Course Name
HTTP – Hyper Text Transfer Protocol Training
Course Overview
This course on HTTP Hyper Text Transfer Protocol training is designed for people who work on development, testing and verification of HTTP protocol. Participants will learn the internals of HTTP protocol that helps them with a much better understanding of their current HTTP work.
Target Audience
- Professionals and Students who are working in Storage/Networking/IT Domain
- Developers, Testers/QA and Verification Engineers who are working on or keen to know Hyper Text Transfer Protocol
Fee, Schedule & Registration
Click Here for HTTP – Hyper Text Transfer Protocol Training course, training schedule, fee and registration information.
HTTP – Hyper Text Transfer Protocol Training Course Outline
Protocol Parameters HTTP Version Uniform Resource Identifiers – General Syntax – http URL – URI Comparison Date/Time Formats – Full Date – Delta Seconds Character Sets – Missing Charset Content Codings Transfer Codings – Chunked Transfer Coding Media Types – Canonicalization and Text Defaults – Multipart Types Product Tokens Quality Values Language Tags Entity Tags Range Units |
HTTP Message Message Types Message Headers Message Body Message Length General Header Fields |
Request Request-Line – Method – Request-URI The Resource Identified by a Request Request Header Fields |
Response Status-Line – Status Code and Reason Phrase Response Header Fields |
Entity Entity Header Fields Entity Body – Type – Entity Length |
Connections Persistent Connections – Purpose – Overall Operation – Proxy Servers – Practical Considerations Message Transmission Requirements – Persistent Connections and Flow Control – Monitoring Connections for Error Status Messages – Use of the 100 (Continue) Status – Client Behavior if Server Prematurely Closes Connection |
Method Definitions Safe and Idempotent Methods – Safe Methods – Idempotent Methods OPTIONS – GET – HEAD – POST – PUT – DELETE – TRACE – CONNECT |
Status Code Definitions Informational 1xx – 100 Continue – 101 Switching Protocols Successful 2xx – 200 OK – 201 Created – 202 Accepted – 203 Non-Authoritative Information – 204 No Content – 205 Reset Content Redirection 3xx – 300 Multiple Choices – 301 Moved Permanently – 302 Found – 303 See Other – 304 Not Modified – 305 Use Proxy – 307 Temporary Redirect Client Error 4xx – 400 Bad Request – 401 Unauthorized – 402 Payment Required – 403 Forbidden – 404 Not Found – 405 Method Not Allowed – 406 Not Acceptable – 407 Proxy Authentication Required – 408 Request Timeout – 409 Conflict – 410 Gone – 411 Length Required – 412 Precondition Failed – 413 Request Entity Too Large – 414 Request-URI Too Long – 415 Unsupported Media Type – 416 Requested Range Not Satisfiable – 417 Expectation Failed Server Error 5xx – 500 Internal Server Error – 501 Not Implemented – 502 Bad Gateway – 503 Service Unavailable – 504 Gateway Timeout – 505 HTTP Version Not Supported |
Access Authentication |
Content Negotiation Server-driven Negotiation Agent-driven Negotiation Transparent Negotiation |
Caching in HTTP – Cache Correctness – Warnings – Cache-control Mechanisms – Explicit User Agent Warnings – Exceptions to the Rules and Warnings – Client-controlled Behavior Expiration Model – Server-Specified Expiration – Heuristic Expiration – Age Calculations – Expiration Calculations – Disambiguating Expiration Values – Disambiguating Multiple Responses Validation Model – Last-Modified Dates – Entity Tag Cache Validators – Weak and Strong Validators – Rules for When to Use Entity Tags and Last-Modified Dates – Non-validating Conditionals Response Cacheability Constructing Responses From Caches – End-to-end and Hop-by-hop Headers – Non-modifiable Headers – Combining Headers – Combining Byte Ranges Caching Negotiated Responses Shared and Non-Shared Caches Errors or Incomplete Response Cache Behavior Side Effects of GET and HEAD Invalidation After Updates or Deletions Write-Through Mandatory Cache Replacement History Lists |
Header Field Definitions Accept Accept-Charset Accept-Encoding Accept-Language Accept-Ranges Age Allow Authorization Cache-Control What is Cacheable – What May be Stored by Caches – Modifications of the Basic Expiration Mechanism – Cache Revalidation and Reload Controls – No-Transform Directive – Cache Control Extensions Connection Content-Encoding Content-Language Content-Length Content-Location Content-MD5 Content-Range Content-Type Date – Clockless Origin Server Operation ETag Expect Expires From Host If-Match If-Modified-Since If-None-Match If-Range If-Unmodified-Since Last-Modified Location Max-Forwards Pragma Proxy-Authenticate Proxy-Authorization Range – Byte Ranges – Range Retrieval Requests Referer Retry-After Server TE Trailer Transfer-Encoding Upgrade User-Agent Vary Via Warning WWW-Authenticate |
Security Considerations Personal Information – Abuse of Server Log Information – Transfer of Sensitive Information – Encoding Sensitive Information in URI’s – Privacy Issues Connected to Accept Headers – Attacks Based On File and Path Names DNS Spoofing Location Headers and Spoofing Content-Disposition Issues Authentication Credentials and Idle Clients Proxies and Caching – Denial of Service Attacks on Proxies |