!-- Header -->
techinaut instructor details
TECHINAUT

A LEVEL

4.5 (15)
NIELIT

Rest Assured API Testing

3 Months

The module is designed to equip a student to use computers for professional as well as day to day use. It provides theoretical background as well as in depth knowledge of Software/ packages.

Information Technology Tools and Network

9 Lessons

Information Technology Tools and Network

120 Hours - (Theory: 48 hrs + Practical: 72 hrs)

Information Technology Tools and Network

100+ students enrolled

Overview
Course Description

The module is designed to equip a student to use computers for professional as well as day to day use. It provides theoretical background as well as in depth knowledge of Software/ packages.

What you'll learn
  • Acquire confidence in using computers in Office and General Life.
  • Identify the basic components of computers and terminology.
  • Understand file management.
  • Create documents using word processor, spreadsheet & presentation software.
  • Understand computer networks, and browse the internet, content search, email and collaborate with peers.
  • Use e-Governance applications and use computer to improve existing skills and learn new skills.
  • Understanding Social Networking platform.
  • Using Internet for Digital Financial services
  • Develop knowledge about FutureSkills.
  • Understand the various financial services and be aware of the various schemes started by Government.
Requirements
  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.
Course Content
57 Lectures 10:56:11
  • Introduction to ComputerLecture 1.1 What is Web Services?

    Introduction to Computer 02:53
  • Introduction to ComputerLecture 1.2 Expalning Types of Web Services SOAP and REST

    Introduction to Computer 02:53
  • Introduction to ComputerLecture 1.3 What is wsdl ? Importance of it in Web Services

    Introduction to Computer 02:53
  • Introduction to ComputerLecture 1.4 Difference between WSDL and SOAP Protocol.

    Introduction to Computer 02:53
  • Introduction to Operating SystemLecture 2.1 SOAP UI Installation / Documentation

    Introduction to Operating System 02:53
  • Introduction to Operating SystemLecture 2.2 Calculator Web Service Example

    Introduction to Operating System 02:53
  • Introduction to Operating SystemLecture 2.3 Creating Test Suite and Test Cases

    Introduction to Operating System 02:53
  • Introduction to Operating SystemLecture 2.4 Local WebServices installation for Practice.

    Introduction to Operating System 02:53
  • Introduction to Operating SystemLecture 2.5 ExplaningWebServices operation in details

    Introduction to Operating System 02:53
  • Word ProcessingWord ProcessingLecture 3.1 Basics Assertion for Test Validation

    Word ProcessingWord Processing 02:53
  • Word ProcessingWord ProcessingLecture 3.2 Advance Assertion for validating responses

    Word ProcessingWord Processing 02:53
  • Word ProcessingWord ProcessingLecture 3.3 Strategies to use Xpath Assertion in test

    Word ProcessingWord Processing 02:53
  • Word ProcessingWord ProcessingLecture 3.4 Properties Access – Data Driven Strategies

    Word ProcessingWord Processing 02:53
  • Word ProcessingWord ProcessingLecture 3.5 Accessing Properties from Test Cases, Suit and Project Level

    Word ProcessingWord Processing 02:53
  • Word ProcessingWord ProcessingLecture 3.6 How to send value from response to another

    Word ProcessingWord Processing 02:53
  • Word ProcessingLecture 4.1 Introduction to Groovy Script Test Setup

    Word Processing 02:53
  • Word ProcessingLecture 4.2 Importance of Test Runner and Context Variable

    Word Processing 02:53
  • Word ProcessingLecture 4.3 Test runner method for get and set property

    02:53
  • Word ProcessingLecture 4.4 Accessing and Updating the properties through Groovy method.

    Word Processing 02:53
  • Word ProcessingLecture 4.5 Parsing the xml request and response with holder Application

    Word Processing 02:53
  • Word ProcessingLecture 4.6 Triggering the SOAP Request through Groovy Code.

    Word Processing 02:53
  • Word ProcessingLecture 4.7 Automate the Services(Practice).

    Word Processing 02:53
  • Word ProcessingLecture 4.8 Validating the Service response with Assertion

    Word Processing 02:53
  • Word ProcessingLecture 5.1 REST API Concept

    Word Processing 02:53
  • Word ProcessingLecture 5.2 REST API – Types of HTTP Methods

    Word Processing 02:53
  • Word ProcessingLecture 5.3 Practical Example on GET and POST

    Word Processing 02:53
  • Word ProcessingLecture 5.4 Important Notes on Google Map API

    Word Processing 02:53
  • Word ProcessingLecture 5.5 Sample code Google Add Place Download.

