Java Training Courses in Indonesia

Java Training Courses

Online or onsite, instructor-led live Java training courses demonstrate through hands-on practice how to develop applications with Java.

Java training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Java trainings in Indonesia can be carried out locally on customer premises or in NobleProg corporate training centers.

NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Java Course Outlines in Indonesia

Course Name
Duration
Overview
Course Name
Duration
Overview
7 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at Java developers who wish to use JVM tools and features to run Java programs. By the end of this training, participants will be able to:
  • Understand JVM and how it works.
  • Learn about reflection and the different memory areas.
  • Understand how to use the JVM tool interface.
  • Use JVM to run Java programs on any device or operating system.
14 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at programmers who wish to use Java 16 to build, manage, and package Java applications. By the end of this training, participants will be able to:
  • Learn and understand the new features and changes from the older versions of Java to Java 16.
  • Learn Java fundamental concepts and use them to build Java applications.
14 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at developers who wish to learn and apply the basics of Continuous Integration for Java. By the end of this training, participants will be able to:
  • Learn and understand CI for a Java project.
  • Build a CI system for Java.
21 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at intermediate to advanced-level developers who wish to develop microservices using Spring Boot, Docker, and Kubernetes. By the end of this training, participants will be able to:
  • Understand the microservices architecture.
  • Build production-ready microservices using Spring Boot.
  • Understand the role of Docker in microservices.
  • Set up Kubernetes cluster to deploy microservices.
14 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at programmers, java developers, and anyone who wishes to use Vaadin to develop and deploy applications. By the end of this training, participants will be able to:
  • Setup and configure a Vaadin project.
  • Understand the fundamentals of Vaadin in developing applications.
  • Use Vaadin to develop applications.
21 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at Java programmers who wish to learn about Guava and how to utilize Guava in programming. By the end of this training, participants will be able to:
  • Learn how to use Guava in Java programming.
  • Utilize Guava to facilitate standard coding practices.
  • Make easy to read and concise Java codes.
14 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at developers who wish to use NetBeans to develop applications with Java and other programming languages. By the end of this training, participants will be able to:
  • Learn about NetBeans and how it works.
  • Learn how to use NetBeans in Java programming.
  • Use NetBeans to create templates and projects.
14 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at software architects and web developers who wish to use RabbitMQ as a messaging middle-ware and program in Java using Spring to build applications. By the end of this training, participants will be able to:
  • Use Java and Spring with RabbitMQ to build applications.
  • Design asynchronous message driven systems using RabbitMQ.
  • Create and apply queues, topics, exchanges, and bindings in RabbitMQ
28 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at developers who wish to containerize their Java EE 8 applications and run them as microservices in the cloud. By the end of this training, participants will be able to:
  • Build and deploy Java microservices in Docker containers.
  • Manage Docker containers using Kubernetes.
  • Integrate microservices with an existing monolithic system.
  • Monitor, test, and secure microservices.
  • Troubleshoot containers and orchestration environments.
28 hours
This instructor-led, live training in Indonesia is designed for anyone interested in learning Java for the purpose of test automation. It is a streamlined, intensive course with plenty of hands-on exercises to get participants ramped up quickly with the essential programming skills needed to apply to software automation testing. The focus is on the Java fundamentals which can be directly and immediately applied to test automation. This course does not cover in depth test automation frameworks such as Selenium. It also bypasses the conventional "Hello World" approach to learning Java, as this is not a course on application development. This course is squarely aimed at getting participants up and running quickly with test automation. If you are already versed in Java and wish to get straight into testing with Selenium, please check out: Introduction to Selenium (https://www.nobleprog.com/introduction-selenium-training).
14 hours
This course teaches the practical use of Hibernate for persisting Java objects in a relational database.
14 hours
Applications for the Android platform are developed primarily in Java. This course was developed for software programmers with a strong OOP background (whether in PHP, Scala, C++, C# or Objective C) that plan to learn how to develop Java applications for the android platform. This course covers the Java programming language grammar and focuses on those specific Java capabilities the android platform uses more than others.
21 hours
JUnit is a framework to write repeatable tests and do unit testing for Java language.
28 hours
During the training participant will know the specific use of selected issues, the basic problems encountered when using them, and the role of the application model. The training also includes a basic knowledge of the language standard library functions. Training requires knowledge of the development environment IDE used to build Java applications (e.g.. Eclipse, Netbeans). Training does not include a user interface issues.
28 hours
The course covers the basics of Java development and introduces the Apache Maven software project management and comprehension tool.
7 hours
Introduces contect for Advanced java programmers, usually developing large scale applications, frameworks or libraries. This course is mostly labs (around 60%), the rest is discussions and presentation. We mostly use the newest version of Java for this course, but it can also be delivered as a private course on older versions of Java.
