امين
    Trusted teacher
    FavouritesAdd to Wish List
    FavouritesAdd to Wish List
    Trusted teacher
    from14.32USD/ h

    Diploma in cyber security, specializing in digital forensics

    Translated using Google Translate. Click to view original.
    Objectives
    The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to:

    • Implement technical strategies, tools, and techniques to secure data and information for your organization
    • Adhere to ethical security behavior to analyze and mitigate risks
    • Understand security in cloud computing architecture in depth
    • Understand legal requirements, privacy issues, and audit methodologies within a cloud environment
    • Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework
    what will you learn
    1. Inactive survey conduct
    Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing.

    2. Take an active survey
    So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement.

    3. Gathering information and identifying weaknesses
    Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle.

    4. Application testing
    There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction.

    5. Digital Forensics
    This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline.


    6. Digital Forensics: Getting Started with File Systems
    Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level.

    7. Kali Linux Digital Forensics Tools: Imaging and Hash
    Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful.

    8. Practical coding using Python
    Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career.

    9. Social Engineering with Social Engineering Toolkit
    The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently.

    10. Penetration testing with Metasploit Framework
    Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.

    Location

    Online via webcam

    General info

    Skills:
    Age:
    Children (7-12 years old)
    Teenagers (13-17 years old)
    Adults (18-64 years old)
    Seniors (65+ years old)
    Student level:
    Beginner
    Intermediate
    Advanced
    Duration:
    60 minutes
    120 minutes
    The class is taught in:Arabic, English

    About Me

    Translated using Google Translate. Click to view original.
    Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.

    Education

    Translated using Google Translate. Click to view original.
    Computer Science Engineer, 2010
    Professorship in Computer Science Applied to Disposition, 2008
    2020 Full-Stack Web Development with React Specialization
    2021 IBM Cybersecurity Analyst Professional Certificate

    Experience / Qualifications

    Translated using Google Translate. Click to view original.
    Operating systems, website programming, networks, computer maintenance, information security, graphic design,
    Technical Support Fundamentals
    The Bits and Bytes of Computer Networking
    Operating Systems and You: Becoming a Power User
    System Administration and IT Infrastructure Services
    IT Security: Defense against the digital dark arts
    The courses cover the topics that get you working with the Linux operating system. This includes discussing Linux installation and configuration scenarios before starting to manage Linux processes. By the end of this course, you will have built a solid foundation with Linux which will serve as a starting point for your Linux skills and roles Basic requirements Knowledge of operating systems may be helpful, but not necessary. what will you learn Working with Linux and open source software Linux installation and boot management Linux environment management Working with Linux package managers Understand the command line Find system help Working with the Linux file system
    The Cisco CCNA Exam is designed to verify an individual's knowledge of and operation of data network protocols. For most people, the use of more than one instructional method is important to solidify an understanding of the complex and interconnected systems of data network protocols. Watching videos and reading books are very important and this course is designed to add an extra and active learning method. In this course, The Basics, each unit examines a specific and fundamental topic in data networks. First, you will explore MAC and ARP addresses. Next, you will walk through VLANs, Trunking and InterVLAN routing. Finally, you will test static routing and dynamic routing. By the end of this course, you will have gone step-by-step through the challenges, solutions to problems, and how to solve them for each topic.
    A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters. Required software: -Photoshop - Illustrator -InDesign program duration: Photoshop: 6 hours Illustrator: 6 hours - InDesign: 6 hours
    This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities. requirements Networking basics basics what will you learn Wireshark Basic Functions Use Wireshark's advanced features Visualize network traffic with Wireshark Using Wireshark on the command line Network protocol analysis with Wireshark Troubleshoot slow networks with Wireshark

    Ask a question

    Send a message explaining your needs and امين will reply soon:
    The more detail, the better.
    Ex. "Hi, when are you available to meet for a lesson?"

    Availability of a typical week

    (GMT -04:00) New York
    MonTueWedThuFriSatSun
    0              
    1              
    2  Monday at 2:00  Tuesday at 2:00  Wednesday at 2:00  Thursday at 2:00  Friday at 2:00  Saturday at 2:00  Sunday at 2:00
    3  Monday at 3:00  Tuesday at 3:00  Wednesday at 3:00  Thursday at 3:00  Friday at 3:00  Saturday at 3:00  Sunday at 3:00
    4  Monday at 4:00  Tuesday at 4:00  Wednesday at 4:00  Thursday at 4:00  Friday at 4:00  Saturday at 4:00  Sunday at 4:00
    5  Monday at 5:00  Tuesday at 5:00  Wednesday at 5:00  Thursday at 5:00  Friday at 5:00  Saturday at 5:00  Sunday at 5:00
    6  Monday at 6:00  Tuesday at 6:00  Wednesday at 6:00  Thursday at 6:00  Friday at 6:00  Saturday at 6:00  Sunday at 6:00
    7  Monday at 7:00  Tuesday at 7:00  Wednesday at 7:00  Thursday at 7:00  Friday at 7:00  Saturday at 7:00  Sunday at 7:00
    8  Monday at 8:00  Tuesday at 8:00  Wednesday at 8:00  Thursday at 8:00  Friday at 8:00  Saturday at 8:00  Sunday at 8:00
    9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  Sunday at 9:00
    10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  Sunday at 10:00
    11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  Sunday at 11:00
    12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  Sunday at 12:00
    13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  Sunday at 13:00
    14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00  Saturday at 14:00  Sunday at 14:00
    15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00  Saturday at 15:00  Sunday at 15:00
    16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00  Saturday at 16:00  Sunday at 16:00
    17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00  Saturday at 17:00  Sunday at 17:00
    18  Monday at 18:00  Tuesday at 18:00  Wednesday at 18:00  Thursday at 18:00  Friday at 18:00  Saturday at 18:00  Sunday at 18:00
    19              
    20              
    21              
    22              
    23              
    from $14.32Online via webcam

