Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Start with plain ASP.NET MVC and a couple of free add-ins, and you'll finish with a complete non-WF workflow application with fleshed-out Identity 2 security, hierarchical data structured as a tree-based UI, parent-child views with multiple child entities, child editing in Bootstrap modals, AutoComplete dropdown lists, workflow rules built into entities, an audit trail, snapshotting, cloaking, and concurrency handling.
This course teaches a lot of asked-for solutions, like fleshing-out Identity 2 into a complete security application with all the features and functionality hinted-to but not fleshed-out in the scaffolded code; building tree structures from hierarchical data and embedding business rules for its behavior; adding server-side searching, sorting, and pagination to Index views; creating parent-child views with multiple child entity collections; adding, editing, and deleting child entities using Bootstrap modal dialogs; creating Google-like AutoComplete dropdown suggestion lists; snapshotting temporarily-related data; adding workflow rules to entities and incorporating them into a unified work list user interface; creating an embedding an audit trail of user activities; cloaking data rather than deleting it; and handling multi-user concurrency.
This course teaches a lot of asked-for solutions, like fleshing-out Identity 2 into a complete security application with all the features and functionality hinted-to but not fleshed-out in the scaffolded code; building tree structures from hierarchical data and embedding business rules for its behavior; adding server-side searching, sorting, and pagination to Index views; creating parent-child views with multiple child entity collections; adding, editing, and deleting child entities using Bootstrap modal dialogs; creating Google-like AutoComplete dropdown suggestion lists; snapshotting temporarily-related data; adding workflow rules to entities and incorporating them into a unified work list user interface; creating an embedding an audit trail of user activities; cloaking data rather than deleting it; and handling multi-user concurrency.