7 hours
Participants who are already Java programmers who want to extend their horizon and used more Java language concepts.
14 hours
Description The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security). The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves. The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn to use various security features of the Java development environment
  • Have a practical understanding of cryptography
  • Learn about typical coding mistakes and how to avoid them
  • Get information about some recent vulnerabilities in the Java framework
  • Get sources and further readings on secure coding practices
Audience Developers
21 hours
Description Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks. General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5. The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of all components is presented through practical exercises, where participants can try out the discussed APIs and tools for themselves. Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn client-side vulnerabilities and secure coding practices
  • Learn to use various security features of the Java development environment
  • Have a practical understanding of cryptography
  • Learn about typical coding mistakes and how to avoid them
  • Get information about some recent vulnerabilities in the Java framework
  • Get practical knowledge in using security testing tools
  • Get sources and further readings on secure coding practices
Audience Developers
21 hours
Even experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java. The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves. The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Understand security concepts of Web services
  • Learn to use various security features of the Java development environment
  • Have a practical understanding of cryptography
  • Understand security solutions of Java EE
  • Learn about typical coding mistakes and how to avoid them
  • Get information about some recent vulnerabilities in the Java framework
  • Get practical knowledge in using security testing tools
  • Get sources and further readings on secure coding practices
Audience Developers
28 hours
Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks. General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5. The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. Security issues of Java Enterprise Edition are presented through various exercises explaining both declarative and programmatic security techniques in JEE. Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn client-side vulnerabilities and secure coding practices
  • Learn to use various security features of the Java development environment
  • Have a practical understanding of cryptography
  • Understand security concepts of Web services
  • Understand security solutions of Java EE
  • Learn about typical coding mistakes and how to avoid them
  • Get information about some recent vulnerabilities in the Java framework
  • Get practical knowledge in using security testing tools
  • Get sources and further readings on secure coding practices
Audience Developers
28 hours
To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform secure coding expertise. Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation. Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn client-side vulnerabilities and secure coding practices
  • Learn to use various security features of the Java development environment
  • Have a practical understanding of cryptography
  • Realize the severe consequences of unsecure buffer handling
  • Understand the architectural protection techniques and their weaknesses
  • Learn about typical coding mistakes and how to avoid them
  • Be informed about recent vulnerabilities in various platforms, frameworks and libraries
  • Get sources and further readings on secure coding practices
Audience Developers
28 hours
Even experienced programmers do not master by all means the various security services offered by their development platforms, and are likewise not aware of the different vulnerabilities that are relevant for their developments. This course targets developers using both Java and PHP, providing them essential skills necessary to make their applications resistant to contemporary attacks through the Internet. Levels of Java security architecture are walked through by tackling access control, authentication and authorization, secure communication and various cryptographic functions. Various APIs are also introduced that can be used to secure your code in PHP, like OpenSSL for cryptography or HTML Purifier for input validation. On server side, the best practices are given for hardening and configuring the operating system, the web container, the file system, the SQL server and the PHP itself, while a special focus is given to client-side security through security issues of JavaScript, Ajax and HTML5. General web vulnerabilities are discussed by examples aligned to the OWASP Top Ten, showing various injection attacks, script injections, attacks against session handling, insecure direct object references, issues with file uploads, and many others. The various Java- and PHP-specific language problems and issues stemming from the runtime environment are introduced grouped into the standard vulnerability types of missing or improper input validation, improper use of security features, incorrect error and exception handling, time- and state-related problems, code quality issues and mobile code-related vulnerabilities. Participants can try out the discussed APIs, tools and the effects of configurations for themselves, while the introduction of vulnerabilities are all supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to correct the bugs and apply mitigation techniques, and introducing the use of various extensions and tools. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn client-side vulnerabilities and secure coding practices
  • Learn to use various security features of the Java development environment
  • Have a practical understanding of cryptography
  • Learn to use various security features of PHP
  • Understand security concepts of Web services
  • Get practical knowledge in using security testing tools
  • Learn about typical coding mistakes and how to avoid them
  • Be informed about recent vulnerabilities in Java and PHP frameworks and libraries
