Sign In | Register

weblogic classroom training in ameerpet

Bookmark and Share

Rs. 8,000.00

  • Course Type: Teaching
Description:

I. Basics

1. What is Application Server
2. The need for an Application Server
3. Java Application Solution Architecture
4. 3-tier architecture
5. Various commercial products in 3-tiers
6. The logic behind popularity of each product

II. Installation and Configuration

1. Install WebLogic Server (GUI, Console, Silent modes)
2. WebLogic Server Domains
3. Servers and Domains
4. Domain Configuration
5. The Configuration Wizard
6. The Configuration Wizard: Creating A New Domain
7. Starting the Administrative Server
8. The Administration Console
9. Administrative Tasks
10. Setting the Domain Environment
11. Automatically Starting Admin Servers
12. Managed Servers
13. Creating a Managed Server
14. Starting a Managed Server
15. Password boot. properties
16. Examining Server Status
17. Shutting Down Servers
18. Admin Server Shutdown
19. Admin Server Backup
20. Start Scripts
21. config.xml

III. Node Manager Overview

1. Node Manager Functionality & Configuration
2. Starting a Administration Server from Node Manager
3. Starting a Managed Server from Node Manager
4. Restarting a Managed Server from Node Manager
5. Shutting Down a Server Instance from a Node Manager
6. Working with Machines
7. Creating a Machine
8. Adding Server Instances to a Machine
9. Starting the Node Manager
10. Monitoring Managed Servers
11. Node Manager Logs and Configuration Files

IV. Logging

1. WebLogic Logging Services
2. Specifying the Logging Implementation
3. Message Severity
4. WebLogic Server Logs
5. Server Log
6. Viewing Server Log
7. Configuring Server Log
8. HTTP Access Log
9. Configuring HTTP Access Log
10. JMS Log
11. Configuring JMS Log
12. Domain Log
13. Viewing Logs

V. Clustering

1. What Is Clustering?
2. What Components Can Be Clustered?

3. Basic Cluster Diagrams
4.Web Container Load Balancing
5.Horizontal vs. Vertical Clustering 6.Horizontal Clustering
7.Clustering WebLogic Server
8.WebLogic Cluster Requirements
9.Configure Domain for Clustering
10.Create a Cluster
11.Multicasting vs. Unicasting

12.HttpClusterServlet Load Balancer

13.Session State
14.Clustered Session State
15.Session State Strategies
16.In-Memory Replication
17.Configuring Session State Replication

VI. Deploying Applications

1.The Process
2.Deployment Overview
3.Archive Vs Expanded Directory
4.Default Deployment Names
5.Deployment Methods
6.Auto-Deployment
7.Console Deployment
8.Starting an Application
9.Stopping an Application
10.Updating Applications
11.Deleting Applications
12.Testing a Deployed Application
13.Monitoring Deployed Applications
14.Using Command Line Deployment 15.weblogic.Deployer Command Syntax 16.weblogic.Deployer Usage
17.wldeploy Ant Task
18.WebLogic Scripting Tool (WLST) 19.WebLogic Scripting Tool (WLST) Scripts

VII. JDBC

 1. Introduction to JDBC
2.Types of JDBC Drivers
3.Working with a Database via JDBC (Client side)
4. The Need for Connection Pooling

5. Connection Pooling and Data Sources

6. Connecting with Data Source
7.Steps in using Connection Pooling
8.Admin Tasks for Connection Pools and Data Sources
9.JDBC Driver Support in Web Logic Server

10. Database Access Using Web Logic 11.Working with Data Sources
12.Creating a Data Source
13.Monitoring Data Source and Connection Pools
14.Multidata Source
15.JDBC Clustering

VII. Web Logic and JMS

1.Messaging Introduction
2.Messaging Components 
3.Messaging Types
4.JMS (Java Messaging Service)
5.Message Driven Beans (MDB)
6.MDB as Message Consumer
7.JMS Resources
8.Durable Subscription
9.Deployment Descriptor Entry
10.Binding the Queue or Topic
11.WebLogic JMS Server
12.Creating a JMS Server
13.Creating a Connection Factory
14.Creating a Topic
15.Threshold and Quota
16.Configuring Threshold and Quota
17.Distributed Destination
18.Creating a Distributed Topic/Queue 19.Monitoring JMS in WebLogic
20.Messaging Bridge

IX. Security

1. Web Logic Server Security
2.Authentication / Authorization
3.Resources That Can Be Secured 4.Authentication Mechanisms
5.WebLogic Security Diagram
6.Overview: Security Tasks for Securing Resources
7.WebLogic Security Realms
8.Managing Users/Groups
9.User Lockout
10.Managing Roles
11.Policies and Roles

X. Encryption

1. SSL
2.Public Key / Private Key Encryption
3.Secure Communication over the Web - SSL
4.SSL And WebLogic Server
5.Creating A Digital Certificate
6.Dealing With a CA
7.Configuring WebLogic Server SSL: Key stores
8.Configure WebLogic SSL Settings
9.Configuring WebLogic Server SSL: Setting A Listen Port

XI. Apache HTTP Server Configuration

1. Apache HTTP Server Plug-In
2.Installing Apache HTTP Server Plug-In

3. Configuring Apache HTTP Server Plug-In 4.Keep-Alive Connections

XII .Using WebLogic as a Web Server

1. Web Server Overview
2.Using WebLogic Web Server
3.Configuring the WebLogic Web Server
4.Virtual Hosts
5.Creating Virtual Hosts
6.Specifying Virtual Host Names
7.Targeting Virtual Hosts to Server

XIII. Performance Tuning

1. Basic Tuning Methodology
2.Areas to Tune
3.Tuning Hardware
4.Tune the Operating System
5.Tune the JVM
6.JVM Choices
7.Tuning WebLogic Server
8.JDBC Settings
9.Thread Settings
10.Socket Readers
11.Socket Implementation
12.Monitoring Threads
13.Connection BackLog
14.Tuning the Back End

XIV. WLST: The WebLogic Scripting Tool

1.The WLST
2.WLST Details
3.Starting WLST
4.Simple WLST Commands
5.WLST Is Hierarchical
6.Navigating WLST
7.Other WLST Commands
8.Scripting With WLST
9.Recording WLST Scripts
10.Configure Recording
11.Start Recording
12.Sample Recorded Script

 

Contact at

SADGURU TECHNOLOGIES

H. No: 7-1-621/10, Flat No: 102, SaiManor Apartment, S.R. Nagar Main Road, Hyderabad-500038, Landmark: Beside Umesh Chandra Statue

Mob: 91-8179736190, Ph: 040-40154733

Email: sdtech.soa@gmail.com


Related ads of Professional Courses

    Poster Contact Information

    Posted By

    Posted Date: 1/31/2017

    Contact No.  8185971413



    Copyright ©2020 The Corporate Hours


    close
    States/Union Territories
    My City Not Listed