facebook

Discover the Best Private Computer science lessons in Aryanah

For over a decade, our private Computer science tutors have been helping learners improve and realise their ambitions. With one-to-one lessons at your home or in Aryanah, you’ll enjoy high-quality, personalised teaching that’s tailored to your goals, availability, and learning style.

0 teachers in my wish list
+

7 computer science teachers in Aryanah

Trusted teacher: Python programming. Here's a general outline of what such a tutorial might cover: Introduction to Python: Overview of Python, its history, and its uses. Comparison with other programming languages. Setting up the Python environment and tools for development. Basic Python Syntax: Understanding of Python syntax, keywords, and data types. Introduction to variables, operators, and writing simple Python scripts. Control Structures: Detailed explanations and examples of control structures including if-else statements, for and while loops, and comprehensions. Introduction to error and exceptions handling. Functions and Modules: How to define and call functions, pass arguments, return values, variable scope, and lambda functions. Understanding and creating modules and packages. Data Structures: In-depth look at Python's built-in data structures: strings, lists, tuples, sets, and dictionaries. Operations, methods, and using these structures effectively. Object-Oriented Programming (OOP): Basics of OOP in Python, creating classes and objects, inheritance, polymorphism, encapsulation, and method overloading. File Handling and I/O: Reading from and writing to files, handling file paths, and understanding various file formats. Introduction to I/O operations in Python. Libraries and Frameworks: Overview of popular Python libraries and frameworks like NumPy, Pandas, Matplotlib, Django, and Flask. Examples of how to use these libraries for data manipulation, visualization, web development, etc. Error Handling and Debugging: Techniques for debugging Python code, handling exceptions, and using debugging tools. Advanced Topics: Introduction to more advanced topics like threading, networking, database interaction, and web scraping. Best Practices: Writing clean, readable, and efficient code. Understanding Pythonic concepts and following coding standards. Projects and Practical Applications: Step-by-step guides to building real-world applications or projects to apply the learned concepts in practical scenarios. Each section would contain explanations, code examples, and exercises to help reinforce the learning.
Tutoring · Computer science · Math
Trusted teacher: Student in 4th year of ENS Ulm in mathematics as well as gluer in PSI* and MP at Lycée Louis-le-Grand, and in PCSI and MP at Lycée Pierre-Gilles-de-Gennes, I put at your disposal my knowledge and my experience from my career. Course location: The courses take place by videoconference, using the Teams software. I use: - my Mac computer (microphone and webcam working) - a Samsung graphic tablet in the format of an A4 sheet allowing me to write the course that I give to the student so that he/she keeps a written record and that I send systematically at the end of the course. The videoconference format offers several advantages: - more availability for me and my student by operating remotely - no risk linked to transport (delay) - possibility to record the course and the explanations - shared folder allowing me to send interesting documents to the student in real time. Course of a lesson: The course begins with a discussion with the student to identify and prioritize the points he wishes to work on. During the session, two formats are possible: - "short lesson" for the student, rereading of his lesson, explanation of definitions and theorems, resumption of demonstrations by highlighting the most important proofs and clarifying the intuitions behind these proofs. Simple but striking examples of my invention make it possible to illustrate and reinforce the memorization of the lesson by the student; - resolution of new exercises, chosen by the student or that I suggest to him. During the time of reflection, I prepare the possible solutions and especially I observe its strong points and its difficulties in the resolution of the problem. If he has difficulties I give him indications and not the complete solution. So I avoid simply giving an answer key that the student will end up "learning by heart". If he finally wants a correction of the exercise, I take care to explain to him the whole process of the solution, even if it means repeating steps that are not clear, and I give a written record of the solution to the student. Within a course, it is of course natural to go back and forth between these two formats. At the end of the session, I discuss with him the points he can improve and make personalized suggestions. The student can ask me for exercises or send me his course documents to prepare for the next session. What I propose: - courses at all levels in mathematics, physics-chemistry and computer science; - preparation for competitions at all levels (X, ENS, Centrale, Mines-Ponts, CCINP or e3a // HEC, ESSEC, ESCP and other business schools); -preparation for the requirements of the preparation from high school ("Prépa à la Prépa" format). Preparation for the Terminale general competition (I obtained a mention there thanks to an independent preparation), for the National Mathematics Olympiads, for the Animath Cup ... I am proficient in Python, OCaml, C and SQL computer languages. Do not hesitate to contact me if you need any information!
Math · Physics · Computer science
Trusted teacher: Technology is advancing at a rapid pace, and we rely more and more on computers for everything from cooking to organizing our taxes. An understanding of computer basics is compulsory nowadays. The goal of this course is to give you a solid foundation on basic IT and computer knowledge. Once you understood these basics, you will have a clear understanding on which to build your future knowledge of an skill with computers and the Internet. COURSE OUTLINES: KNOWING COMPUTER - Introduction and objectives - What is Computer? - Components of Computer system - Concept of Hardware and Software - Concept of computing, data and information - Applications of IECT - Bringing computer to life OPERATING COMPUTER USING GUI BASED OPERATING SYSTEM - Introduction and objectives - Basics of Operating System - The User Interface - Operating System Simple Setting - File and Directory Management UNDERSTANDING WORD PROCESSING - Introduction and objectives - Word processing Basics - Opening and closing Documents - Text Creation and manipulation - Formatting the Text - Table manipulation USING SPREAD SHEET - Introduction and objectives - Elements of Electronic Spread sheet - Manipulation of Cells - Formulas and Function INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS - Introduction and objectives - Basic of Computer Networks - Internet - World Wide Web (WWW) - Web Browsing Softwares - Search Engines - Understanding URL - Surfing the web COMMUNICATIONS AND COLLABORATION - Introduction and objectives - Basics of E-mail - Using E-mails - Document collaboration - Instant Messaging and Collaboration MAKING SMALL PRESENTATIONS - Introduction and objectives - Basics of Making small Presentations - Creation of presentation - Preparation of slides - Presentation of slides - Slide show FINANCIAL LITERACY FOR BANKING SCHEME AND APPLICATIONS - Introduction and objectives - Why Savings are needed? - Drawbacks of keeping cash at home - Why Bank is needed? - Banking products - Banking Service Delivery Channels - Various Schemes - Bank on your mobile - Insurance
Computer basics · Computer science · Internet
Trusted teacher: Objective: Equip students with foundational skills in ethical hacking and penetration testing to secure web applications, focusing on open-source tools and DVWA (Damn Vulnerable Web Application). (Capstone Project: Website Penetration Testing Report) Throughout the weeks, students will work on a capstone project where they will perform a comprehensive penetration test on a simulated website using DVWA. They will document their findings, create detailed reports, and suggest mitigation strategies. This project will be their portfolio piece to showcase their skills. 1. Week 1: Introduction to Information Security - Topics covered: Cybersecurity Fundamentals, Introduction to Ethical Hacking, Basic Network Security, Introduction to Cryptography, Practical Cybersecurity Tips 2. Week 2: Introduction to Ethical Hacking - Topics covered: Orientation and Course Overview, Setting Up a Virtual Lab, Key Tools and Software, Network Security Basics, Identifying Common Vulnerabilities, Exploring common network vulnerabilities, Hands-on practice with vulnerability scanning using OpenVAS. 3. Week 3: Website Penetration Testing Fundamentals with DVWA - Topics covered: Website Architecture, Overview of how websites function, Introduction to client-server model and HTTP/HTTPS, Setting Up DVWA, Installing and configuring DVWA, Understanding the purpose and use of DVWA in penetration testing, SQL Injection with DVWA, Understanding SQL injection attacks, Practicing SQL injection techniques and defences using DVWA, Cross-Site Scripting (XSS) with DVWA, Understanding XSS attacks, Practising XSS techniques and defences using DVWA, Hands-on OWASP Top 10 with DVWA, Detailed exploration of the OWASP Top 10 vulnerabilities, Practical exercises to identify and exploit vulnerabilities using DVWA 4. Week 4: Advanced Penetration Testing Techniques - Topics covered: Advanced Exploitation Techniques, Techniques for privilege escalation, Using Metasploit for advanced exploitation, Social Engineering Attack, Understanding social engineering, Practical examples of phishing and other attacks, Reporting and Documenting Findings, Importance of documentation in penetration testing, How to create detailed and professional reports, Ethical Considerations and Legal Aspects, Understanding the ethics of hacking, Legal implications and compliance, Project Presentation and Feedback, Students present their penetration testing report, Personalized feedback and improvement tips. --- At the end of the 4 weeks, • Students will have beginner-to-advanced knowledge about ethical hacking and penetration testing using open-source tools and DVWA. • Students will have enhanced professional writing skills, and technical documentation skills along with research skills. • Students will have a capstone project which will serve as a significant portfolio piece, demonstrating their practical skills and readiness for the cybersecurity job market
Computer science · Security · Information systems
Showing results 151 - 175 of 1144151 - 175 of 1144

