facebook
    امين
    Trusted teacher
    FavouritesAdd to Wish List
    FavouritesAdd to Wish List
    Trusted teacher
    from12.76GBP/ h

    Diploma in cyber security, specializing in digital forensics

    Translated by Google. Click to view original.
    Objectives
    The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to:

    • Implement technical strategies, tools, and techniques to secure data and information for your organization
    • Adhere to ethical security behavior to analyze and mitigate risks
    • Understand security in cloud computing architecture in depth
    • Understand legal requirements, privacy issues, and audit methodologies within a cloud environment
    • Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework
    what will you learn
    1. Inactive survey conduct
    Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing.

    2. Take an active survey
    So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement.

    3. Gathering information and identifying weaknesses
    Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle.

    4. Application testing
    There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction.

    5. Digital Forensics
    This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline.


    6. Digital Forensics: Getting Started with File Systems
    Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level.

    7. Kali Linux Digital Forensics Tools: Imaging and Hash
    Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful.

    8. Practical coding using Python
    Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career.

    9. Social Engineering with Social Engineering Toolkit
    The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently.

    10. Penetration testing with Metasploit Framework
    Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.

    Location

    Online via webcam

    General info

    Age:
    Children (7-12 years old)
    Teenagers (13-17 years old)
    Adults (18-64 years old)
    Seniors (65+ years old)
    Student level:
    Beginner
    Intermediate
    Advanced
    Duration:
    60 minutes
    120 minutes
    The class is taught in:Arabic, English

    About Me

    Translated by Google. Click to view original.
    Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.

    Education

    Translated by Google. Click to view original.
    Computer Science Engineer, 2010
    Professorship in Computer Science Applied to Disposition, 2008
    2020 Full-Stack Web Development with React Specialization
    2021 IBM Cybersecurity Analyst Professional Certificate

    Experience / Qualifications

    Translated by Google. Click to view original.
    Operating systems, website programming, networks, computer maintenance, information security, graphic design,
    Technical Support Fundamentals
    The Bits and Bytes of Computer Networking
    Operating Systems and You: Becoming a Power User
    System Administration and IT Infrastructure Services
    IT Security: Defense against the digital dark arts
    A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters. Required software: -Photoshop - Illustrator -InDesign program duration: Photoshop: 6 hours Illustrator: 6 hours - InDesign: 6 hours
    This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities. requirements Networking basics basics what will you learn Wireshark Basic Functions Use Wireshark's advanced features Visualize network traffic with Wireshark Using Wireshark on the command line Network protocol analysis with Wireshark Troubleshoot slow networks with Wireshark
    The Cisco CCNA Exam is designed to verify an individual's knowledge of and operation of data network protocols. For most people, the use of more than one instructional method is important to solidify an understanding of the complex and interconnected systems of data network protocols. Watching videos and reading books are very important and this course is designed to add an extra and active learning method. In this course, The Basics, each unit examines a specific and fundamental topic in data networks. First, you will explore MAC and ARP addresses. Next, you will walk through VLANs, Trunking and InterVLAN routing. Finally, you will test static routing and dynamic routing. By the end of this course, you will have gone step-by-step through the challenges, solutions to problems, and how to solve them for each topic.
    The courses cover the topics that get you working with the Linux operating system. This includes discussing Linux installation and configuration scenarios before starting to manage Linux processes. By the end of this course, you will have built a solid foundation with Linux which will serve as a starting point for your Linux skills and roles Basic requirements Knowledge of operating systems may be helpful, but not necessary. what will you learn Working with Linux and open source software Linux installation and boot management Linux environment management Working with Linux package managers Understand the command line Find system help Working with the Linux file system

    Ask a question

    Send a message explaining your needs and امين will reply soon:
    The more detail, the better.
    Ex. "Hi, when are you available to meet for a lesson?"

