[go: up one dir, main page]

0% found this document useful (0 votes)
14 views2 pages

Chapter 10

The document provides an overview and objectives for reviewing concepts from a previous course on Java EE application development. It lists topics such as Java EE features and architectures, packaging and deploying applications, implementing various Java EE technologies like EJBs, JPA, REST, CDI, JMS, and security.

Uploaded by

Abubakar Waleed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

Chapter 10

The document provides an overview and objectives for reviewing concepts from a previous course on Java EE application development. It lists topics such as Java EE features and architectures, packaging and deploying applications, implementing various Java EE technologies like EJBs, JPA, REST, CDI, JMS, and security.

Uploaded by

Abubakar Waleed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Objectives

After completing this section, students should be able to review and refresh
knowledge and skills learned in Red Hat Application Development I:
Programming in Java EE.

Reviewing Red Hat Application Development I: Programming in Java


EE
Before beginning the comprehensive review for this course, students should be
comfortable with the topics covered in each chapter.
Students can refer to earlier sections in the textbook for extra study.
Describe Java EE features and distinguish between Java EE and Java SE
applications.
 Describe "enterprise application" and name some of the benefits of Java
EE applications.
 Compare the features of Java EE to Java SE.
 Describe the specifications and version numbers for Java EE 7 and the
process used to introduce new and updated APIs into Java EE.
 Describe various multi-tiered architectures.
 Install JBoss Developer Studio, Maven, and JBoss Enterprise Application
Platform.
Describe the architecture of a JavaEE application server, package an
application, and deploy the application to an EAP server.
 Identify the key features of application servers and describe the JavaEE
server architecture.
 List the most common JNDI resource types and their typical naming
convention.
 Package a simple JavaEE application and deploy it to JBoss EAP using
Maven.
Create Enterprise Java Beans.
 Convert a POJO to an EJB.
 Access an EJB both locally and remotely.
 Describe the life cycle of EJBs.
 Describe container-managed and bean-managed transactions and
demarcate each in an EJB.
Create Persistence Entities with validations.
 Describe the Persistence API.
 Persist data to a data store using entities.
 Annotate beans to validate data.
 Create a query using the JavaPersistenceQueryLanguage.
Define and manage JPA entity relationships.
 Configure one-to-one and one-to-many entity relationships.
 Describe many-to-many entity relationships.
Create REST APIs using the JAX-RS specification.
 Describe web services concepts and list types of web services.
 Create a REST service using the JAX-RS specification.
 Create a client application that can invoke REST APIs remotely.
Describe typical use cases for using CDI, and successfully implement it in an
application.
 Describe resource injection, dependency injection, and the differences
between them.
 Apply scopes to beans appropriately.
Create messaging clients that send and receive messages using the JMS API.
 Describe the JMS API and name the objects used in sending and receiving
messages.
 Describe the components that make up the JMS API.
 Create a JMS client that produces and consumes messages using the JMS
API.
 Create, package, and deploy a message driven bean.
Secure a JavaEE application with JAAS.
 Describe the JAAS specification.
 Configure a security domain in the JBossEAP application server.
 Secure a REST API with authentication and role-based authorization.

You might also like