facebook
    امين
    Trusted teacher
    FavouritesAdd to Wish List
    FavouritesAdd to Wish List
    Trusted teacher
    from9.71GBP/ h

    Network Traffic Analysis with Wireshark - for Software Developers and Network Engineers

    Translated by Google. Click to view original.
    This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities.

    requirements
    Networking basics basics
    what will you learn
    Wireshark Basic Functions
    Use Wireshark's advanced features
    Visualize network traffic with Wireshark
    Using Wireshark on the command line
    Network protocol analysis with Wireshark
    Troubleshoot slow networks with Wireshark

    Location

    Online via webcam

    General info

    Age:
    Children (7-12 years old)
    Teenagers (13-17 years old)
    Adults (18-64 years old)
    Seniors (65+ years old)
    Student level:
    Beginner
    Intermediate
    Advanced
    Duration:
    60 minutes
    The class is taught in:Arabic, English

    About Me

    Translated by Google. Click to view original.
    Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.

    Education

    Translated by Google. Click to view original.
    Computer Science Engineer, 2010
    Professorship in Computer Science Applied to Disposition, 2008
    2020 Full-Stack Web Development with React Specialization
    2021 IBM Cybersecurity Analyst Professional Certificate

    Experience / Qualifications

    Translated by Google. Click to view original.
    Operating systems, website programming, networks, computer maintenance, information security, graphic design,
    Technical Support Fundamentals
    The Bits and Bytes of Computer Networking
    Operating Systems and You: Becoming a Power User
    System Administration and IT Infrastructure Services
    IT Security: Defense against the digital dark arts
    A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters. Required software: -Photoshop - Illustrator -InDesign program duration: Photoshop: 6 hours Illustrator: 6 hours - InDesign: 6 hours
    The Cisco CCNA Exam is designed to verify an individual's knowledge of and operation of data network protocols. For most people, the use of more than one instructional method is important to solidify an understanding of the complex and interconnected systems of data network protocols. Watching videos and reading books are very important and this course is designed to add an extra and active learning method. In this course, The Basics, each unit examines a specific and fundamental topic in data networks. First, you will explore MAC and ARP addresses. Next, you will walk through VLANs, Trunking and InterVLAN routing. Finally, you will test static routing and dynamic routing. By the end of this course, you will have gone step-by-step through the challenges, solutions to problems, and how to solve them for each topic.
    The courses cover the topics that get you working with the Linux operating system. This includes discussing Linux installation and configuration scenarios before starting to manage Linux processes. By the end of this course, you will have built a solid foundation with Linux which will serve as a starting point for your Linux skills and roles Basic requirements Knowledge of operating systems may be helpful, but not necessary. what will you learn Working with Linux and open source software Linux installation and boot management Linux environment management Working with Linux package managers Understand the command line Find system help Working with the Linux file system
    Objectives The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to: • Implement technical strategies, tools, and techniques to secure data and information for your organization • Adhere to ethical security behavior to analyze and mitigate risks • Understand security in cloud computing architecture in depth • Understand legal requirements, privacy issues, and audit methodologies within a cloud environment • Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework what will you learn 1. Inactive survey conduct Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing. 2. Take an active survey So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement. 3. Gathering information and identifying weaknesses Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle. 4. Application testing There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction. 5. Digital Forensics This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline. 6. Digital Forensics: Getting Started with File Systems Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level. 7. Kali Linux Digital Forensics Tools: Imaging and Hash Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful. 8. Practical coding using Python Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career. 9. Social Engineering with Social Engineering Toolkit The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently. 10. Penetration testing with Metasploit Framework Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.

    Ask a question

    Send a message explaining your needs and امين will reply soon:
    The more detail, the better.
    Ex. "Hi, when are you available to meet for a lesson?"

