My lessons are planned on first getting the topics explained from the basics and walking on based on the students need. I prioritize the basics to build solid understanding from there on. I solve examples in a step-by-step method to build a skeleton from where students can see the problem broken down and understand how to approach the solution. For students who are facing problems with understanding Computer Science and Engineering topics in English, I offer tuition in Arabic.
Computer engineering lessons in Luxembourg
Find your perfect private computer engineering tutor in Luxembourg.
Learn computer engineering with our teachers at home or in their studio.
0 teachers in my wish list
0 computer engineering teachers in Luxembourg
Hmm... We couldn’t find any results matching your search. Try online lessons with the following real-time online teachers:
I have more than 6 years of experience working with MATLAB and Python programming. MATLAB and Python programming are used for various disciplines and fields from economy to engineering. I can tutor from all levels. if you need to learn MATLAB, you must obtain your own licences and install it on your computer.
Computer programming · Computer science · Computer engineering
Network and Communications Engineer, Connectivity and Computer Technician, with experience in the field for more than 7 years. Advisor to student groups for more than 5 years with innovative and special formats for each student, on issues of connectivity and networks. Extensive experience in online and private classes through different IoT platforms with didactic material for students.
Computer science · Computer engineering · Network infrastructure
Hi friends, I am Habiba from Pakistan. I am a Computer scientist. Here, I shall be teaching my students about databases in the best possible manner. I can teach my students about SQL from basic to advance level. I can teach them SQLite, Oracle, Postgres, MS Access and MySQL as well. My students can learn ER Diagram, removal of anomalies from tables of databases, normalisation of tables, relational algebra and populating data in databases. I shall also be teaching them about the insertion, deletion and update of rows and columns in databases. I can help my students with the creation of functions, procedures and triggers as well.
Database · Computer science · Computer engineering
programming languages Python Java / C++ C Sharp Website design and development SQL/PHP database design and development Office software design computer skills ICDL Professional Training and Digital Transformation Microsoft Office training
Computer programming · Computer science · Computer engineering
a Ph.D. holder in Computer and Electrical Engineering. I was a teacher for 8 years in Kuwait. I have the ability to give classes to advanced and intermediate levels ( Math, programming C#, C, C++, JAVA, Python, R, engineering, statistics, algebra, calculus ... and any topic related to engineering.
Computer engineering · Computer programming · Math
Zohra - Lucerne, Switzerland$55
Trusted teacher: I give courses in MATLAB development at all levels, for everything related to data processing, signal processing and computer vision. I give courses in MATLAB development for all levels, for everything that is data processing, signal and computer vision.
Computer science · Computer programming · Computer engineering
Himank - Abu Dhabi, United Arab Emirates$27
Trusted teacher: Currently, I am working at MaaS department in Denso Corporation, Shinagawa, Tokyo. I have done my masters from Indian Institute of Technology Hyderabad India recently. I can teach you Blockchain, Bitcoin and Ethereum. During my masters at IIT, I have done my all research in Blockchain. This will bring some innovation in your life I can teach you coding, Science and Math if you wish to learn new things contact me. I little bit know Nihon-Go as well.
Engineering · Computer engineering
Maxime - Paris, France$48
Trusted teacher: Presentation : Data Science and AI engineer. IT consultant for 3 years in a Champagne House. Methodology : - online course - possibility of sending training exercises (with correction, or correction directly during the next lesson) - I am available every day for help with an exercise that poses a problem or other - possibility of resuming your lessons and doing help sessions for your exercises, DM Course: Engineering degree in Artificial Intelligence and Data Science at EPITA I also hold a Bac S, math option I did two years of preparatory Maths and Physics with Computer Science option (MPSI and MP).
Trusted teacher: I have 25 year experience teaching different courses in computer engineering department at college of computer and information sciences, King Saud university. I can help you with any course in your college curriculum including Data transmission, Digital control, Embedded systems, to name a few. Digital systems design for college students. Binary variables, truth table and Karnaugh map. Logic circuits, both combinational and sequential will be addressed. We will use simulation software to prove our design works as intended and familiarize ourselves with some, off-the-shelf, commonly used integrated circuits. This course covers two levels in college so it can be divided as per the person.