Our students from Aryanah evaluate their Computer Science teacher.

To ensure the quality of our Computer Science teachers, we ask our students from Aryanah to review them.
Only reviews of students are published and they are guaranteed by Apprentus. Rated 4.8 out of 5 based on 38 reviews.

Mathematics classes for beginners and intermediate level (Gouda)
Mahmood
I need to re-study 4 years of high school maths in only 5 months. Mahmood agreed to help me with this difficult task and thanks to his professional way of teaching I believe I can make this happen. He explains topics in detail and yet quickly enough to spare time for other topics. If you are unsure he points you to the right direction. Most important thing for me was that he made me realize that I first need to master concept #1 in order to be able to later master concept #5 and so on. You can see that he has a lot of teaching experience, he tries to understand the way YOU think and based on that he serves you clear explanation for topics you struggle to understand. I definitely recommend him as your next teacher!
Review by RADOSLAV
Python, learn how to think and build effective code (Utrecht)
Kelly
Kelly is a lovely person and great teacher. I had a number of classes with her online via Zoom in order to get help with a beginners level Python data analysis course I was doing. I would not have gotten through the course without her patience and help in explaining different concepts. I highly recommend her as a tutor if you are struggling with coding!
Review by ELLA
Lesson 04: Command Injection & Brute Force Attack (Lesson 04 of Web Penetration Testing Series) (Hamilton)
Dr Zeeshan
The lessons I have taken with Dr Zeeshan have been a great approach to the cybersecurity field, he is always available for help and has a deep knowledge of the things he teach.
Review by GONZALO