CÔNG TY TNHH TRAINOCATE VIỆT NAM
AD465 - Implementing with Red Hat JBoss BRMS

AD465 - Implementing with Red Hat JBoss BRMS

AD465 - Implementing with Red Hat JBoss BRMS

Overview

Students are given detailed, hands-on exercises using Red Hat JBoss Developer Studio and Red Hat JBoss BRMS that are designed to let students create and manage business rules in a production environment. This course can also help you prepare for the Red Hat Certified Specialist in Business Rules Management exam (EX465).

Objectives

  • Authoring basic business rules in JBoss Developer Studio and Business Central
  • Integrating business rules with Java applications
  • Authoring advanced rules
  • Testing business rules
  • Authoring and testing rules in decision tables
  • Authoring rule templates and generating rules from decision tables
  • Authoring domain-specific languages
  • BRMS architecture and rule execution at run time
  • Controlling rule execution and preventing conflicts
  • Complex event processing (CEP)
  • Integration with Business Central

Content

Overview of this course

  • Learn about the architecture, basic deployment options, and the business need for a business rules management system such as Red Hat JBoss BRMS.

Authoring basic business rules

  • Develop business rule structure and components, including facts working memory.
  • Identify rule components.
  • Author rules with Business Central and Red Hat JBoss Developer Studio (JBDS).

Integrating business rules with Java applications

  • Use the knowledge API to integrate rules processing into an application.

Authoring rules as technical rules, decision tables, templates, and domain-specific language files

 

  • Author rules using the Business Central technical rule editor and create a spreadsheet decision tables.
  • Create rule templates.

Business rules decision tables and rule templates

  • Create spreadsheets with rules and rule templates.

Domain-specific languages in BRMS

  • Learn the purpose of domain-specific languages (DSLs), how to author them, and how to use them in a rule in BRMS.
  • Use domain-specific languages created by developers to create rules.

Testing business rules

  • Test business rules using both the Business Central web interface and Java coding.

Authoring complex rules with BRMS

  • Author complex business rules using advanced conditions and field constraints.

Controlling rule execution

  • Control rule execution.
  • Learn how to avoid rule conflicts.

Debugging basic business rules in Drools

  • Debug Drools applications in JBDS.

Complex event processing in BRMS

  • Create and use complex event processing (CEP) with rules.

Integration with Business Central

  • Gain an overview of BRMS administration with Business Central, a web application built into BRMS.
  • Learn how to integrate Business Central with Java code

Audience

  • Business analysts and enterprise SOA architects who are responsible for creating and adapting business policies.
  • Rule authors responsible for authoring and testing rules.
  • Java EE application developers responsible for integrating business rules into SOA and Java EE enterprise applications.

Prerequisites

  • Basic Java/Java EE programming experience.
  • Knowledge of the Eclipse IDE, Maven, and GIT are useful, but not essential.

Certification

Lịch khai giảng

Form đăng ký

Bằng cách nhấn nút "ĐĂNG KÝ", tôi hoàn toàn đồng ý với Chính sách bảo mật

Các khóa đào tạo Red Hat khác

DO370 - Enterprise Kubernetes Storage with Red Hat OpenShift Data Foundation

Traditional storage options available to Kubernetes administrators are limited and lack flexibility and/or versatility. Red Hat OpenShift Data Foundation provides real advantages, even when it is backed by cloud storage such as AWS EBS and sophisticated on-prem legacy storage like SAN arrays. Many companies rely on third-party solutions to manage backup and disaster recovery in production. However, proper planning to implement these solutions requires knowledge of the Kubernetes CSI and OAPD APIs. This course walks the student through the recommended steps of configuring and managing storage services for container and Kubernetes services. Course content coverage Deploy Red Hat OpenShift Data Foundation in internal and external mode.  Provision non-shareable block storage to applications like databases.  Provision shareable block storage to applications like virtual machines.  Provision shareable file storage to such applications as CI/CD pipelines and AI/ML. Provision shareable object storage to applications, such as AI/ML and media streaming.  Provision storage for Red Hat OpenShift cluster services, such as monitoring and registry.  Monitor and expand storage capacity and performance. Attach and detach storage from an application for backup and archiving.  Create and access volume snapshots and clones.  Troubleshoot internal Ceph components of Red Hat OpenShift Data Foundation.  Perform backup and restore operations using the OADP API.
4.0 ngày

RH415 - Red Hat Security: Linux in Physical, Virtual and Cloud

Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments. Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements. Manage compliance with OpenSCAP. Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques. Proactively identify and resolve issues with Red Hat Insights. Monitor activity and changes on a server with Linux Audit and AIDE. Protect data from compromise with USBGuard and storage encryption. Manage authentication controls with PAM. Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues. Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Tower.
4.0 ngày

Bản quyền thuộc về Trainocate Việt Nam

back to top