06/19/2023 - 06/21/2023
10:00 AM - 06:00 PM
Online Virtual Class
USD $2,390.00
Enroll
07/17/2023 - 07/19/2023
10:00 AM - 06:00 PM
Online Virtual Class
USD $2,390.00
Enroll
Topics
 
  • Browsers and Servers
  • Serverside Includes
  • Common Gateway Interface
  • Accessing Databases
  • Control Input to CGI Applications
  • Stateful CGI Applications
  • Perl CGI Module
  • Advanced HTML Interface Tools
  • Forms
  • CGI/Browser Interaction
  • Appendix: Overview of Internet Security
Audience
  Web site developers wanting to create interactive Web pages.
Prerequisites
  Familiarity with HTML forms. Programming experience is required. Basic UNIX skills and the ability to use vi or a basic text editor are also required.
Duration
  Three days.

Outline for CGI Programming using Perl Training

1.Browsers and Servers

 

  • WEB Browsers and Servers
  • URLS
  • Hypertext Transfer Protocol (HTTP)

 

2. Serverside Includes

 

  • Serverside Includes: Why?
  • The exec Command
  • Example

 

3. Common Gateway Interface

 

  • What is CGI?
  • Why use CGI applications?
  • Environment Variables
  • Managing CGI Files

 

4. Accessing Databases

 

  • Browser Database Access
  • Static Flat-File Database
  • Perl DBM Interface
  • Third Party RDBMS application

 

5. Control Input to CGI Applications

 

  • ISINDEX, GET, and POST
  • GET Method
  • POST Method

 

6. Stateful CGI Applications

 

  • Stateful vs. Stateless
  • Why Use Stateful CGI Applications?
  • Stateful Access with a Cookie

 

7. Perl CGI Module

 

  • CGI.pm Module
  • Perl Subroutines
  • Perl Objects
  • Perl Methods
  • Commonly Used Methods

 

8. Advanced HTML Interface Tools

 

  • Image Maps
  • Tables
  • Multiple Form Interaction
  • Frames
  • GD Library

 

9. Forms

 

  • Form Objects
  • Static Forms
  • Dynamic Forms

 

10. CGI/Browser Interaction

 

  • References
  • Animation Description
  • Server Push
  • Client Pull The Symbol Table

 

11. Appendix: Overview of Internet Security

 

  • Two-dimensional Arrays
  • Security Issues
  • Platform Differences
  • Cryptography
  • Encryption Keys
  • Controlling User Access
  • "Trusted Server"
  • Developing an e-mail interface