facebook

Discover the Best Private Information technology Classes in New Cairo

For over a decade, our private Information technology tutors have been helping learners improve and fulfil their ambitions. With one-on-one lessons at home or in New Cairo, you’ll benefit from high-quality, personalised teaching that’s tailored to your goals, availability, and learning style.

search-teacher-icon

Find Your Perfect Teacher

Explore our selection of Information technology tutors & teachers in New Cairo and use the filters to find the class that best fits your needs.

chat-icon

Contact Teachers for Free

Share your goals and preferences with teachers and choose the Information technology class that suits you best.

calendar-icon

Book Your First Lesson

Arrange the time and place for your first class together. Once your teacher confirms the appointment, you can be confident you are ready to start!

0 teachers in my wish list
|
+

5 information technology teachers in New Cairo

Meet even more great teachers. Try online lessons with the following real-time online teachers:
Trusted teacher: With over seven years of experience in teaching Computer Science & Information Technology (ICT), I have developed a strong expertise in delivering high-quality education across multiple internationally recognized curricula, including Cambridge IGCSE, GCSE, A-Levels, O-Levels, and Checkpoint. My passion lies in equipping students with coding, cybersecurity, and digital literacy skills, ensuring they are well-prepared for the evolving demands of the digital world. Expertise & Teaching Areas: ✅ Programming & Software Development: Python, Java, C++ ✅ Cybersecurity: Ethical hacking, data protection, network security ✅ Digital Literacy: ICT applications, online safety, cloud computing ✅ Data Science & AI: Data analysis, machine learning fundamentals ✅ Web Development: HTML, CSS, JavaScript Curriculum & Pedagogical Experience: 🔹 Cambridge IGCSE & GCSE ICT & Computer Science – Teaching core and extended syllabi, focusing on programming logic, databases, and networking. 🔹 Cambridge A-Levels & O-Levels Computer Science – Preparing students for advanced computing concepts, problem-solving, and algorithm development. 🔹 Cambridge Checkpoint ICT – Building foundational skills in digital technology and computer applications. Professional Impact: 📌 Mentored students to achieve top grades in Cambridge ICT & Computer Science exams. 📌 Developed interactive lesson plans integrating real-world applications of technology. 📌 Conducted coding boot camps and cybersecurity workshops to enhance practical learning. 📌 Guided students in project-based learning, including app development and website design. With a strong commitment to student-centered learning and technological innovation, I am dedicated to shaping future tech leaders and empowering learners with skills relevant to careers in technology, data science, and software development.
Computer science · Information technology
Trusted teacher: • Explain “Artificial Intelligence” and how to identify systems using Artificial Intelligence. • Explain “artificial intelligence” and how to identify systems that use artificial intelligence. • Differentiate among the major types and methodologies used in Artificial Intelligence. • Distinguish between the main types and methodologies used in artificial intelligence. • Characterize the goals of AI and the approaches and progress used in achieving these objectives. • Describe the goals of artificial intelligence and the methods and advances used to achieve these goals. • Explain the role of Artificial Intelligence Agents and how they relate to the environment. • Explain the role of AI agents and how they relate to the environment. • Understand how Artificial Intelligence is implemented in the real world. • Understand how AI is applied in the real world. • Understand how Machine Learning (ML) is implemented in the real world. • Understand how to apply machine learning (ML) in the real world. • Understand the fundamentals of “deep learning” and how it works. • Understand the basics of “deep learning” and how it works. • Understand the role of Artificial Intelligence to analyze “Big data.” • Understand the role of artificial intelligence in analyzing “big data.” • Explain the basics of Artificial Intelligence Platforms and how they are used. • Explain the basics of artificial intelligence platforms and how to use them. Main Keywords Trainees should understand: • Key words that trainees should understand: 1. ML Machine Learning 2. DL Deep learning 3. RL Reinforcement Learning 4. Robotics 5. NLP Natural Language Processing (NLP) 6. IOT Internet of things 7. VR Virtual Reality 8. Computational thinking 9. Big data 10. Chatbot 11. Gen AI Generative AI 12. Generative Design 13. Neural Networks 14. Predictive Analytics
Information technology · Computer programming
Course Description: This advanced course is designed for engineering professionals who wish to evolve into strategic leadership roles in information security, such as ISO (Information Security Officer), BISO (Business Information Security Officer) or CISO (Chief Information Security Officer). Throughout the program, participants will acquire the technical, strategic and management skills necessary to lead security initiatives, protect critical assets and ensure regulatory compliance in complex corporate environments. Key topics will be explored, such as designing cybersecurity strategies, implementing governance policies, assessing risks and communicating effectively with senior management. Main objectives of the course: Understand the regulatory framework and international standards such as ISO 27001, PCI DSS, and GDPR. Develop skills to manage comprehensive security programs aligned with business objectives. Design incident response, business continuity and disaster recovery strategies. Improve the ability to lead multidisciplinary teams and manage cybersecurity budgets. Strengthen executive communication to report risks and proposals to management and board levels. Addressed to: Engineers with experience in technical areas of computer security, networks, development or auditing, who seek to make the leap to strategic leadership positions in cybersecurity. Methodology: The course combines theoretical sessions, real case studies, practical workshops and simulations of leadership scenarios. In addition, support is offered for the design of professional development plans and relevant certifications such as CISSP, CISM and CRISC. Duration: 10 weeks (includes a final evaluation and an applied strategic project). Modality: In-person, virtual or hybrid. This course is the first step in transforming your technical experience into a career in enterprise-level information security leadership.
Information technology · Computer engineering · Computational neuroscience
Showing results 1 - 25 of 3341 - 25 of 334

Our students from New Cairo evaluate their Information Technology teacher.

To ensure the quality of our Information Technology teachers, we ask our students from New Cairo to review them.
Only reviews of students are published and they are guaranteed by Apprentus. Rated 4.8 out of 5 based on 50 reviews.

Test Prep Tutoring - Math , Quantitative Reasoning for Jobs (Delft)
Viswambher
Viswambher is professional and friendly. He took time and care to understand the needs for our son. He tailors the lessons accordingly. Our son is looking forward to his maths lessons and enjoys working with Viswambher. I would certainly recommend Viswambher as a tutor.
Review by ANJA
Lead Professor: Mathematics, Physics and Chemistry courses (Lille)
Ayoub
Ayoub was very clear and explained things well. He checked if our son understands and gradually increased the level of difficulty. Our 15 year old son liked his lessons very much!
Review by MARIJA
Code Your Way to Success: A Fun and Interactive Introduction to Programming for Kids (Barcelona)
Gaëlle
Gaelle went above and beyond to help my son build a love of programming by making it fun and integrating me in his learning, making it a bonding experience as well :)
Review by ROGER