    Availability of a typical week

    (GMT -05:00) New York
    MonTueWedThuFriSatSun
    0              
    1  Monday at 1:00  Tuesday at 1:00  Wednesday at 1:00  Thursday at 1:00  Friday at 1:00  Saturday at 1:00  
    2  Monday at 2:00  Tuesday at 2:00  Wednesday at 2:00  Thursday at 2:00  Friday at 2:00  Saturday at 2:00  
    3  Monday at 3:00  Tuesday at 3:00  Wednesday at 3:00  Thursday at 3:00  Friday at 3:00  Saturday at 3:00  
    4  Monday at 4:00  Tuesday at 4:00  Wednesday at 4:00  Thursday at 4:00  Friday at 4:00  Saturday at 4:00  
    5  Monday at 5:00  Tuesday at 5:00  Wednesday at 5:00  Thursday at 5:00  Friday at 5:00  Saturday at 5:00  
    6  Monday at 6:00  Tuesday at 6:00  Wednesday at 6:00  Thursday at 6:00  Friday at 6:00  Saturday at 6:00  
    7  Monday at 7:00  Tuesday at 7:00  Wednesday at 7:00  Thursday at 7:00  Friday at 7:00  Saturday at 7:00  
    8  Monday at 8:00  Tuesday at 8:00  Wednesday at 8:00  Thursday at 8:00  Friday at 8:00  Saturday at 8:00  
    9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  
    10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  
    11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  
    12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  
    13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  
    14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00  Saturday at 14:00  
    15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00  Saturday at 15:00  
    16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00  Saturday at 16:00  
    17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00  Saturday at 17:00  
    18              
    19              
    20              
    21              
    22              
    23              
    from £9.71Online via webcam

    Good-fit Instructor Guarantee


    If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

    Online reputation

    • Instructor since February 2022
    • Phone number verified
    • Linkedin connected

    Availability of a typical week

    (GMT -05:00) New York
    MonTueWedThuFriSatSun
    0              
    1  Monday at 1:00  Tuesday at 1:00  Wednesday at 1:00  Thursday at 1:00  Friday at 1:00  Saturday at 1:00  
    2  Monday at 2:00  Tuesday at 2:00  Wednesday at 2:00  Thursday at 2:00  Friday at 2:00  Saturday at 2:00  
    3  Monday at 3:00  Tuesday at 3:00  Wednesday at 3:00  Thursday at 3:00  Friday at 3:00  Saturday at 3:00  
    4  Monday at 4:00  Tuesday at 4:00  Wednesday at 4:00  Thursday at 4:00  Friday at 4:00  Saturday at 4:00  
    5  Monday at 5:00  Tuesday at 5:00  Wednesday at 5:00  Thursday at 5:00  Friday at 5:00  Saturday at 5:00  
    6  Monday at 6:00  Tuesday at 6:00  Wednesday at 6:00  Thursday at 6:00  Friday at 6:00  Saturday at 6:00  
    7  Monday at 7:00  Tuesday at 7:00  Wednesday at 7:00  Thursday at 7:00  Friday at 7:00  Saturday at 7:00  
    8  Monday at 8:00  Tuesday at 8:00  Wednesday at 8:00  Thursday at 8:00  Friday at 8:00  Saturday at 8:00  
    9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  
    10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  
    11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  
    12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  
    13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  
    14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00  Saturday at 14:00  
    15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00  Saturday at 15:00  
    16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00  Saturday at 16:00  
    17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00  Saturday at 17:00  
    18              
    19              
    20              
    21              
    22              
    23              
    from £9.71Online via webcam

    Good-fit Instructor Guarantee


    If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

    Share


    Imad
    Learn to program in C language from beginner to professional
    Hello everyone and welcome to this training on programming and more specifically on software development in C, my name is IMAD and I will be your trainer throughout this course I am a computer engineering student specializing in architecture, software development and web development. C is a very popular and used language. It is found almost everywhere such as in video games, most PC software and even in embedded. C is a very good candidate if you are looking for a first language to learn software development because it includes many notions that are found in most other languages. Thus mastering C guarantees you a much simpler and faster learning of other programming languages. In this training for beginners and intermediate in development, we will learn the basics of software development. How from lines of code we can make executable software on our machine. Then we will see the basics of the C language and, among other things, how to manage memory via variables, how to make our program live with loops and conditions or how to use the standard C library (STL) to interact with the user. Once these basics are acquired, we will increase the level a little with the dreaded pointers and arrays. this is often the part that newbies to C dread the most. But I guarantee you that with me it will finally seem very simple to you ;) So yes it's a big program but I guarantee you that you won't notice the time passing. Who is this course for? - University students specializing in computer science. - Beginner in software development. C is one of the best languages to embark on the adventure of programming. - People wishing to learn to develop in C or review and master the basics of this language.

