Design Patterns in Go

9h 47m 37s
English
Paid

Course description

This course provides an overview of all the Gang of Four (GoF) design patterns as outlined in their seminal book, together with modern-day variations, adjustments, discussions of intrinsic use of patterns in the language. Design Patterns are reusable solutions to common programming problems. They were popularized with the 1994 book Design Patterns: Elements of Reusable Object-Oriented Software by Erich Gamma, John Vlissides, Ralph Johnson and Richard Helm (who are commonly known as a Gang of Four, hence the GoF acronym).

Read more about the course

The original book GoF book used C++ and Smalltalk for its examples, but, since then, design patterns have been adapted to every programming language imaginable: C#, Java, Swift, Python, JavaScript and now — Go!

The appeal of design patterns is immortal: we see them in libraries, some of them are intrinsic in programming languages, and you probably use them on a daily basis even if you don't realize they are there.

This course provides a comprehensive overview of Design Patterns in Go from a practical perspective. This course in particular covers patterns with the use of:

  • The latest versions of the Go programming language

  • Use of modern programming libraries and frameworks

  • Use of modern developer tools such as JetBrains GoLand

  • Discussions of pattern variations and alternative approaches

What Patterns Does This Course Cover?

This course covers all the GoF design patterns. In fact, here's the full list of what is covered:

  • SOLID Design Principles: Single Responsibility Principle, Open-Closed Principle, Liskov Substitution Principle, Interface Segregation Principle and Dependency Inversion Principle

  • Creational Design Patterns: Builder, Factories (Factory Method and Abstract Factory), Prototype and Singleton

  • Structrural Design Patterns: Adapter, Bridge, Composite, Decorator, Façade, Flyweight and Proxy

  • Behavioral Design Patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template Method and Visitor

Who Is the Course For?

This course is for Go developers who want to see not just textbook examples of design patterns, but also the different variations and tricks that can be applied to implement design patterns in a modern way. For example, the use of the Composite pattern allows structures to be iterable and lets scalar objects masquerade as if they were collections.

Presentation Style

This course is presented as a (very large) series of live demonstrations being done in JetBrains GoLand and presented using the Kinetica rendering engine. Kinetica removes the visual clutter of the IDE, making you focus on code, which is rendered perfectly, whether you are watching the course on a big screen or a mobile phone. 

Most demos are single-file, so you can download the file attached to the lesson and run it in GoLand, or another IDE of your choice (or just run them from the command-line).

This course does not use UML class diagrams; all of demos are done via live coding.

Requirements:
  • Good understanding of Go
  • Familiarity with latest Go language features
  • Good understanding of software design principles
  • A computer with latest Go compiler and (hopefully) an IDE
Who this course is for:
  • Software engineers
  • Web developers
  • Designers
  • Architects

What you'll learn:

  • Recognize and apply design patterns
  • Refactor existing designs to use design patterns
  • Reason about applicability and usability of design patterns

Watch Online

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 110 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing

Watch Online Design Patterns in Go

0:00
/
#1: Introduction

All Course Lessons (110)