  • Get sources and further readings on secure coding practices
Audience Developers
21 hours
This training course introduces the core DevOps concepts and principles as well as the ways to stand up the DevOps practice in your organization. It is specifically focused on projects on the Java Platform. Upon completion of this training course, students will have a fundamental understanding of DevOps’ value proposition; they will also gain practical experience working with select DevOps tools, including Puppet, Jenkins, Git and others. This training course is supplemented by hands-on labs that help attendees reinforce their theoretical knowledge of the learned material. Topics:
  • DevOps practices and tools
  • Puppet
  • Technical introduction to cloud computing
  • Jenkins
28 hours
Google Web Toolkit (GWT or GWT Web Toolkit) is a set of open-source tools for building, optimizing and maintaining complex JavaScript browser-based applications in Java. GWT is used by many products at Google, including Google AdWords and Google Wallet. In this instructor-led, live training, participants will learn the GWT programming concepts needed to get a web application up and running. By the end of this training, participants will be able to
  • Write client-side AJAX applications in Java and deploy them as JavaScript across multiple browsers (desktop, Android, iPhone, etc.)
  • Develop a high-performance web application while overcoming the idiosyncrasies of browser behavior, XMLHttpRequest, and JavaScript
  • Understand and overcome the challenges of Ajax programming
  • Use GWT's tools to optimize a web application
Audience
  • Front-end web developers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
14 hours
In this instructor-led, live training in Indonesia, participants will learn how to use Vert.x to create an asynchronous, event-based web application. By the end of this training, participants will be able to:
  • Understand and use the different components (core, web, client, etc.) in the Vert.x stack.
  • Use Vert.x to create network utilities, HTTP/REST microservices, high volume event processing, back-end message-bus applications, etc.
  • Execute an app that can handle high concurrency using minimal kernel threads.
  • Use Vert.x's APIs to support Java, JavaScript, Groovy, Ruby, Ceylon, Scala, Kotlin, etc.
  • Unit test asynchronous code with Vert.x-Unit.
  • Deploy and scale an app with minimal hardware.
14 hours
In this instructor-led, live training in Indonesia, participants will learn the advantages and functions of Java 9, Spring, Jersey, and RxJava 2.0 in developing reactive applications as they step through the creation and deployment of a real-life reactive application using Java 9's flow API, Spring, the Akka framework, and RxJava 2.0 functional reactive programing library. By the end of this training, participants will be able to:
  • Understand the importance and significance of reactive programing in applications and systems development.
  • Run Unit test on RxJava 2.0.
  • Use the Akka framework under reactive programing principles.
  • Employ Spring to handle the development of concurrent applications.
  • Use Java 9's flow API to develop reactive apps.
14 hours
ReactiveX is a comprehensive library for creating asynchronous data streams using observable sequences. It enables developers to take advantage of observable streams and their ability to capture emitted events and execute functions accordingly. This instructor-led, live training introduces participants to ReactiveX's comprehensive library for developing responsive applications and walks participants through a series of cases, demonstrating the usefulness and functionality of key features of ReactiveX. By the end of this training, participants will be able to:
  • Understand the reactive programing paradigm and the functionality of observables and their common use when developing UI heavy applications
  • Successfully setup an environment for ReactiveX
  • Create observable events form a multitude of varying items
  • Apply ReactiveX's transforming and filtering functions
Audience
  • Developers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
7 hours
Reactive programing is an asynchronous programing paradigm that focuses on data streams and the propagation of data by establishing a defined dependency between the underlying execution models and the emitted data streams from one component to another. RxJS is one of the most comprehensive reactive programing libraries for managing UI events, asynchronous HTTP requests, and other data streams. In this instructor-led, live training, participants will become familiar with RxJS's tools and functions as they apply them to a variety of coding problems associated with interactive-heavy based mobile and web apps. Participants will also learn how to create and deploy a UI heavy web app. By the end of this training, participants will be able to:
  • Understand the reactive programing paradigm and its usefulness for UI heavy application development.
  • Build UI heavy applications with scalability, flexibility, and responsiveness in mind.
  • Easily and freely create and manage a multitude of UI events, asynchronous HTTP requests, and other data streams.
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
7 hours
Apache Shiro is a powerful Java security framework that performs authentication, authorization, cryptography, and session management. In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro. By the end of this training, participants will be able to:
  • Use Shiro's API to secure various types of applications, including mobile, web and enterprise
  • Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc.
Audience
  • Developers
  • Security engineers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice

Last Updated:

Online Java courses, Weekend Java courses, Evening Java training, Java boot camp, Java instructor-led, Weekend Java training, Evening Java courses, Java coaching, Java instructor, Java trainer, Java training courses, Java classes, Java on-site, Java private courses, Java one on one training

Course Discounts

No course discounts for now.

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in Indonesia!

As a Business Development Manager you will:

  • expand business in Indonesia
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in joining a growing organisation and running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions