Course details

Defensive Programmer: Defensive Techniques

Defensive Programmer: Defensive Techniques


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this course, learners discover the importance of exception handling, validation, and parameter checking in programming. Explore how to handle exceptions and apply validation in Java, Python, C#, and Javascript, as well as how to configure component trust and reuse code, in this 17-video course. Begin by learning how to apply exception handling effectively, and then take a look at validation techniques and procedures. Learners will explore reliability, resiliency, and recoverability and how it can be achieved in software engineering. Next, you will look at CDI/UDI (constrained data item/unrestrained data item), why it is important, and how it should be done. You will delve into parameter checking; using Java exception handling; using Python exception handling, and using Javascript exception handling. You will then explore using Java validation; Python validation; C# validation, and Javascript validation. In the final tutorials you will examine component trust, including when and how to achieve trust of components, and learn how to reuse code effectively and defensively.



Expected Duration (hours)
1.3

Lesson Objectives

Defensive Programmer: Defensive Techniques

  • discover the key concepts covered in this course
  • apply exception handling effectively
  • describe validation techniques and procedures
  • describe reliability, resiliency, and recoverability and how it can be achieved in software engineering
  • describe CDI/UDI, why it is important and how it should be done
  • apply parameter checking
  • use Java exception handling
  • use Python exception handling
  • use C# exception handling
  • use JavaScript exception handling
  • use Java validation
  • use Python validation
  • use C# validation
  • use JavaScript validation
  • describe component trust including when and how to achieve trust of components
  • describe how to reuse code effectively and defensively
  • summarize the key concepts covered in this course
  • Course Number:
    it_spdfpgdj_02_enus

    Expertise Level
    Beginner