About this workshop
This two-day, mentor-led workshop provides introduction to recommendations on how to design and develop custom applications using the Microsoft platform. Many patterns and practices offerings illustrate how to incorporate multiple Microsoft products and technologies into an overall solution. Patterns and practices offerings are organized into four categories: Solution Development Fundamentals, Client Development, Server Development, and Services Development.
Duration
2 days
Audience
This workshop is intended for:
· Software architects such as solution architects, application architects, and component architects who are responsible for engineering Microsoft solutions.
· Software architects such as solution architects, application architects, and component architects who have three or more years of on-the-job experience in an enterprise environment.
Prerequisites
Before attending this course, attendees must have:
· Experience working in a software development team.
· Intermediate programming experience using Visual Basic or Visual C#.
Upon completion
Participants will be able to:
· Describe Enterprise Library.
· Describe collection of application blocks (i.e. Caching Application Block, Cryptography Application Block, Cryptography Application Block, Data Access Application Block, Exception Handling Application Block, Logging Application Block, Policy Injection Block, Security Application Block, Unity Application Block, and Validation Application Block) in Enterprise Library.
· Use Enterprise Library.
· Use collection of application blocks (i.e. Caching Application Block, Cryptography Application Block, Cryptography Application Block, Data Access Application Block, Exception Handling Application Block, Logging Application Block, Policy Injection Block, Security Application Block, Unity Application Block, and Validation Application Block) in Enterprise Library.
Workshop Agenda
· Module 1: Introduction to Enterprise Library
· Module 2: Introduction to Caching Application Block
· Module 3: Introduction to Cryptography Application Block
· Module 4: Introduction to Data Access Application Block
· Module 5: Introduction to Exception Handling Application Block
· Module 6: Introduction to Logging Application Block
· Module 7: Introduction to Policy Injection Block
· Module 8: Introduction to Security Application Block
· Module 9: Introduction to Unity Application Block
· Module 10: Introduction to Validation Application Block