Tag: architecture

Description

This course reveals key concepts, principles, and approaches that are used to design systems where security is a first-class quality attribute. Upon completion, you’ll have a thorough understanding of security architecture principles that you can apply to your project.

Key concepts covered in this course

  • Security design principles (e.g. least privilege, defense in depth, minimization, compartmentalization, simplicity, fail securely, etc)
  • OAuth grant types:
    • Implicit Flow
    • Password Grant
    • Client Credentials
    • Authorization Code (with PKCE flow)
  • Refresh tokens, Access tokens
  • OAuth security best practices
  • How to make your application GDPR compliant (i.e. database, logs)
  • How to implement OAuth flows in a distributed architecture:
    • how to secure your web/mobile application
    • how to secure your back-end services

Duration

  • 8 hours

Target Audience

  • software developers
  • technical leaders
  • software/solution architects
  • business analysts with a technical background or passionate about technology
  • test engineers with a technical background or passionate about technology

Client Portfolio

To have a grasp about what companies did already chose my training courses, please check this page.

Note

At the moment this course is available only for companies, teams, or groups of students. The individual subscription (i.e. single person) is not an option at the moment.

Enroll

Description

The goal of the course is to outline key concepts, principles, and approaches that are used to design highly loaded systems where performance, scalability, and availability are first-class quality attributes.

By the end of this course, candidates will have acquired in-depth knowledge about how to describe business requirements, how to design a highly loaded system, and how to create a proper test plan.

Key concepts covered in this course

  • Different metrics used to quantify performance, scalability, and availability, such as response time, percentiles, latency, steady-state availability, resource utilization, etc.
  • How to properly formulate and collect business requirements pertaining to a high load system, which must include at least a stimulus and a measurable response for a particular workload and under a specific working mode.
  • Architectural styles that might be used while designing a high load system, with their pros and cons (e.g. microservices, event-driven, command query responsibility segregation, serverless, lambda).
  • Architectural tactics to achieve performance (e.g. caching, batching, lazy loading, throttling, optimistic locking, back pressure, etc.), scalability (e.g. data push, data pull, distributed and parallel processing, etc.) and availability (e.g. replication, redundancy, disaster recovery, circuit breaker, bulkheads, etc.)
  • Advanced development techniques such as thread affinity, NUMA, large pages, false sharing, Data-Oriented Design, C-states, RamFS/TmpFS, memory access patterns, lock-free algorithms, etc.
  • How to elaborate a test plan with a focus on stress, endurance, and load testing

Agenda

  • High load system concept (performance, scalability, and availability)
  • High load system requirements: identifying non-functional requirements for high-load systems
  • High load system architecture design pertaining to high performance, highly scalable and high available tactics and anti-patterns
  • High load system development
  • High load system testing
  • Examples of high load systems (e.g. Linkedin use case, Uber use case, etc.)

Duration

  • 16 hours

Target Audience

  • software developers
  • technical leaders
  • software/solution architects
  • business analysts with a technical background or passionate about technology
  • test engineers with a technical background or passionate about technology

Examples of Recent Feedback

“The trainer was very well prepared. He answered all of our questions, even if they were not really the subject of the training.”

“Very interesting course. The trainer presented with many examples based on his experience.”

“Ionut is a very knowledgeable and experienced trainer”

“I liked more the advanced part about how to tune an application, outside of the programming language, to get a better performance”

“Excellent course content helping me to understand a lot of things, from a very high level and abstract to a very deep and technical perspective”

“For a QA some of the concepts were a bit advanced, but nevertheless I recommend this course if you want to get in touch with real technical topics. The trainer clearly explained to them, even for less technical people”

“Interesting and informative course, presented by a trainer who knows a lot of stuff. I got a lot of ideas and techniques that I can use to build more efficient applications in my daily job”

Client Portfolio

To have a grasp about what companies did already chose my training courses, please check this page.

Note

At the moment this course is available only for companies, teams, or groups of students. The individual subscription (i.e. single person) is not an option at the moment.

Enroll

Java Performance Tuning Course

Abstract: This course covers JVM architecture, memory structure, Garbage Collectors, tuning, profiling, micro-benchmarking techniques, tips, and tricks.

Duration: 16 h

Details and enroll »


Software Architecture Essentials Course

Abstract: This course introduces the main concepts and context of software architecture, roles, and responsibilities of a software architect, essential requirements identification, architectural design techniques, how to properly document and review the architecture.

Duration: 16 h

Details and enroll »


Designing High-Performance Applications Course

Abstract: The goal of the course is to outline key concepts, principles, and approaches used to design high performance, highly scalable, and high available systems including specific tactics and anti-patterns.

Duration: 16 h

Details and enroll »


Security Architecture Course

Abstract: This course reveals key concepts, principles, and approaches that are used to design systems where security is a first-class quality attribute.

Duration: 8 h

Details and enroll »

Ionut Balosin

I am a Software Architect, Security Champion, and an independent Technical Trainer.

I speak at software development conferences and meetups around the world, delivering presentations, training courses, and workshops.

Please contact me if you are interested in conducting any software architecture, Java performance, or security course or workshop for your team or your company.

Professional Figures

15   years of experience
8   years of training
31+   articles, blog posts
34+   conferences talks
70+   training sessions
1200+   hours of training
10+   training clients
4   training countries

Contact

 

Social Media