  • Select from a list security restrictions that Java 2 environments normally impose on applets running in a browser.
  • Given an architectural system specification, identify appropriate locations for implementation of specified security features, and select suitable technologies for implementation of those features.

 

即刻通过网络报名,享受优惠!


培训课程
-> UML及Rational工具系列
-> 软件工程、过程及架构类
-> J2EE及JAVA技术
-> 中间件应用服务器
-> 微软.net技术
-> 开发工具及语言
-> 数据仓库/数据挖掘
-> UNIX及LINUX课程


Copyright (C) 2001-2016 www.deepbluesoft.com All Rights Reserved