    Availability of a typical week

    (GMT -04:00) New York
    MonTueWedThuFriSatSun
    0              
    1              
    2  Monday at 2:00  Tuesday at 2:00  Wednesday at 2:00  Thursday at 2:00  Friday at 2:00  Saturday at 2:00  Sunday at 2:00
    3  Monday at 3:00  Tuesday at 3:00  Wednesday at 3:00  Thursday at 3:00  Friday at 3:00  Saturday at 3:00  Sunday at 3:00
    4  Monday at 4:00  Tuesday at 4:00  Wednesday at 4:00  Thursday at 4:00  Friday at 4:00  Saturday at 4:00  Sunday at 4:00
    5  Monday at 5:00  Tuesday at 5:00  Wednesday at 5:00  Thursday at 5:00  Friday at 5:00  Saturday at 5:00  Sunday at 5:00
    6  Monday at 6:00  Tuesday at 6:00  Wednesday at 6:00  Thursday at 6:00  Friday at 6:00  Saturday at 6:00  Sunday at 6:00
    7  Monday at 7:00  Tuesday at 7:00  Wednesday at 7:00  Thursday at 7:00  Friday at 7:00  Saturday at 7:00  Sunday at 7:00
    8  Monday at 8:00  Tuesday at 8:00  Wednesday at 8:00  Thursday at 8:00  Friday at 8:00  Saturday at 8:00  Sunday at 8:00
    9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  Sunday at 9:00
    10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  Sunday at 10:00
    11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  Sunday at 11:00
    12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  Sunday at 12:00
    13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  Sunday at 13:00
    14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00  Saturday at 14:00  Sunday at 14:00
    15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00  Saturday at 15:00  Sunday at 15:00
    16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00  Saturday at 16:00  Sunday at 16:00
    17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00  Saturday at 17:00  Sunday at 17:00
    18  Monday at 18:00  Tuesday at 18:00  Wednesday at 18:00  Thursday at 18:00  Friday at 18:00  Saturday at 18:00  Sunday at 18:00
    19              
    20              
    21              
    22              
    23              
    from £12.76Online via webcam

    Good-fit Instructor Guarantee


    If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

    Online reputation

    • Instructor since February 2022
    • Phone number verified
    • Linkedin connected

    Availability of a typical week

    (GMT -04:00) New York
    MonTueWedThuFriSatSun
    0              
    1              
    2  Monday at 2:00  Tuesday at 2:00  Wednesday at 2:00  Thursday at 2:00  Friday at 2:00  Saturday at 2:00  Sunday at 2:00
    3  Monday at 3:00  Tuesday at 3:00  Wednesday at 3:00  Thursday at 3:00  Friday at 3:00  Saturday at 3:00  Sunday at 3:00
    4  Monday at 4:00  Tuesday at 4:00  Wednesday at 4:00  Thursday at 4:00  Friday at 4:00  Saturday at 4:00  Sunday at 4:00
    5  Monday at 5:00  Tuesday at 5:00  Wednesday at 5:00  Thursday at 5:00  Friday at 5:00  Saturday at 5:00  Sunday at 5:00
    6  Monday at 6:00  Tuesday at 6:00  Wednesday at 6:00  Thursday at 6:00  Friday at 6:00  Saturday at 6:00  Sunday at 6:00
    7  Monday at 7:00  Tuesday at 7:00  Wednesday at 7:00  Thursday at 7:00  Friday at 7:00  Saturday at 7:00  Sunday at 7:00
    8  Monday at 8:00  Tuesday at 8:00  Wednesday at 8:00  Thursday at 8:00  Friday at 8:00  Saturday at 8:00  Sunday at 8:00
    9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  Sunday at 9:00
    10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  Sunday at 10:00
    11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  Sunday at 11:00
    12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  Sunday at 12:00
    13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  Sunday at 13:00
    14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00  Saturday at 14:00  Sunday at 14:00
    15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00  Saturday at 15:00  Sunday at 15:00
    16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00  Saturday at 16:00  Sunday at 16:00
    17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00  Saturday at 17:00  Sunday at 17:00
    18  Monday at 18:00  Tuesday at 18:00  Wednesday at 18:00  Thursday at 18:00  Friday at 18:00  Saturday at 18:00  Sunday at 18:00
    19              
    20              
    21              
    22              
    23              
    from £12.76Online via webcam

    Good-fit Instructor Guarantee


    If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

    Share


    Yousra
    Machine learning( Exploratory Data Analysis, Supervised & Unsupervised Machine Learning, Deep Learning and Reinforcement Learning )
    Machine Learning is one of the most sought-after skills in the modern world of AI applications, with hiring in this field growing at a staggering 74% annually for the last four years. This program is designed to equip you with the skills and experience needed to pursue a successful career in Machine Learning, and explore the main types of Machine Learning: Unsupervised Learning, Supervised Learning, Deep Learning, and Reinforcement Learning. You'll also delve into special topics to complement your learning. The program comprises of 6 courses that offer a solid theoretical understanding and ample opportunities to practice the main algorithms, uses, and best practices associated with Machine Learning. You'll code your own projects using the most relevant open-source frameworks and libraries, and apply what you learn in various courses to a final project. Whether you're already familiar with Python programming, statistics, and linear algebra, or just have a general interest in data analysis and self-learning, this intermediate series is suitable for you. We start with the basics, offer a solid theoretical foundation, code-along labs and demos, and build up to more advanced topics, making it an exciting and rewarding learning experience.

