Spring Framework II Course Summary

Spring Framework II Course Summary

"Charting the Course ... ... to Your Success!" Spring Framework II Course Summary Description This course is the next step in using the many features the Spring Framework has to offer. In depth Web topics covering Web Flow and MVC address the powerful features for building popular workflow structures in applications. Spring Security will be applied to all areas including the Method level. Spring ROO will be used to build entire applications, including Spring MVC. Web Services for SOAP and RESTful are included to complete the Web Tier. Objectives At the end of this course, students will be able to: Design, create and debug complex Spring MVC applications. Understand Web Flow and where it can be used. Create, monitor, and test Spring Web Services. Apply Security to all levels of Spring Framework applications, including methods. Use Spring Roo to create Spring Framework applications. Configure Spring Framework using Java Classes and eliminate Web.XML configuration. Incorporate JQuery and JavaServer Faces. Topics Web Development Spring Roo Web Services What’s Next in Spring III Security Audience This course is designed for Developers who have attended the “Spring Framework I” class or equivalent experience in developing or maintaining Spring Framework Web applications. Prerequisites Spring programming experience, a basic knowledge of configuration, familiarity with the Spring Framework dependency injection, and Aspect oriented programming. Duration Five Days Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically PT0137_SPRINGFRAMEWORKII.DOC "Charting the Course ... ... to Your Success!" Spring Framework II Course Outline VI. RESTful Web Service I. The Web Module and Spring MFC A. Dependencies A. The MVC Pattern B. Exposing the Service B. The Front Controller Pattern C. RESTTemplate C. DispatcherServlet D. JSR 303 Considerations D. Why Spring MVC? E. Application Configuration VII. The Scope of Security F. Spring Handler Mapping A. The Network Security Layer G. spring-servlet.xml B. The Operating System Layer H. Adding the Services Layer C. The Application Layer I. JQuery Considerations D. Authentication and Authorization: General J. Transaction Considerations Concepts E. What to Secure II. Controllers and Commands F. More Security Concerns A. Overview of the Spring MVC Controllers G. Java Options for Security B. ParameterizableViewControllers C. SimpleFormControllers VIII. Introducing Spring Security D. Inserting Spring Custom Form Tags A. What is Spring Security? E. Binding Data B. Where does Spring Security fit in? F. Incorporating MultiActionControllers C. Spring Security and Spring D. Spring Framework: A Quick Overview III. Binding and Validation E. An Initial Spring Security Secured Application A. Adding Validators F. Understanding the Simple Application B. Creating a Model Validator C. Working with Message Properties Files IX. Web Security D. Using Annotations A. Introducing the simple example application E. The @Controller Annotation B. The Special URLs F. The @RequestMapping Annotation C. Custom Login Form G. Other Handler Annotations D. Basic HTTP Authentication E. Digest Authentication IV. Working with Spring Web Flow F. Beyond Simple User Roles: Using Spring A. Installing Spring Web Flow Expression Language to Secure the Web Layer B. The components of a flow G. Extend with Custom Expressions C. Putting it all together in an application D. Securing web flows X. Securing the Service Layer A. The Limitations of Web-Level Security V. SOAP Web Services B. What Is Business Service-Level Security? A. Setup C. How the Described Actions Happen Under the B. Tools Hood C. WSDL D. Creating a Business Layer in an Application D. Testing E. @RolesAllowed Annotation F. Securing the Application Using SpEL Expressions Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically PT0137_SPRINGFRAMEWORKII.DOC "Charting the Course ... ... to Your Success!" Spring Framework II Course Outline (con’t) G. Securing the Data Returned from a Method H. Using AspectJ AOP instead of Spring AOP XI. Customizing and Extending Spring Security A. Spring Security Extension Points B. Plug into the Spring Security Event System C. Custom AuthenticationProvider and UserDetailsService D. Password Encryption E. Custom Security Filter F. Handling Errors and Entry Points G. Changing the Security Interceptor H. Spring Security Extensions Project Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically PT0137_SPRINGFRAMEWORKII.DOC .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us