• Online, Self-Paced
Course Description

Atomicity, isolation, and flat threading are some of the transaction features that must be incorporated in applications compliant with the Java EE platform. This course covers transaction semantics and models for Java EE applications. It contrasts a programmatic and declarative implementation of transaction support and covers using JTA to scope transactions programmatically and implementing a container-managed transaction policy. In this course, you will learn about implementing entity synchronization in transactions, handling exceptions, and using transactions to update and persist data. You'll learn how to implement a versioning policy for entities and how to control optimistic locking in a Java transactional application. The course also provides practice in creating transactional Java EE applications.

Learning Objectives

Implementing a Transaction Policy

  • start the course
  • describe transaction concepts important for the Java EE platform and describe transaction models
  • compare programmatic and declarative transactions in the context of Java EE applications
  • describe how to use JTA to scope transactions programmatically
  • describe how to implement a declarative or container-managed transaction (CMT) policy
  • describe how to implement entity synchronization in transactions
  • describe how to handle exceptions in programmatic and declarative transaction scoping and how to unravel EJBExceptions
  • use transactions to update and persist data in a Java EE application
  • implement a versioning policy for entities in a transactional Java EE application
  • use the Java Persistence API versioning features to control optimistic locking in a transactional Java EE application

 

Practice: Work with Transactions

  • practice configuring transactional Java EE applications

 

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.