Defensive Programmer: Defensive Techniques

Beginner
  • 17 videos | 1h 16m 15s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 138 users Rating 4.4 of 138 users (138)
In this course, learners discover the importance of exception handling, validation, and parameter checking in programming. Explore how to handle exceptions and apply validation in Java, Python, C#, and Javascript, as well as how to configure component trust and reuse code, in this 17-video course. Begin by learning how to apply exception handling effectively, and then take a look at validation techniques and procedures. Learners will explore reliability, resiliency, and recoverability and how it can be achieved in software engineering. Next, you will look at CDI/UDI (constrained data item/unrestrained data item), why it is important, and how it should be done. You will delve into parameter checking; using Java exception handling; using Python exception handling, and using Javascript exception handling. You will then explore using Java validation; Python validation; C# validation, and Javascript validation. In the final tutorials you will examine component trust, including when and how to achieve trust of components, and learn how to reuse code effectively and defensively.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Apply exception handling effectively
    Describe validation techniques and procedures
    Describe reliability, resiliency, and recoverability and how it can be achieved in software engineering
    Describe cdi/udi, why it is important and how it should be done
    Apply parameter checking
    Use java exception handling
    Use python exception handling
    Use c# exception handling
  • Use javascript exception handling
    Use java validation
    Use python validation
    Use c# validation
    Use javascript validation
    Describe component trust including when and how to achieve trust of components
    Describe how to reuse code effectively and defensively
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 53s
  • 4m 9s
    In this video, you will learn how to apply exception handling effectively. FREE ACCESS
  • Locked
    3.  Validation
    3m 21s
    After completing this video, you will be able to describe validation techniques and procedures. FREE ACCESS
  • Locked
    4.  Reliability, Resiliency, and Recoverability
    7m 20s
    Upon completion of this video, you will be able to describe reliability, resiliency, and recoverability and how they can be achieved in software engineering. FREE ACCESS
  • Locked
    5.  CDI/UDI
    5m 29s
    Upon completion of this video, you will be able to describe CDI/UDI, why it is important, and how it should be done. FREE ACCESS
  • Locked
    6.  Parameter Checking
    4m 26s
    In this video, you will learn how to check parameters. FREE ACCESS
  • Locked
    7.  Java Exception Handling Code Example
    4m 52s
    In this video, you will learn about Java exception handling. FREE ACCESS
  • Locked
    8.  Python Exception Handling Code Example
    3m 31s
    Find out how to use exception handling in Python. FREE ACCESS
  • Locked
    9.  C# Exception Handling Code Example
    4m 44s
    In this video, you will learn how to use C# exception handling. FREE ACCESS
  • Locked
    10.  JavaScript Exception Handling Code Example
    3m 18s
    Learn how to use exception handling in JavaScript. FREE ACCESS
  • Locked
    11.  Java Validation Code Example
    5m 9s
    In this video, you will learn how to validate using Java. FREE ACCESS
  • Locked
    12.  Python Validation Code Example
    7m 8s
    In this video, you will learn how to use Python validation. FREE ACCESS
  • Locked
    13.  C# Validation Code Example
    4m 51s
    During this video, you will learn how to validate using C#. FREE ACCESS
  • Locked
    14.  JavaScript Validation Code Example
    3m 58s
    In this video, you will learn how to use JavaScript validation. FREE ACCESS
  • Locked
    15.  Trusting Software Components
    5m 9s
    Upon completion of this video, you will be able to describe component trust, including when and how to achieve trust of components. FREE ACCESS
  • Locked
    16.  Intelligent Code Re-use
    5m 16s
    After completing this video, you will be able to describe how to reuse code effectively and defensively. FREE ACCESS
  • Locked
    17.  Course Summary
    1m 42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE