Build REST APIs with Spring Data REST Training Course

Overview

Spring is an open source framework written in Java. REST web services are resources that connect applications and services to communicate concurrently. Incorporating REST web services in the Spring environment allows developers to abstract data store interactions into a common repository API.

This instructor-led, live training (online or onsite) is aimed at web developers who wish to build REST APIs with Spring Data REST.

By the end of this training, participants will be able to:

  • Build REST APIs with Spring Data REST.
  • Expose RESTful APIs with Spring Data REST.
  • Test and troubleshoot REST APIs using Postman.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.

Requirements

  • An understanding of the Spring Framework
  • Java programming experience

Audience

  • Web Developers

Course Outline

Introduction

Spring and REST Web Services

  • SOA and microservices
  • HATEOAS and HAL
  • What is Spring Data REST?

Preparing the Development Environment

  • Installing and configuring JDK
  • Installing and configuring Spring
  • Installing and configuring Postman

Spring Data REST

  • Creating tables, entities, and fields
  • Working with data sources
  • Creating repositories
  • Using POST and PUT
  • Configuring a path
  • Creating an API
  • Implementing an API
  • Exploring resources
  • Paging and sorting
  • Maintaining API exposure
  • Customizing JSON serialization
  • Applying custom finder methods

Microservice REST APIs

  • Creating a schema and project
  • Developing and fixing entities
  • Using associations
  • Creating repositories
  • Working with data sources

Testing with Postman

  • Creating resources
  • Customizing associations
  • Exposing resources

Securing APIs

  • Adding dependencies
  • Configuring authorization and authentication

Summary and Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *