JAVA SE 8 Fundamentals

Description

This program allows participants to be introduced to object-oriented programming using the Java language and, through hands-on exercises, begin to build a knowledge base to boost their development career.

Addressed to

  • Anyone interested in learning about the Java programming language.

Duration

40 hours

Modalities

  • Face-to-face

  • Virtual live through digital platforms

  • on site

Related Courses

  • Java SE 8 Programmer

It includes

  • 40 hours of training

  • Trained instructors

  • Participant manual in digital format

  • Proof of participation

Temary


Lesson 1: What is a Java program?

  • Introduction to computer programs

  • Key features of the Java language

  • The Java technology and development environment

  • Run/test a Java program

Lesson 2: Creating a Java Main Class

  • java classes

  • main method

Lesson 3: Data in the cart

  • Introducing variables

  • work with strings

  • working with numbers

  • Manipulate numeric data

Lesson 4: Managing Multiple Items

  • work with conditions

  • Work with a list of items

  • Processing a list of items

Lesson 5: Description of objects and classes

  • Work with objects and classes

  • Definition of fields and methods

  • Declaration, instantiation and initialization of objects

  • Work with object references

  • Do more with arrays

  • Introducing the NetBeans IDE

  • Soccer League Use Case Presentation

Lesson 6: Manipulate and Format Data in Your Program

  • Using the String class

  • Using the Java API Documents

  • Using the StringBuilder class

  • More on primitive data types

  • The remaining numeric operators

  • Promote and cast variables

Lesson 7: Creating and Using Methods

  • using methods

  • Method arguments and return values

  • Static methods and variables

  • How arguments are passed to a method

  • overload a method

Lesson 8: Using Encapsulation

  • Access control

  • encapsulation

  • constructor overload

Lesson 9: More about conditionals

  • Relational and conditional operators

  • More ways to use if/else constructs

  • Use of change statements

  • Using the NetBeans debugger

Lesson 10: More on Arrays and Loops

  • work with dates

  • Parse the array of arguments

  • Two-dimensional arrays

  • Alternative loop constructions

  • nesting loops

  • The ArrayList class

Lesson 11: Using Inheritance

  • Inheritance Overview

  • Work with subclasses and superclasses

  • Overriding methods in the superclass

  • Introducing polymorphism

  • Create and extend abstract classes

Lesson 12: Using Interfaces

  • Polymorphism in core JDK classes

  • Use of interfaces

  • Using the list interface

  • Presentation of Lambda expressions

Lesson 13: Exception Handling

  • Exception Handling: Overview

  • Exception Propagation

  • Catch and throw exceptions

  • Handling multiple exceptions and errors

You want more information about this curse? Contact us!

By sending this message you agree to our Privacy Notice

Intranet

Renewable Energy

What is it?

We offer specialized services of photovoltaic solar energy that is obtained directly from solar radiation through a solar panel that in turn transforms it into electric power.

Who is it for?

All those companies, businesses and homes that want to reduce costs in their day to day and want to have a sustainability plan to support the environment as well as their economy.

Why us?

1.- Support from a team committed to the environment.
2.- GSB will provide you with the best solution according to your needs
3.- Control and monitoring as well as operation reports, maintenance of preventive and corrective equipment.

Cybersecurity

What is it?

We offer specialized services in Cyber ​​​​Security in real time with the best tools, alliances and technology for the protection of your information and operation.

Who is it for?

All those companies that use technology on a daily basis and wish to have the guarantee of a team with vast experience, knowledge, kindness, efficiency and speed.

Why us?

1.- We identify your needs and proceed to define the required actions, through the use of analysis tools such as: diagnostic interviews, concept tests, simulators and questionnaires.

2.- We have the best specialists in the market, which allows us to provide you with a service that guarantees your protection against threats.

3.- We implement processes that allow timely feedback, through which we manage to mitigate risks and protect the computer security of your company.