    Pierre-Hadrien
    Experienced tutor from EPFL to help with programming projects (Java, C, Python, Scala, VHDL)
    This course is intended for people who need help with their programming, academic or personal projects. I can easily help you develop a project in Java, C, Python, Scala, VHDL, having carried out many of them myself and helped a certain number of students to carry out theirs. I help in particular with the realization of projects from programming courses in the EPFL and UNIL programs, having followed and taught them myself, so I know the program well. I have been programming since I was 14 and have created several projects, from high school to graduate school. This course is therefore intended for all levels, for people wishing to start but also for middle school or high school graduates needing help in their courses. I have already taught programming and project monitoring courses in Java and would be happy to help you achieve your goal, adapting to the level and pace / pedagogy needed by anyone. Classes take place mainly at my home or on the EPFL campus, I can also travel by public transport to your home.

    Casey
    Computer Security Basics - Everything from online banking and investing to email and social media.
    Feeling secure online is becoming harder every day. Most people have no idea how vulnerable they are to cyber-attacks that could cost them dearly. There is a mountain of advice on the internet and YouTube, and it's hard to know who to believe when it comes to securing your private information and assets. I can guide you through the weeds so you can feel confident when doing everything from online banking and investing to social media. You will learn how to assign risk levels to everything you do online so you can avoid doing things that will increase your risk level. We are all at risk to some level, and each person has to decide how far they are willing to reasonably go to get the security they require.

    Brian
    GCSE & A level Computer Science Revision Sessions.
    Sometimes studying can be tough, I can help you improve your grades and enjoy your learning. As an advanced teaching practitioner I have substantial knowledge and expertise in helping students enjoy and achieve in their learning since my lessons are based around the individual needs of the student. I’ve taught in Colleges, Secondary Schools, Universities, I’ve been head of computer science and head of higher education in a number of educational establishments. I really enjoy teaching and helping students to realise their potential. I’m a grade 1 Outstanding teacher, and an advanced teaching practitioner. I've taught Computing/IT & Computer Science for over 25 years. I teach GCSE, A level and Degree courses in ICT and Computer Science. My specialist subjects cover the whole curriculum subject areas for A level and GCSE. I have experience of mentoring and coaching students from various backgrounds and nationalities. If you need help to get those grades in your GCSE or A level exams, book a lesson with me and I'll get you up to speed in the area you need help in.

    Asmaa
    Complete Computer Science Bootcamp: From Basics to Advanced
    Course Overview: This online computer science course is designed for students of all levels who want to build a strong foundation in programming, algorithms, and computational thinking. Whether you're a beginner or looking to enhance your existing skills, this course will guide you through the essential concepts and hands-on practices required to excel in the field of computer science. What You Will Learn: Fundamentals of programming: Learn how to write code in popular languages such as Python, Java, or C++. Data structures and algorithms: Understand key concepts like arrays, linked lists, sorting, and searching algorithms. Problem-solving techniques: Develop logical thinking and the ability to break down complex problems. Introduction to Artificial Intelligence: Explore the basics of AI and machine learning concepts. Web development basics: Get hands-on experience with HTML, CSS, and JavaScript for building interactive websites. Software engineering principles: Learn best practices for writing clean, efficient, and maintainable code.

    Gabriela
    ENGLISH, ACADEMIC WRITING, INTERNATIONAL LAW AND INTERNATIONAL RELATIONS, SECURITY
    Hi there! My name is Gabriela, and I graduated with a Master of Science from Leiden University four years ago. Since then, I've been working in international organizations and recently joined the private sector; my day-to-day work is mostly focused on keeping people safe and secure by analyzing geopolitical, economic, social, legal and security developments globally. My area of expertise is in the fields of Criminology, International Relations, International Law and Security Studies. I also provide tutoring in English for academic purposes (including IELTS prep), intensive writing and research methodologies. I have substantial experience in writing academic research papers on a wide variety of subjects. I am here to help high school students and undergraduates develop their writing and analytical skills and become more confident in their abilities. I am also experienced in teaching English as a second language. My purpose is to motivate and help students solve problems and come up with solutions on their own. I believe that with the right kind of preparation, no subject can be ‘too difficult’. I like seeing students going the extra mile and overcoming obstacles. My teaching method consists of giving students specific guidelines and directions so that they can engage in a learning process and become efficient problem solvers themselves. I see tutoring as the first step towards progress, but I want my students to develop the skills necessary to become successful learners on their own! I also provide teaching support for younger students. I have experience working with children aged 7 to 14 years old. Please feel free to contact me if you need any further information.

