Consult our trainings :
> Digital Technologies training > Internet / XML / SOA training > Web Technologies training > Web Technologies, overview training
Web Technologies, overview Training
Seminar
- Program
- Participants / Prerequisite
- Intra/Tailored
Program
This seminar presents a comprehensive overview of internet/intranet technologies. It will cover the following topics in a simple and practical way: the underlying techniques and infrastructures; the standards and tools available for developing efficient and secured applications; the impact of the introduction of new technologies such as mobility or e-commerce on applications and, more generally, on society.
PROGRAM
The information system
- Role of Intranet, Internet, Extranet applications. Evolution towards n-tier architectures.
Basic technologies
- Internet architecture. IP, IPv6, ICMP, UDP, TCP protocols. Routing, ports, DNS. Domain name.
- Networks. Service and access providers. Operators' offers. Evolution to high-speed access: FTTH.
Basic services
- Mime. POP3, IMAP4, SMTP protocols. Spamming. Message service clients and servers. Security flaws.
- Concept. User management, DNS, Whois, application directories, X.500. The LDAP protocol.
- The strategic role. Indexing and ranking. Search Engin Optimization. Google, Google adwords, bing...
- The characteristics. What tools for what needs? For companies, for personal environment.
- Images, sounds, video: GIF, JPEG, MP3, MPEG, VP8... TNT, VoD (DVB-T, TVHD). Streaming software. Video over IP. Multi-cast broadcasting. WebTV, WebRadio. SIP protocol. Skype, Jabber. RTP, H323 protocols.
- Principles: URI, HTTP, HTML, HTML5. XML for the Web. The universal client: Internet Explorer, FireFox... PDA, thick/thin PC solutions. RSS and podcast services.
- Concept. Rich user interface (RIA/RDA). Ajax, Flex, XUL, XAML, etc. Blog, wiki, RSS, Atom, podcasting, videocasting... Social networks (Facebook, Twitter...).
- HTML5: advantages on semantic, new functionalities for javascript development, 3D appearance, CSS-3.
- Content management system (CSM). Traffic analysis tools. Payment over the Net: paypal API, Google checkout... Merchandplatform: OS-Commerce, Prestashop...
■ Message services
■ Directories
■ Search engines and portals
■ Collaborative work
■ Multimedia over IP
■ Web
■ Web 2.0
■ E-business
Security
- Origin, Organization. Why Internet facilitate hacking and cracking. Tools and organization of pirats.
- Confidentiality, authentication, integrity, denial of service, non-repudiation.
- Passwords, Active Card, Secure ID, biometrics...
- PPP authentication. Radius, Kerberos authentication systems.
- Firewall, proxy. Architecture and localisation, DMZ. Packet filtering, filtering routers, ACL.
- Limit of WIFI WEP, WPA. HTTPS protocols. Threats of Public spot wifi. Attack methods over IP. VPN.
- Automatic password and information storage in browser, source code access and modification.
- Virus, spyware, scripts cross Server, backup, update.
- Legislation. Symmetric and asymmetric keys. Electronic signature. Trusted third parties. Public key infrastructure (PKI/EGC).
■ Cybercriminology
■ Security services
■ Authentication
■ Access security
■ Security of networks
■ Security of web applications
■ Cryptography
Application architectures
- The servers: databases, applications, Web. Their position with regard to Internet architectures.
- Overview of XML. XML Schemas. The parsers.
- XSLT processing. Editing with XSL-FO. Web services.
- Various OS. Vectoriel interface. How adapt web content for all screen size. Portability. Tablets (iPad, Android), smartTouch (iPhone). Voice devices.
- Browsers. Portability.
- Rich Internet Application and Rich Desktop Application.
- HTML language and its limitations.
- Limits of Javascript on portability. Ecmascript.
- CSS, DOM, XHTML, Flash...
- XML Graphic interfaces: XUL, XAML, Vista.
- N-tier architectures. Component-oriented approaches. PHP, JEE and .NET architectures. Frameworks (Struts, Spring, Hibernate, .NET).
- High availability, load balancing. The cluster approach. Web servers (Apache, IIS, etc). Application servers.
- Cloud computing. Impact on security and projects.
- Web services, standards (SOAP, WSDL, UDDI, BPML, BPEL), implementation. SOA architectures.
■ Introduction
■ XML
■ Terminal client
■ Client-side technologies
■ Server-side technologies
■ Web servers and application servers
■ Distributed architectures and Web services
Participants / Prerequisite
» Participants
This seminar is aimed at project leaders, IT decision makers, developers, IT managers, and webmasters.
» Prerequisite
Knowledge in computing.
Intra/Tailored
Book your place
Submit your request
Time schedule
Generally, courses take place from 9:00 to 12:30 and from 14:00 to 17:30.
However, on the first day attendees are welcomed from 8:45, and there is a presentation of the session between 9:15 and 9:30.
The course itself begins at 9:30. For the 4- or 5-day hands-on courses, the sessions finish at 15:30 on the last day