Trusted teacher: STEM solution that engages students by providing the resources to design, build and program their creations while helping them develop essential skills such as creativity, critical thinking, collaboration, and communication. lego EV3lego EV3
Computer engineering · Automotive engineering · Software engineering
Izhar - Amsterdam, Netherlands$23
Trusted teacher: Python is a high level programming language. It's object oriented approach help programmers to write simple and logical codes. Due to its easy syntax, it is actually easier as compared to other programming languages. Having years of experience in coding language, I know how and where to start and move the topics at a good pace. I'll be starting with you from scratch and help you to build your concepts and master over the language. I am providing you a brief summary of our course which we generally follow but that doesn't mean that I am bound to just this much content. In case you have any doubt for any other specific topic related to the subject, you could always come up to me or you need any help in your assignments or projects, you are always welcome. Here is a brief overview of the topics we'll be covering : 1: Introduction To Python • Installation and Working with Python • Understanding Python variables • Python basic Operators • Understanding python blocks 2: Python Data Types • Declaring and using Numeric data types: int, float, complex • Using string data type and string operations • Defining list and list slicing • Use of Tuple data type 3: Python Program Flow Control • Conditional blocks using if, else and elif • Simple for loops in python • For loop using ranges, string, list and dictionaries • Use of while loops in python • Loop manipulation using pass, continue, break and else • Programming using Python conditional and loops block 4: Python Functions, Modules And Packages • Organizing python codes using functions • Organizing python projects into modules • Importing own module as well as external modules • Understanding Packages • Powerful Lamda function in python • Programming using functions, modules and external packages 5: Python String, List And Dictionary Manipulations • Building blocks of python programs • Understanding string in build methods • List manipulation using in build methods • Dictionary manipulation • Programming using string, list and dictionary in build functions 6: Python File Operation • Reading config files in python • Writing log files in python • Understanding read functions, read(), readline() and readlines() • Understanding write functions, write() and writelines() • Manipulating file pointer using seek • Programming using file operations 7: Python Object Oriented Programming – Oops • Concept of class, object and instances • Constructor, class attributes and destructors • Real time use of class in live projects • Inheritance , overlapping and overloading operators • Adding and retrieving dynamic attributes of classes • Programming using Oops support 8: Python Regular Expression • Powerful pattern matching and searching • Power of pattern searching using regex in python • Real time parsing of networking or system data using regex • Password, email, url validation using regular expression • Pattern finding programs using regular expression 9: Python Exception Handling • Avoiding code break using exception handling • Safe guarding file operation using exception handling • Handling and helping developer with error code • Programming using Exception handling 10: Python Database Interaction • SQL Database connection using python • Creating and searching tables • Reading and storing config information on database • Programming using database connections 11: Python Multithreading • Understanding threads • Forking threads • Synchronizing the threads • Programming using multithreading 12: Contacting User Through Emails Using Python • Installing smtp python module • Sending email • Reading from file and sending emails to all users addressing them directly for marketing 13: Python CGI Introduction • Writing python program for CGI applications • Creating menus and accessing files • Server client program In case you have any query, please feel free to contact me. Give yourself a chance for a better future. All the best
Computer science · Computer programming · Computer engineering
Trusted teacher: My name is Adam and I am an automation engineer and programmer with 12 years practically experience in industry. I focus on the accuracy of knowledge transfer and understanding by the student. I can learn you: PLC programming (S7-1200 / 1500, S7-300 series in TIA portal and STEP7), automation & control theory, AVR microcontroller programming, C / C ++ / C # languages and finally I can also develop some program on the specific software platforms you finally need. I only use proven and tested methods in my work. I will never cheat you if I will not know something. My code is fully agreed and clear. I also have extensive programming facilities in software and hardware (for example: real PLC in my private home-lab with full remote access by the student who cooperate, or for example many hand-made education materials that may be helpful for you in future) . My passion is passing the knowledge with combine it with a practice, that is why I can give you very lot of practical examples and opportunities how can you use this knowledge in practical (in your future work for example). I can also guarantee that I will do my best for improve your knowledge and I will share you with my experiences also. Lessons will be in English, not German unfortunately.
Computer engineering · Computer programming
Trusted teacher: Course / Course ------------------------- - Introduction to computer security / Cybersecurity introduction - Ethical Hacking / Ethical Hacking - Intrusion Detection / Intrusion Detection - Investigation and prevention of cyber attacks / Forensics & Cyberattack Prevention Networking / Networking -------------------------------------------- - Canadian immigration procedure as a student or permanent resident - Position on some innovative projects with the University of Sherbrooke, Telecom SudParis, and Hydro-Quebec / Recruit on some innovating projects with University of Sherbrooke, Telecom SudParis, Hydro-Quebec
Security · Network infrastructure · Computer engineering
Trusted teacher: Hello everyone and welcome to this training on programming and more specifically on software development in C, my name is IMAD and I will be your trainer throughout this course I am a computer engineering student specializing in architecture, software development and web development. C is a very popular and used language. It is found almost everywhere such as in video games, most PC software and even in embedded. C is a very good candidate if you are looking for a first language to learn software development because it includes many notions that are found in most other languages. Thus mastering C guarantees you a much simpler and faster learning of other programming languages. In this training for beginners and intermediate in development, we will learn the basics of software development. How from lines of code we can make executable software on our machine. Then we will see the basics of the C language and, among other things, how to manage memory via variables, how to make our program live with loops and conditions or how to use the standard C library (STL) to interact with the user. Once these basics are acquired, we will increase the level a little with the dreaded pointers and arrays. this is often the part that newbies to C dread the most. But I guarantee you that with me it will finally seem very simple to you ;) So yes it's a big program but I guarantee you that you won't notice the time passing. Who is this course for? - University students specializing in computer science. - Beginner in software development. C is one of the best languages to embark on the adventure of programming. - People wishing to learn to develop in C or review and master the basics of this language.
