Sadguru Technologies | online SOA Training | SOA training institute in India,Hyderabad

Careers Training Sadguru Technologies

I. Basics

1. What is Application Server 
2. The need for an Application Server 
3. Java Application Solution Architecture 
4. 3-tier architecture 
5. Various commercial products in 3-tiers 
6. The logic behind popularity of each product

II. Installation and Configuration

1. Install WebLogic Server (GUI, Console, Silent modes) 
2. WebLogic Server Domains 
3. Servers and Domains 
4. Domain Configuration 
5. The Configuration Wizard 
6. The Configuration Wizard: Creating A New Domain 
7. Starting the Administrative Server 
8. The Administration Console
9. Administrative Tasks 
10. Setting the Domain Environment 
11. Automatically Starting Admin Servers 
12. Managed Servers 
13. Creating a Managed Server 
14. Starting a Managed Server 
15. Password boot. properties 
16. Examining Server Status 
17. Shutting Down Servers 
18. Admin Server Shutdown 
19. Admin Server Backup 
20. Start Scripts 
21. config.xml

III. Node Manager Overview

1. Node Manager Functionality & Configuration
2. Starting a Administration Server from Node Manager 
3. Starting a Managed Server from Node Manager 
4. Restarting a Managed Server from Node Manager 
5. Shutting Down a Server Instance from a Node Manager 
6. Working with Machines 
7. Creating a Machine 
8. Adding Server Instances to a Machine
9. Starting the Node Manager 
10. Monitoring Managed Servers 
11. Node Manager Logs and Configuration Files

IV. Logging

1. WebLogic Logging Services 
2. Specifying the Logging Implementation
3. Message Severity 
4. WebLogic Server Logs 
5. Server Log 
6. Viewing Server Log 
7. Configuring Server Log 
8. HTTP Access Log 
9. Configuring HTTP Access Log 
10. JMS Log 
11. Configuring JMS Log
12. Domain Log 
13. Viewing Logs

V. Clustering

1. What Is Clustering? 
2. What Components Can Be Clustered?

3. Basic Cluster Diagrams 
4.Web Container Load Balancing 
5.Horizontal vs. Vertical Clustering 6.Horizontal Clustering 
7.Clustering WebLogic Server 
8.WebLogic Cluster Requirements 
9.Configure Domain for Clustering 
10.Create a Cluster 
11.Multicasting vs. Unicasting

12.HttpClusterServlet Load Balancer

13.Session State 
14.Clustered Session State 
15.Session State Strategies 
16.In-Memory Replication 
17.Configuring Session State Replication

VI. Deploying Applications

1.The Process 
2.Deployment Overview 
3.Archive Vs Expanded Directory 
4.Default Deployment Names 
5.Deployment Methods 
7.Console Deployment 
8.Starting an Application 
9.Stopping an Application 
10.Updating Applications 
11.Deleting Applications 
12.Testing a Deployed Application
13.Monitoring Deployed Applications
14.Using Command Line Deployment 15.weblogic.Deployer Command Syntax 16.weblogic.Deployer Usage 
17.wldeploy Ant Task 
18.WebLogic Scripting Tool (WLST) 19.WebLogic Scripting Tool (WLST) Scripts


 1. Introduction to JDBC 
2.Types of JDBC Drivers 
3.Working with a Database via JDBC (Client side) 
4. The Need for Connection Pooling

5. Connection Pooling and Data Sources

6. Connecting with Data Source 
7.Steps in using Connection Pooling 
8.Admin Tasks for Connection Pools and Data Sources 
9.JDBC Driver Support in Web Logic Server

10. Database Access Using Web Logic 11.Working with Data Sources 
12.Creating a Data Source 
13.Monitoring Data Source and Connection Pools 
14.Multidata Source
15.JDBC Clustering

VII. Web Logic and JMS

1.Messaging Introduction 
2.Messaging Components 
3.Messaging Types 
4.JMS (Java Messaging Service) 
5.Message Driven Beans (MDB) 
6.MDB as Message Consumer 
7.JMS Resources 
8.Durable Subscription 
9.Deployment Descriptor Entry 
10.Binding the Queue or Topic 
11.WebLogic JMS Server 
12.Creating a JMS Server
13.Creating a Connection Factory
14.Creating a Topic 
15.Threshold and Quota 
16.Configuring Threshold and Quota
17.Distributed Destination 
18.Creating a Distributed Topic/Queue 19.Monitoring JMS in WebLogic 
20.Messaging Bridge

IX. Security

1. Web Logic Server Security 
2.Authentication / Authorization
3.Resources That Can Be Secured 4.Authentication Mechanisms 
5.WebLogic Security Diagram 
6.Overview: Security Tasks for Securing Resources 
7.WebLogic Security Realms 
8.Managing Users/Groups 
9.User Lockout 
10.Managing Roles 
11.Policies and Roles

X. Encryption

1. SSL 
2.Public Key / Private Key Encryption 
3.Secure Communication over the Web - SSL
4.SSL And WebLogic Server 
5.Creating A Digital Certificate 
6.Dealing With a CA 
7.Configuring WebLogic Server SSL: Key stores
8.Configure WebLogic SSL Settings 
9.Configuring WebLogic Server SSL: Setting A Listen Port

XI. Apache HTTP Server Configuration

1. Apache HTTP Server Plug-In 
2.Installing Apache HTTP Server Plug-In

3. Configuring Apache HTTP Server Plug-In 4.Keep-Alive Connections

XII .Using WebLogic as a Web Server

1. Web Server Overview 
2.Using WebLogic Web Server 
3.Configuring the WebLogic Web Server
4.Virtual Hosts 
5.Creating Virtual Hosts 
6.Specifying Virtual Host Names 
7.Targeting Virtual Hosts to Server

XIII. Performance Tuning

1. Basic Tuning Methodology 
2.Areas to Tune 
3.Tuning Hardware 
4.Tune the Operating System 
5.Tune the JVM 
6.JVM Choices 
7.Tuning WebLogic Server
8.JDBC Settings 
9.Thread Settings 
10.Socket Readers 
11.Socket Implementation 
12.Monitoring Threads 
13.Connection BackLog 
14.Tuning the Back End

XIV. WLST: The WebLogic Scripting Tool

1.The WLST 
2.WLST Details 
3.Starting WLST 
4.Simple WLST Commands
5.WLST Is Hierarchical 
6.Navigating WLST 
7.Other WLST Commands 
8.Scripting With WLST 
9.Recording WLST Scripts 
10.Configure Recording
11.Start Recording 
12.Sample Recorded Script