    Word Processing 02:53
  • Word ProcessingLecture 5.6 REST API Test Case building on SOAP UI

    Word Processing 02:53
  • Word ProcessingLecture 5.7 Exercise: Datadriving from custom properties

    Word Processing 02:53
  • Word ProcessingLecture 5.8 Exercise: Property transfer usage in REST Example

    Word Processing 02:53
  • Introduction to Internet and WWWLecture 6.1 JSON Script Assertion window – Automation

    Introduction to Internet and WWW 02:53
  • Introduction to Internet and WWWLecture 6.2 Parsing the JSON response for API Validation

    Introduction to Internet and WWW 02:53
  • Introduction to Internet and WWWLecture 6.3 Example on REST API Automation with JSON as Response

    Introduction to Internet and WWW 02:53
  • Introduction to Internet and WWWLecture 6.4 Example on REST API Automation with XML as Response

    Introduction to Internet and WWW 02:53
  • Social Networking and e-GovernanceLecture 7.1 Flicker API Introdution

    Social Networking and e-Governance 02:53
  • Social Networking and e-GovernanceLecture 7.2 JSON path extraction from responses

    Social Networking and e-Governance 02:53
  • Social Networking and e-GovernanceLecture 7.3 JSON Assertion on parsed responses

    Social Networking and e-Governance 02:53
  • Social Networking and e-GovernanceLecture 7.4 Advance Example on JSON Assertion

    Social Networking and e-Governance 02:53
  • Digital Financial Tools and ApplicationsLecture 8.1 Framework Design Plan

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.2 Understanding Preparing API Test from the functional document

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.3 Rest API project in SOAP UI

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.4 Create Test Cases from the defined API

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.5 End to End Testing on Library API

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.6 Installation Eclipse and Java for API automation testing

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.7 Creation of Java API project from Framework

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.8 WSDL project concept for java test setup

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.9 TestNG Integration to the Java API Tests

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.10 Different combination of WSDL API

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.11 TestNG.xml file for one single Trigger point to all test

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.12 TestNG Command

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.13 Command to Trigger TestNG Java API Test

    Digital Financial Tools and Applications 02:53
  • Digital Financial Tools and ApplicationsLecture 8.14 HTML Report and Jenkins installation.

    Digital Financial Tools and Applications 02:53
  • Futureskills and Cyber SecurityLecture 9.1 Basics of Pro version

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 9.2 Data Sources

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 9.3 Data Sink

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 9.4 Data Gen Type

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 9.5 Test Case Debugging, Breakpoint

    Futureskills and Cyber Security 02:53
  • Lecture 9.6 Reporting Technique

    02:53
  • Futureskills and Cyber SecurityLecture 9.7 Jasper Report and Web Recording

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 10.1 List of Security Test

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 10.2 Security Test Case.

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 10.3 Security Testing – Practical example

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 11.1 Database Concept

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 11.2 Creating Database

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 11.3 SOAP UI JDBC connection

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 11.4 SQL Quatries Testing with SOAP UI

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 11.5 SQL Builder- SOAP UI Pro

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 12.1 Performance Testing Tool used for Testing REST API

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 12.2 Putting Load on REST CALL

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 13.1 Quick execution

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 13.2 Simulate original HTTP(s) traffic

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 13.3 Compose HTTP(s) requests.

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 13.4 Setting breakpoints

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 13.5 Manipulate any HTTP(s) request or response

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 14.1 Timeline for performance analysis

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 14.2 Simulate HTTP compression

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 14.3 Flagging performance bottlenecks

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 14.4 Taking advantage of HTTP caching

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 14.5 Profiling the performance of your web app

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 15.1 Fiddler security add-ons

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 15.2 Automate SSL decryption

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 16.1 Archive and playback recorded trafficc

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 16.2 Filter captured traffic

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 16.3 Deep dive into session metrics

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 16.4 Capture all HTTP(s) traffic

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 17.1 Decrypt and decompress web sessions

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 17.2 Analyzing session data

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 17.3 Debug traffic on any system

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 17.4 Debug traffic from any client and browser

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 18.1 Extending Fiddler with Fiddler Script and .NET code

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 18.2 Fiddler extensions and add-ons

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 18.3 Adding inspectors

    Futureskills and Cyber Security 02:53
  • Futureskills and Cyber SecurityLecture 18.4 Creating rules

    Futureskills and Cyber Security 02:53
About Us
techinaut profile
TECHINAUT

A LEVEL

4.5 Instructor Rating
techinaut

100+ Courses

techinaut

20+ Faculty

techinaut

Industry Expert

techinaut

45000+ students enrolled

UI/UX Designer, with 7+ Years Experience. Guarantee of High Quality Work.

Skills: Web Design, UI Design, UX/UI Design, Mobile Design, User Interface Design, Sketch, Photoshop, GUI, Html, Css, Grid Systems, Typography, Minimal, Template, English, Bootstrap, Responsive Web Design, Pixel Perfect, Graphic Design, Corporate, Creative, Flat, Luxury and much more.

Available for:

  • 1. Full Time Office Work
  • 2. Remote Work
  • 3. Freelance
  • 4. Contract
  • 5. Worldwide
Reviews
techinaut
Nicole Brown

UX/UI Designer

4.5 Instructor Rating

“ This is the second Photoshop course I have completed with Cristian. Worth every penny and recommend it highly. To get the most out of this course, its best to to take the Beginner to Advanced course first. The sound and video quality is of a good standard. Thank you Cristian. “

Reply
Post A comment