    Abdallah
    Networking and IT operations ( CCNA, MCSA, AZURE administration, cloud computing) online everywhere and offline in Egypt
    After Completing Our Course: - Career Advancement: Gain certifications like CCNA and MCSA, which are highly valued in the IT industry and can significantly boost your career prospects. - High Earning Potential: IT professionals with certifications in networking and cloud computing often command higher salaries and have better job security. - Versatile Skill Set: Acquire a comprehensive understanding of networking, cloud services, and IT operations, making you a valuable asset in various IT roles. - Hands-On Experience: Develop practical skills through real-world scenarios and labs, preparing you to tackle complex IT challenges with confidence. - Cutting-Edge Knowledge: Stay updated with the latest technologies and best practices in networking and cloud computing, ensuring you remain competitive in the job market. - Global Opportunities: With expertise in networking and IT operations, you can explore job opportunities worldwide, expanding your professional horizons. - Professional Networking: Connect with industry experts and peers, building a strong professional network that can support your career growth. ### Course Description: Networking and IT Operations #### Overview This comprehensive course is designed for individuals seeking to enhance their skills in networking and IT operations. The curriculum covers essential certifications such as CCNA, MCSA, and Azure Administration, along with in-depth knowledge of cloud computing. The course is available both online globally and offline in Egypt, providing flexible learning options to suit your needs. #### Course Objectives - **Networking Fundamentals**: Understand the basics of networking technologies, including network topologies, protocols, and hardware. - **CCNA Certification**: Gain the skills needed to configure, manage, and troubleshoot Cisco networks, preparing you for the CCNA certification exam3. - **MCSA Certification**: Learn to manage and maintain Windows Server environments, covering key topics required for the MCSA certification. - **Azure Administration**: Develop expertise in managing Azure subscriptions, securing identities, configuring virtual networks, and implementing storage solutions12. - **Cloud Computing**: Explore the principles of cloud computing, including deployment models, service models, and cloud security. #### Key Topics 1. **Networking Technologies** - Network topologies and protocols - IP addressing and subnetting - Routing and switching fundamentals 2. **Cisco Certified Network Associate (CCNA)** - Network access and IP connectivity - Security fundamentals - Automation and programmability 3. **Microsoft Certified Solutions Associate (MCSA)** - Installation, storage, and compute with Windows Server - Networking with Windows Server - Identity with Windows Server 4. **Microsoft Azure Administration** - Managing Azure subscriptions and resources - Implementing and managing storage - Configuring and managing virtual networks - Monitoring and backing up Azure resources 5. **Cloud Computing** - Cloud service models (IaaS, PaaS, SaaS) - Cloud deployment models (public, private, hybrid) - Cloud security and compliance #### Learning Outcomes By the end of this course, participants will be able to: - Design, implement, and manage network infrastructures. - Configure and troubleshoot Cisco network devices. - Administer Windows Server environments effectively. - Manage and secure Azure cloud environments. - Understand and apply cloud computing concepts in real-world scenarios. #### Delivery Method - **Online**: Accessible from anywhere in the world, providing flexibility for remote learners. - **Offline**: In-person classes available in Egypt, offering hands-on experience and direct interaction with instructors. #### Target Audience This course is ideal for: - IT professionals looking to advance their careers in networking and cloud computing. - Students preparing for CCNA, MCSA, and Azure certification exams. - Individuals seeking to gain practical skills in IT operations and cloud management. #### Prerequisites - Basic understanding of computer networks and operating systems is recommended. - No prior certification is required, but a willingness to learn and engage with the material is essential. Ready to take your IT skills to the next level? Enroll now and start your journey towards becoming a certified networking and cloud computing professional!

    Nayankumar
    IT Cyber Security, PAM (CyberArk), IAM (Okta), Microsoft windows, Azure, AWS, Linux Tutoring. Language Tutoring: Hindi, Gujarati, English
    This class is to provide in-depth tutoring on essential IT skills, including Cyber Security, Privileged Access Management (PAM) with CyberArk, and Identity and Access Management (IAM) using Okta. You will also gain a strong foundation in Microsoft Windows administration, cloud computing with Azure and AWS, and Linux systems. Whether you are a beginner looking to establish fundamental IT skills or an experienced professional aiming to sharpen your knowledge, this course offers hands-on guidance across various levels. You will learn how to secure IT infrastructures, manage access rights, and handle operating systems and cloud platforms. Additionally, you will get practical insights on how to use key tools in today's IT environments, such as managing cloud services, securing data, and automating systems. By the end of this class, you will be well-prepared to manage, secure, and configure various IT environments, building a skill set that is in high demand in today’s tech industry.

