Java + Software Engineer + Spring + Web development
I specialize in teaching Java, Spring and software engineering for all levels. My goal is to keep students ready for the real world and at the same time make learning fun. IT is a great field to learn and explore yourself. This is an era of digitization and one should be ready to implement and innovate !!
Full Stack Web Development, Front End, Databases, Backend
Starting from HTML5, CSS3 proceeding to bootstrap we will cover responsive web development from the basics to expert and build independent websites. Proceeding to Backend Technologies: preferred and a suitable language can be mutually agreed upon from Ruby, Python, Java. etc. Including additional frontend frameworks considering JS Basics, Advanced JS, React, Redux. As a bonus on completion of the full course which is approximately 6-7months with daily classes. Soft skills and Interview and Career preparation training are provided. (1 months - EGP 5000/- Value)
Master Unity Engine and C# Programming by Building A FULL RPG Game With Top Rated Udemy and SkillShare Instructor With More Than 15k Student
Programming and Video Game Development have been a passion of mine for the last 10 years. I've been through hundreds of bad Unity courses and have been instructed by very bad teachers. But from that, I've developed a strategy that has helped Thousands of students achieve their goals of creating real-world video games. And I want to do the same for You! My teaching techniques are Tailored for Complete beginners with zero coding experience to dive in with me and achieve a degree of mastery they never thought possible in such a short period of time. Our journey starts with the very basics, where we leave no stone unturned. We understand what every single button, tab, and window in the Unity Engine does. Next, we'll create our First Video Game just to get our initial fears out of the way. This will be a simple intro into Unity to make sure we understand the basics. But what really makes my instruction guide special is that I allow my students to choose how they would like to proceed from here. Is your goal to create a 2D RPG? A 3D First-Person Shooter? A 2D platformer? I will give you all these options, and you can freely choose which one suits your ambitions the most. And this is where the strategy comes in. We start building our project one gameplay mechanic at a time, and at every step we learn new video game design techniques, gain mastery of better programming methods, and increase our understanding of the Unity Engine. And the most amazing part is. We're doing all of this with the latest version of Unity and the most modern programming techniques. But what will really set you apart from all other students in your field and maximize your knowledge retention is my philosophy of learning "Doing > Watching." At every step of the way, you'll have challenges that you need to solve by yourself. But don't worry, even if you can't figure out how to do the challenges, I'll be there to help you after you try and complete the challenge with you. This method has shown an increase of 59% in student mastery of any subject, especially programming. So what should you expect by the end of my course? You'll become a master problem solver. You'll understand the fundamentals of coding and learn how to program video games just like the ones you've always dreamed of. I'm so excited to get started and I hope you are too. This is the perfect time to start learning Unity Engine, so dive in with me and I will help you along every step of your Video Game Development journey.
Private coding / programming lessons c#, Python. Beginners or interview preparation.
I'm a software engineer with 12 years of experience in software development, 5 years working for Amazon, with good experience teaching and conducting interviews. I can help you learn the basics of programing so you start learning and developing your coding skills, or I can help you prepare for software engineer interviews,
Software Lessons from a Youtuber with +90k Subscribers
Diploma in cyber security, specializing in digital forensics
Objectives The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to: • Implement technical strategies, tools, and techniques to secure data and information for your organization • Adhere to ethical security behavior to analyze and mitigate risks • Understand security in cloud computing architecture in depth • Understand legal requirements, privacy issues, and audit methodologies within a cloud environment • Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework what will you learn 1. Inactive survey conduct Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing. 2. Take an active survey So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement. 3. Gathering information and identifying weaknesses Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle. 4. Application testing There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction. 5. Digital Forensics This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline. 6. Digital Forensics: Getting Started with File Systems Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level. 7. Kali Linux Digital Forensics Tools: Imaging and Hash Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful. 8. Practical coding using Python Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career. 9. Social Engineering with Social Engineering Toolkit The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently. 10. Penetration testing with Metasploit Framework Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.
First Steps to becoming a Software Engineer/Programmer
If you want to become a Software Engineer, Enhance your career, build a cool application or even develop your own website and you need some guidance on how and where to start, I am here for you. My objective is to stop teaching you in about 3 months, so you can be on your own, learn to learn, and have fun building software with your own touch and spirit.
Test Automation , software testing , Agile processes , Java and ISTQB
I am Test Automation Engineer and I am available to teach basics of software testing , Java programming , ISTQB Certification , Basics of Agile and more . I can give you entire knowledge so that you can easily get a job in the field of software testing and automation or software development I am proficient in tools like Selenium , Appium , Espresso , Rest Assured and Jmeter I have studied computer science and I am having more than 15 years of experience in software industry . My way of teaching is quite easy for all kind of students as I always start from basics . I am native in English language If you would like to start a career as a software developer or software tester or Agile tester or software automation tester , then I would like to welcome you for my classes.
Programming(Back-end) With Java For Teenagers and Adults
As a software engineer who works in bank and e-commerce companies in Asia and Europe with teaching experience near 3 years to children and adults, I know the most efficient learning way for a person. Also, how to reach the most relevant job position at the right time.
SAP online tutoring in S / 4HANA and SAP Fiori basics.
Good day, * AmigoSAP - The cheapest online tutoring in SAP. * We offer online tutoring in SAP basics, S / 4HANA module SD, LE, MM and SAP Fiori. Support with the processing of case studies, term papers and, if necessary, Preparation for the exam. Target group: Beginners, students, users or career changers. If you have any questions or are interested, just contact us or visit us today Best wishes, AmigoSAP
Learn How to Build your own Java Spring Application
Do you wanna get started with widely used framework built on java and enhance your skillset? well I am here to help you! you just need to know very basic concepts of java for this class and you will learn spring framework in no time! This will be an online class. There will be total 15 to 20 classes each for one hour depending on your experience with basic java.
Guide freshers from any stream,to get Placed in MNC’s IT field,with 400000/-ctc
This is a full guided class for freshers from any IT or Non IT field to get hired by multinational companies like TCS,WIPRO,INFOSYS ect. The class will guide you to start from beginning,where to apply, how to get informations of hiring,what to learn, how to prepare for interview and so on.
LEGO EV3 STEM solution that engages students by providing the resources to design, build and program their creations while helping them d
STEM solution that engages students by providing the resources to design, build and program their creations while helping them develop essential skills such as creativity, critical thinking, collaboration, and communication. lego EV3lego EV3
Training of AWS (Amazon Web Services) cloud,Google Cloud Platform experienced faculty.
Amazon Web Services is a global market leader in Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) industry and Software as a service (SaaS) offering a wide range of remote cloud services. In this training, we will cover everything about AWS for beginners so that you can set with your career with emerging technology. AWS cloud computing offers computing power, content delivery, and networking among other functionalities to help organizations scale up. It allows you to select your desired solutions while you pay for exactly the services you consume. AWS is cost-effective, i.e. it helps you save your bucks, the catch with cloud cloud computing in general and with AWS is no CAPEX.The following can be covered based on the length of the classes. AWS Beginners Guide Cloud Computing concepts in general What is AWS Offering? (will explain cloud computing from the perspective of AWS) AWS EC2 AWS Lambda Analytics Artificial Intelligence Internet of Things Augmented Reality & Virtual Reality What’s in It for AWS for Businesses and Individuals? Scalability Commitment Free Security Reliability Flexible and Customizable To Sum Up: AWS for Beginners