This course will prepare you for the R5 Application Security and Workflow certification exam, the second of three exams required for a R5 CLP Application Developer.
This course covers advanced R5 Notes and Domino development and design techniques. The opening module covers factors that impact the order of execution of field formulas. This course also covers techniques for using list concatenation and list functions, and presents advanced list manipulation techniques - including dynamic tables. Other topics include functions and techniques for retrieving data and applications for user profile documents. This course presents and demonstrates the full Domino security model starting from the top-level server security, working through database and document security, and ending with field level security. The security modules also cover several new workstation security features, including ECLs. This course covers the integration of Notes mail into your applications, the use of the Workflow Design Template, and design techniques for workflow applications. Design management topics include creating and using master design templates, using a design synopsis and hiding the design of a database. The course material is supported by numerous real-world demonstrations and effective student activities.
Audience and Prerequisites
The recommended prerequisites are:
A single R5 Domino Designer client is required to use this course. Unrestricted access to the Internet is required to get instructor support.
Module 1 - Events & Document States & Formula Execution
As a Domino developer, it is important to understand the events that trigger the execution of formulas and the order in which they occur. Module 1 covers Notes objects, events, document states and the document state functions. Module 1 also discusses factors that impact the order of execution of field formulas.
Module 2 - Working with Lists and Dynamic Tables
The Notes formula Language provides many functions that operate on lists of values. Other functions provide specific list manipulation capabilities. One powerful set of list manipulation techniques is to allow a user to add, modify, and delete items in a dynamic table. As it is both common and useful to present information in a tabular format, there are many applications for these list manipulation techniques. Module 2 covers the basics of list concatenation, list manipulation functions, and advanced list manipulation techniques - including dynamic tables.
Module 3 - Data Lookups and Profile Documents
Module 3 covers functions and techniques that you can use to lookup and retrieve data. @DBColumn and @DBLookup are featured in this module. Techniques for fast data lookups are demonstrated and used. Other topics include using the @PickList function to present names or a custom dialog window and using user profile documents to track user specific information.
Module 4 - Domino Security
Module 4 describes the Domino Security Model and discusses the security features that Notes administrators primarily control on the Notes servers and client workstations. Module 4 presents this material in an order that is based on the Domino Security Model.
Module 5 - Database Security
Module 5 covers the security features that you, as a Domino developer, can build into your Domino applications. It continues our coverage of Domino Security by focusing on those features that apply to Domino databases. This module presents material, demonstrations, and activities for each of the security tools available for Domino databases and discusses the techniques for applying these tools. The material continues in the order of the Domino Security Model, starting with the database Access Control List, working through database and document security, and ending with field-level security.
Module 6 - Workflow Techniques
Module 6 provides in-depth coverage of how Notes mail works and how to integrate mail into your Notes workflow applications. Module 6 also describes and demonstrates several useful workflow design techniques and introduces a Workflow Design Template, which you can use to design and develop a workflow application.
Module 7 - Design Management
Module 7 discusses several design-management tools and techniques. It describes and demonstrates how to create and use a Master Design Template, how to hide the design of a database, and how to generate a design synopsis.
Phone: 561-953-0096 • Fax: 561-953-0096
• Email: firstname.lastname@example.org
Copyright and Privacy Info.