    Luana
    Courses to start or improve on social networks
    Having trouble understanding how social media works? Do you need to highlight your business, your creations, your travels on social networks? I am a social media expert and I can support you in your launch. If you've already started, congratulations! I'm here to help you find direction, strategize and take your social media to the next level. Social networks are now an integral part of our daily lives and all companies, brands and others must be up to date to perform. I would be happy to help you in this process and teach you how to succeed in this digital world where everything is possible.

    Neel
    Introduction to Python Programming and Machine Learning Basics
    Dive into the world of Python programming and machine learning in this hands-on introductory class! This course is designed for beginners and focuses on the foundational concepts of Python, along with the essentials of machine learning. Course Highlights: Python Fundamentals: Learn the basics of Python programming, including data types, control structures, functions, and libraries. Through practical exercises, you’ll gain confidence in writing and executing Python code. Data Manipulation and Analysis: Explore popular libraries like NumPy and pandas to handle and analyze data efficiently. Understand how to clean, process, and visualize data, preparing it for machine learning tasks. Introduction to Machine Learning: Discover the key concepts of machine learning, including supervised and unsupervised learning, algorithms, and model evaluation. Gain insights into how machines learn from data. Hands-On Projects: Apply your knowledge through real-world projects, where you'll build simple machine learning models using libraries such as scikit-learn. You'll learn to make predictions and evaluate model performance. Collaboration and Support: Work alongside fellow students in a collaborative environment, with ample opportunities for group discussions and individual support from the instructor. Who Should Enroll: This class is ideal for anyone interested in starting a career in data science or machine learning, or for those looking to enhance their programming skills with practical applications in Python. Join us and embark on an exciting journey into the realm of programming and machine learning!

    Dr. Hani
    Introduction to Cybersecurity (Pentration Testing Tools)
    This course provides an exploratory study of cybersecurity concepts, principles, and technologies. Major topics covered include cyber threats and vulnerabilities, information security frameworks, network infrastructure security, wireless network security, cryptography, defense-in-depth security strategy, information security policy, and security management.

    Eiad
    Learn programming, software development and marketing online
    You will learn C# programming language from beginner to professional level. You will learn how to create complete programs during the course and market them online. Such as managing a restaurant, a mobile phone store, a point of sale company, a law office, a school or university, a mall, a clothing store, a car company, and many others.

    Alexandre
    Programming class teacher for Bachelor, College and middle school
    Embark on an immersive journey that will help you and clarify the material as we take a deep dive into of Java, Python, Object-Oriented Programming (OOP), Machine Learning, and Deep Learning, focusing on neural networks, Liquid State Machines (LSM), Genetic Algorithms (GA), and more. Special rate applies for purely web/app development as a part-time full-stack developer/engineer.

    Alex
    Master Databases through Practical Projects – Experienced Tutor with 16 Years of Teaching Experience
    As a graduate of the University of Westminster, I began my programming journey by applying my skills to data management and analysis in various projects. Over the past 16 years, I have been providing private lessons in computer science, with a strong focus on teaching databases to students and professionals alike. Whether you're a beginner learning about SQL or a more advanced learner seeking to optimize database performance, I offer tailored lessons designed to help you understand and apply database concepts in real-world scenarios. What I Offer: Learn databases through hands-on projects: You'll develop a deep understanding of relational databases (SQL), non-relational databases (NoSQL), and data modeling by working on real-world projects. Customized lessons: Each lesson is adapted to your learning style and current level, whether you’re just starting or need to refine your skills. Portfolio and project support: Need help building a database project for your portfolio or finalizing a boot camp assignment? I provide guidance to ensure your project is both functional and impressive. Database optimization: Learn how to optimize queries, structure your data efficiently, and improve database performance. Study materials and exercises: Before each session, you'll receive all necessary materials to prepare for the next lesson, followed by homework assignments to reinforce the concepts covered. Flexible online lessons: Access lessons from anywhere, on a schedule that suits you. I currently work as a freelancer with companies, start-ups, and schools, offering online lessons and project support in database management. Ready to Dive into Databases? If you're interested in mastering databases through practical, real-world projects, or if you have any questions, don't hesitate to reach out. Let's build your database skills together! This ad emphasizes practical learning in databases, tailored for students and professionals looking to enhance their skills through real-world projects. Let me know if you'd like any further refinements!