    Amira
    Programming lessons for children Scratch basic and advanced up to game programming
    No one can deny the importance of learning programming in our modern world and how it is the language of the age. Especially for the new generations, today's children are the builders of the future. That is why I am honored to teach your children the basics of programming and even advanced programming so that they are able to create applications and games that suit their desires and requirements. Invest in building their minds and skills today.

    Dr. Hani
    Learn Networking Essentials, Gain hands-on experience
    This course provides an overview of the concepts and fundamentals of computer networks. Topics include an overview of network architectures and topologies, IP addressing and subnetting, congestion mechanism CSMA/CD, troubleshooting commands and methods, switching and routing devices and their related decisions, TCP/IP layers and their protocols (FTP, HTTP, SMTP, DNS, DHCP, UDP, TCP, IP, ICMP etc...), security measures and how to secure your network using Access Lists and Firewall.

    Illia
    Java Development and Software Architecture: From Beginner to Professional
    Throughout my career, I have taken on various roles that highlight my dedication to education and mentorship. In the companies where I worked, I was responsible for onboarding new joiners and served as a team buddy for newcomers. This role involved providing guidance, support, and a smooth transition into the team environment. I have also been instrumental in educating junior and mid-level developers, introducing new concepts, and teaching them how to effectively apply these ideas in their work. My approach ensures that team members are well-equipped with the latest knowledge and best practices in the industry. My comprehensive experience in tutoring and teaching reflects my commitment to fostering a collaborative and growth-oriented learning environment. Whether in a formal setting or through informal sessions, I am dedicated to empowering others to achieve their full potential.

    Jaydip
    Python Tutor - Machine Learning - AI - A Professional Python developer is happy to teach you Python code/projects (software development).
    I can help you with your python project works. With live coding sessions, tips, and tricks you will have a chance to improve your knowledge or complete your coding project/assignments with great insight into the code. I am working with the following libraries in my everyday work AI developer: Numpy Pandas Scipy Scikit-learn Tensorflow / Keras Pytorch OpenCV Tesseract Pillow Tkinter Flask selenium Matplotlib and many more...

    رأفت
    Learn to build advanced AI models with TensorFlow
    On this journey, we will take you on a comprehensive learning journey to build AI models from scratch. Together, we will learn how to design and choose the right components for a model, including choosing layers and determining the optimal architecture to achieve specific goals. We will use TensorFlow, one of the most powerful frameworks in AI, to build advanced models from scratch to a working model. You will come away from this experience with a deep understanding of the practical steps that will enable you to build AI models that are applicable to your own projects.

    Akhil
    AWS Cloud, Typescript, NodeJS, Javascript, C#, SQL
    I am 20+ years experienced Software Engineer and currently working with a leading FinTech company in Australia. I have vast knowledge on AWS Cloud, Javascript, NodeJS, Typescript, SQL, C# and also the software Architecture. I am an AWS Certified Solutions Architect - Professional & a Microsoft Certified Trainer.

    Aboubaker
    HTML, CSS and JavaScript for web development beginners
    Discover the basics of web development with our comprehensive course designed for beginners! Whether you want to create your first website or improve your programming skills, this course covers everything you need to get started. You will learn HTML to structure your web pages, CSS to style and create responsive designs, as well as JavaScript to make your sites interactive. The course offers hands-on projects, interactive lessons, personalized feedback, and learning flexibility to progress at your own pace. Ideal for beginners and budding web developers, this course gives you a solid foundation in web development. Sign up today and start building your own websites!

    Basil
    Teaching all computer subjects, IGCSE ICT and IGCSE MATH
    Willing to teach computer programming courses in Python, Java, and C Database development using SQL Machine learning and data science courses IGCSE 0580 Mathematics Extended Curriculum IGCSE ICT and Computing IGCSE 0600 Additional Mathematics MS Office Suite with focus on Excel

    Ranjith
    Computer Fundamentals, Data Structures and Algorithm, Programing Languages, Database, English, Maths
    Programing Languages: Java, Javascript, C#, Node.js(oops concepts, programing), Advance programing. Data structure and algorithm: searching and sorting, time and space complexity. Database : SQl, Nosql, mongodb. Application developing. shell scripting.