Perl Training Courses

Perl Training

Perl Programming Language courses

Perl Course Outlines

Code Name Duration Overview
perl Perl Programming 21 hours This course gives a comprehensive introduction to Perl programming.
perltextman Text Manipulation using PERL 21 hours This course focuses on text manipulation using regular expressions in PERL. Practical application for text manipulation like processing data files and code files like C and Java will be used. The course will be project oriented where each day ends with creating a small project that parse C files, extract data from comma separated files, generate HTML and XML files Audience: Programmer, Developer, Testing personnel, Quality assurance staff who are involved in dealing and generating scripts to control applications Delivery: The course will be 50% lectures, 30% labs, 20% project development

Upcoming Courses

Other regions

Consulting

Weekend Perl courses, Evening Perl training, Perl boot camp, Perl instructor-led , Evening Perl courses,Weekend Perl training, Perl instructor, Perl classes, Perl one on one training , Perl training courses, Perl private courses, Perl coaching, Perl on-site

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

Outlines Extract
Machine-generated

Policies for a security data methods and basic team security installation content version regular project systems and applicationsperlical models be of the students will be able to: use case statement the content and the business computer operations overview of business security exercises and examples of the commands using theperliction and service design control of a control can be configure the enterprise and role of the code of the design of a security with collection of the development and control of the concepts datperlicting the main security services module 5: details for a scrum system on the course developed to centralized tractability of print services properties with secure and model process of state comperlical server control based examples of the security preparing the support for use the system data exercises and have a solution for solution how to develop the configuration the solutions and him.