    Jose
    Experienced Software Engineer - Linux and Networking Teacher
    Eager to learn Linux and infrastructure? Then do no hesitate in contacting me. We can start from the foundations of all these extremely important disciplines, if you consider you have knowledge on system administration is not a problem, we can study Security in Linux and Networks, virtualization and containers.

    Muhammad Noman
    Full-stack Development (Front-end /Back-end) - Complete Course Available
    In this class, we will learn about full-stack development. The following topics will cover:- Introduction to Javascript in HTML Using JavaScript Libraries Deep knowledge of Backend language (PHP, Csharp .NET ) API Interactions Version Control System (GIT) How to Build and Maintain a Website Final Project Build an Interactive Resume!

    Ludmila
    Cisco CCNA, Packet Tracer, Switches, Routers, Subnetting, SAP
    I am a professional with more than 10 years of experience in multinational companies training and managing international teams in several European countries (Belgium, Poland, Czech Republic) and with extensive knowledge in SAP and Networking. I hold the official Cisco CCNA certification as well as a solid experience as a SAP trainer. Additionally, I have a degree in basic (for beginners) and advanced digital competences. What would the classes be like? -Classes can be taught in English/Spanish/Ukrainian/Russian. -The methodology of the classes would be oriented so that the student can internalise the basic and advanced concepts, as well as know how to apply from a practical point of view what he/she learns during the classes. -Resolution of doubts and exercises. -Advice on what to study and how to do it. ------ -For those who are interested, I also prepare those who are in the process of obtaining the official Cisco CCNA certification.

    Muhammad
    computer networking with CCNA CCNP MCSE AND VMWARE ESXI
    I am a highly experienced computer network engineer with over 9 years of field expertise and 4 years of online teaching. My core specialties include Cisco CCNA, CCNP, VMware ESXi, Fortigate firewall, MCSE Server, and Linux systems. I focus on helping students and professionals excel in networking, system administration, and cybersecurity. With a solid foundation in both practical and theoretical knowledge, I provide hands-on learning experiences using real-world scenarios. I specialize in simplifying complex topics for students of all skill levels, ensuring they build a strong understanding of core concepts. Skills and Expertise Cisco CCNA & CCNP: Master the core networking concepts and configurations with practical labs. VMware ESXi Virtualization: Virtualization expertise for data center management and optimization. Fortigate Firewall: Learn advanced security configurations to secure and optimize networks. MCSE Server: Comprehensive teaching on Windows Server environments for enterprise-level management. Linux: Guide students on Linux server administration and configuration, focusing on open-source technologies. Teaching Approach My teaching method is highly interactive, focusing on personalized learning based on each student's unique needs. I emphasize real-world labs, troubleshooting, and best practices to ensure students can apply their skills directly in the field. Whether you are preparing for a certification exam, aiming to upgrade your skills, or pursuing a new career path, I am dedicated to helping you achieve your goals. Why Choose Me? Proven track record with hundreds of successful students. Focus on practical, job-ready skills. Custom-tailored lessons to meet your learning pace and objectives. Guidance on certifications and career advancement.

    Illia
    Java Development and Software Architecture: From Beginner to Professional
    Throughout my career, I have taken on various roles that highlight my dedication to education and mentorship. In the companies where I worked, I was responsible for onboarding new joiners and served as a team buddy for newcomers. This role involved providing guidance, support, and a smooth transition into the team environment. I have also been instrumental in educating junior and mid-level developers, introducing new concepts, and teaching them how to effectively apply these ideas in their work. My approach ensures that team members are well-equipped with the latest knowledge and best practices in the industry. My comprehensive experience in tutoring and teaching reflects my commitment to fostering a collaborative and growth-oriented learning environment. Whether in a formal setting or through informal sessions, I am dedicated to empowering others to achieve their full potential.

    Marie
    Digital marketing and social media courses in Brittany
    I am available to help you deepen your knowledge in the field of digital marketing (strategy, social networks, email marketing, Google/Meta advertising, etc.). In French or English! My courses adapt to your needs! About : Graduated from a university in New Zealand, I am bilingual French/English. Passionate and specialized in digital marketing, I am currently at the service of entrepreneurs and small businesses in need of visibility on the internet. I am also a trainer for professionals in the field of marketing and management.