• Online, Self-Paced
Course Description

This 17-video course helps learners discover how to implement Flyweight, Adapter, Composite, and Proxy patterns to model structure between the components in a system. Examine inefficient memory usage, sharing memory, and centralized event handling with Flyweight pattern. Explore possible burdens on a client when the Adapter pattern is not used and how to provide a consistent interface by using adapters. Then learn to use Composite pattern in jQuery and Proxy pattern to cache data and specify context. Key concepts covered here include characteristics of Flyweight pattern; learning how to illustrate inefficient memory usage for granular objects; and how to wire up individual event handlers to HTML elements. You will observe how to centralize event handling with Flyweight pattern; how to articulate features of Adapter pattern; and how to illustrate burdens on clients when Adapter pattern is not used. Finally, learn about characteristics of Composite pattern; how to execute functions by using the right context; and how to apply Proxy pattern to provide the right context.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.