Short courses

Microservices architecture: Design Patterns and Techniques

  • Date: - -
  • Venue: UDSM Kijitonyama Campus
  • Cost: TZS 3,200,000
  • Contact: 0715677873 | oscar.mashauri@udsm.ac.tz
  • Register
Course Introduction

Microservices - also known as the microservice architecture - is a major architectural pattern in the software industry that structures an application as a collection of services that are.

  • Scalability, Availability and Resiliency
  • Loosely coupled
  • Independently deployable
  • Decentralized governance
  • Highly maintainable and testable
  • Organized around business capabilities
  • Failure isolation and Auto-Provisioning
  • Continuous delivery through DevOps
  • Owned by a small team

The microservice architecture enables the rapid, frequent, and reliable delivery of large, complex applications. It also enables an organization to evolve its technology stack.

Why do we need Microservices and what problems do they come to solve? Instructor will start from basics and go to the most advanced concepts such as Service Mesh and CI/CD.

At the end of this course, you'll become expert in Microservices, and you'll be able to design advanced, robust Microservices-based systems and convert a monolithic application into microservices.

Course Content

Introduction
  • What are microservices?
  • Microservices applicability
  • Application architecture patterns
Decomposition Patterns
  • Decompose by business capability
  • Decompose by subdomain
  • Decompose by Transactions
  • Strangler pattern
  • Sidecar pattern
  • Self-contained service
  • Service per team
Refactoring to microservices
  • Strangler Application
  • Anti-corruption layer
Integration Patterns
  • API Gateway Pattern
  • Process Aggregator Pattern
  • Edge Pattern
Data Patterns
  • Database per Service
  • Shared database
  • Distributed Data
  • Saga
  • API Composition
  • CQRS
  • Domain event
  • Event sourcing
Observability Patterns
  • Log aggregation
  • Application metrics
  • Audit logging
  • Distributed tracing
  • Exception tracking
  • Health check
Cross-Cutting Concern Patterns
  • External Configuration
  • Service discovery Pattern
  • Circuit Breaker Pattern
Microservices Security
  • Identity Management and Access Control
  • Token-Based Security
  • Secure communication between Microservices
  • VMs Security
Deployment patterns
  • Multiple service instances per host
  • Service instance per host
  • Service instance per VM
  • Service instance per Container
  • Serverless deployment
  • Service deployment platform

Who should attend this course?

  • Developers, DevOps engineers, and IT pros
  • Anyone who interested and has programming skills also comfortable with CMD

Prerequisites

  • Basic software development knowledge
  • Experience with Docker Containers will make learning, but is completely optional
  • Come with your own Laptop computer with minimum of 250GB HD free space and 8GB RAM
  • Should know how to use your own computer
  • Experience developing software in the industry would be a plus as it would help you appreciate some technical challenges better, but is completely optional

Tools and Working Environment

  • All software tools which will be used during training are Open-source software
  • Also, Participants will be provided a Cloud-based Virtual Environments during hands-on practice.

Log in