#Lesson TitleDurationAccess
1
Introduction Demo
04:03
2
Overview
01:17
3
Single Responsibility Principle
12:18
4
Open-Closed Principle
19:07
5
Liskov Substitution Principle
10:11
6
Interface Segregation Principle
08:30
7
Dependency Inversion Principle
15:01
8
Summary
02:37
9
Overview
01:43
10
Builder
12:53
11
Builder Facets
10:14
12
Builder Parameter
06:55
13
Functional Builder
05:11
14
Summary
01:14
15
Overview
02:50
16
Factory Function
03:28
17
Interface Factory
04:55
18
Factory Generator
09:38
19
Prototype Factory
03:54
20
Summary
00:57
21
Overview
01:52
22
Deep Copying
05:37
23
Copy Method
05:31
24
Copy Through Serialization
05:39
25
Prototype Factory
07:05
26
Summary
00:32
27
Overview
02:56
28
Singleton
05:57
29
Problems with Singleton
04:22
30
Singleton and Dependency Inversion
05:31
31
Summary
01:32
32
Overview
01:58
33
Adapter
13:31
34
Adapter Caching
07:03
35
Summary
00:48
36
Overview
02:22
37
Bridge
08:06
38
Summary
00:50
39
Overview
01:26
40
Geometric Shapes
06:52
41
Neural Networks
08:07
42
Summary
00:46
43
Overview
01:51
44
Multiple Aggregation
09:10
45
Decorator
10:31
46
Summary
00:59
47
Overview
01:54
48
FaГ§ade
08:04
49
Summary
01:13
50
Overview
02:03
51
Text Formatting
14:43
52
User Names
12:18
53
Summary
00:51
54
Overview
02:05
55
Protection Proxy
04:10
56
Virtual Proxy
06:32
57
Proxy vs Decorator
01:24
58
Summary
00:55
59
Overview
03:00
60
Method Chain
13:50
61
Command Query Separation
01:26
62
Broker Chain
16:35
63
Summary
00:58
64
Overview
02:23
65
Command
06:20
66
Undo Operations
04:14
67
Composite Command
12:25
68
Functional Command
03:04
69
Summary
00:50
70
Overview
02:47
71
Lexing
07:25
72
Parsing
11:18
73
Summary
01:03
74
Overview
01:07
75
Iteration
08:21
76
Tree Traversal
12:20
77
Summary
00:45
78
Overview
01:27
79
Chat Room
12:49
80
Summary
00:57
81
Overview
01:30
82
Memento
05:06
83
Undo and Redo
10:18
84
Memento vs Flyweight
00:49
85
Summary
01:46
86
Overview
01:30
87
Observer and Observable
09:42
88
Property Observers
09:44
89
Property Dependencies
06:37
90
Summary
01:06
91
Overview
01:55
92
Classic Implementation
11:08
93
Handmade State Machine
10:19
94
Switch-Based State Machine
05:42
95
Summary
01:15
96
Overview
01:38
97
Strategy
10:21
98
Summary
00:36
99
Overview
01:52
100
Template Method
07:01
101
Functional Template Method
03:57
102
Summary
00:58
103
Overview
02:22
104
Intrusive Visitor
08:52
105
Reflective Visitor
06:26
106
Dispatch
01:21
107
Classic Visitor
14:26
108
Summary
00:59
109
Course Summary
07:45
110
End of Course
01:10

Unlock unlimited learning

Get instant access to all 109 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

Working with Microservices in Go (Golang)

Working with Microservices in Go (Golang)

Sources: udemy
For a long time, web applications were usually a single application that handled everything—in other words, a monolithic application. This monolith handled user authentication, ...
10 hours 51 minutes 24 seconds
Working with React and Go (Golang)

Working with React and Go (Golang)

Sources: udemy
React and Go are something of a match made in heaven. React is the world's most popular JavaScript library for building Single Page Applications, and Go is uniquely well-suited ...
24 hours 48 minutes 43 seconds
For the Love of Go: Book/Video Bundle

For the Love of Go: Book/Video Bundle

Sources: John Arundel
Hello, and welcome to learning Go! It's great to have you here. This is the bundled edition of ‘For the Love of Go’, a book introducing the Go programming langu
6 hours 12 minutes 54 seconds
Go Programming (Golang): The Complete Developer's Guide

Go Programming (Golang): The Complete Developer's Guide

Sources: zerotomastery.io
Learn Golang from scratch, from an industry expert. Build real-world apps. You'll learn the fundamentals all the way to advanced concurrency so that you go from
13 hours 10 minutes 35 seconds
Web Authentication, Encryption, JWT, HMAC, & OAuth With Go

Web Authentication, Encryption, JWT, HMAC, & OAuth With Go

Sources: udemy
An Intermediate Level Course for the Go Programming Language covering Web Authentication, Encryption, JWT, HMAC, & OAuth. Google's Go Programming Language is one of the fastest ...
14 hours 3 minutes 23 seconds