Computer programming · Computer engineering · Algorithms
Vivek - Etterbeek, Belgium$30
Trusted teacher: At today's world computer programming is an integral part of one's skill. I invite you to this class where computer programming languages is explained in an easy to understand way with lot of hands on exercises and sample projects. You will feel the difference in just few classes.
Computer programming · Computer basics · Computer engineering
Sam - Brussels, Belgium$38
Trusted teacher: Machine learning -supervised unsupervised .. different projects and applications Professor in mathematics, computer science at HEFF in Brussels and before a professor of electronics at IEPSCF, NGÉNIEUR in electronics ECAMIEN basic graduate in mathematics-physics and I offer an individualized pedagogy, help in the preparation of questions or exams. My goal is to make the student progress without overloading him. I give homework after each lesson and periodically provide progress reports I strongly encourage the student because the state of mind and morale have a direct influence on school results. I am someone understandable and I always try to take each in his own way. I always start by clarifying the course after giving an example then giving an example to the student to do a complete exercise and finally correct an exam together generally that's the methodology but it can change from one case to another.
Computer science · Computer engineering
Trusted teacher: Objectives The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to: • Implement technical strategies, tools, and techniques to secure data and information for your organization • Adhere to ethical security behavior to analyze and mitigate risks • Understand security in cloud computing architecture in depth • Understand legal requirements, privacy issues, and audit methodologies within a cloud environment • Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework what will you learn 1. Inactive survey conduct Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing. 2. Take an active survey So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement. 3. Gathering information and identifying weaknesses Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle. 4. Application testing There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction. 5. Digital Forensics This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline. 6. Digital Forensics: Getting Started with File Systems Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level. 7. Kali Linux Digital Forensics Tools: Imaging and Hash Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful. 8. Practical coding using Python Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career. 9. Social Engineering with Social Engineering Toolkit The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently. 10. Penetration testing with Metasploit Framework Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.
Security · Computer engineering · Software engineering
Trusted teacher: Are you new to computer science ? are you struggling in understanding the foundation of computer science and programming ? is computer science not your first choice and you wanna get a good grade at it ? If you answer "yes" to one of the above question then this course is for you . I have three years experience teaching computer science foundation to junior university students and here to help you in understanding all what you need to pass the course .
Computer science · Computer programming · Computer engineering
Trusted teacher: I can teach Arabic since it's my mother tongue language and I always use it and currently I teach my son Arabic at home. I studied Arabic since my first year in school. In addition, I am from Yemen our dialect is so close to the classic Arabic.
Computer engineering · Arabic
Issamo - Rabat, Morocco$32
Trusted teacher: 🛑🚨 # fortigate⚡ # socket_en_main I am pleased to announce the launch of the Fortigate firewall getting started training, this training allows you to know the administration basics of the fortigate firewall ⛳ target audience: students, technicians, engineers
Network infrastructure · Computer engineering
Trusted teacher: This course is for people who are looking to improve their computer skills. I am a computer engineer and I have been working as a manager for two years. I will help you according to your level to progress and evolve.
Computer programming · Computer engineering · Computer science
Soufian - Meknes, Morocco$21
Trusted teacher: Introduction + basics of Matlab + Python : INTRO : I am an electromechanical engineer and ancient laureate from Arts et Metiers ParisTech throughout a master of science Mobility and electric vehicles. I worked in the automotive field as SW and algorithm ADAS engineer and very passionate by programming and scripting that I used before in my academic projects and professional jobs particularly using Matlab and Python Language. During this course, I am interested in teaching you the basics and fundamentals of Matlab and Python language that you can use wherever you go in your engineering life and that's highly recommended in multiple fields and companies: Just for your information Python as high-level language programming is used by Google, NASA, ... COURSE OBJECTIVE : By the end of this course, you will be able to program scripts with Matlab and Python, do proper versioning with GitHub, and if you are interested we can continue with python to show how we can handle create local projects using localhost servers. HOW : I can teach you French and/or English depending on your preferences. REQUIREMENTS : Personal Laptop + Moderate Connexion because the course will be online: The platform of course can be fixed later once the class is assembled.
Computer programming · Computer engineering · Computer modeling
27 years of university teaching experience as a faculty member in the Communications Engineering Department, Electronics, and computers • Electrical Circuits • Circuits Analysis • Solid State Electronics • Electronic Semiconductor Devices • Electronic Circuits • Integrated Circuits • Digital Electronics • Signals and Systems • Analog Communications • Digital Communications • Optical Communications • Fiber Optic Communications • Digital Logic Design • Computer Organization • Computer Architecture • Neural Networks • Applied Numerical Techniques • Computer Programming • Programming in C++/C • Programming in JAVA • ++Data Structures and Algorithms Design in C Dr Ashraf
Electronic circuits · Computer engineering · Telecommunications