    Good-fit Instructor Guarantee


    If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

    Online reputation

    • Instructor since February 2022
    • Phone number verified
    • Linkedin connected

    Availability of a typical week

    (GMT -04:00) New York
    MonTueWedThuFriSatSun
    0              
    1              
    2  Monday at 2:00  Tuesday at 2:00  Wednesday at 2:00  Thursday at 2:00  Friday at 2:00  Saturday at 2:00  Sunday at 2:00
    3  Monday at 3:00  Tuesday at 3:00  Wednesday at 3:00  Thursday at 3:00  Friday at 3:00  Saturday at 3:00  Sunday at 3:00
    4  Monday at 4:00  Tuesday at 4:00  Wednesday at 4:00  Thursday at 4:00  Friday at 4:00  Saturday at 4:00  Sunday at 4:00
    5  Monday at 5:00  Tuesday at 5:00  Wednesday at 5:00  Thursday at 5:00  Friday at 5:00  Saturday at 5:00  Sunday at 5:00
    6  Monday at 6:00  Tuesday at 6:00  Wednesday at 6:00  Thursday at 6:00  Friday at 6:00  Saturday at 6:00  Sunday at 6:00
    7  Monday at 7:00  Tuesday at 7:00  Wednesday at 7:00  Thursday at 7:00  Friday at 7:00  Saturday at 7:00  Sunday at 7:00
    8  Monday at 8:00  Tuesday at 8:00  Wednesday at 8:00  Thursday at 8:00  Friday at 8:00  Saturday at 8:00  Sunday at 8:00
    9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  Sunday at 9:00
    10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  Sunday at 10:00
    11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  Sunday at 11:00
    12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  Sunday at 12:00
    13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  Sunday at 13:00
    14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00  Saturday at 14:00  Sunday at 14:00
    15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00  Saturday at 15:00  Sunday at 15:00
    16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00  Saturday at 16:00  Sunday at 16:00
    17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00  Saturday at 17:00  Sunday at 17:00
    18  Monday at 18:00  Tuesday at 18:00  Wednesday at 18:00  Thursday at 18:00  Friday at 18:00  Saturday at 18:00  Sunday at 18:00
    19              
    20              
    21              
    22              
    23              
    from $14.32Online via webcam

    Good-fit Instructor Guarantee


    If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

    Share


    Dr Zeeshan
    Lesson 03: Web Security Threat Analysis (Lesson 03 of Web Penetration Testing Series)
    This lesson is the third lesson of the Web Penetration Testing Series. This lesson covers the following topics: - Web Application Security Overview - Security Principles - Attack Anatomy - Threat Modeling - STRIDE Methodology - DREAD Methodology - Attack Trees This lesson is followed by a 02 hours lab practical session.

    Farah
    Online Image Processing course by an experienced professor
    I am a Doctor of Engineering, graduate of Paris VI and the University of Grenoble. I am a University Professor since 2002. I teach my courses in English and French. In my Image Processing course, I mainly cover the following subjects (non-exhaustive list): Image transformations, Histogram equalization and specification, Image enhancement, Spatial filtering. Discrete Fourier Transform (DFT) of an image, Frequency-domain filtering, Correlation. Noise and distortion. Image restoration methods. Mathematical morphology: techniques and algorithms. Color representation, Color image processing. Image segmentation techniques. Image classification techniques. I can help you pass your exams. My teaching methodology: I explain the concepts in an interactive way, including practical examples and answering the student's questions. I guide the student in the assimilation and synthesis of the different techniques in telecommunications engineering. Signal processing techniques will no longer have any secrets for you!

    Rishabh
    Java + Software Engineer + Spring + Web development
    I specialize in teaching Java, Spring and software engineering for all levels. My goal is to keep students ready for the real world and at the same time make learning fun. IT is a great field to learn and explore yourself. This is an era of digitization and one should be ready to implement and innovate !!

    Mouhssine
    computing, programming, development, design, UML, operating system, CCNA cisco.
    As you know, IT is a topical area, so it's a very big area where there are a lot of concepts and programming languages, technologies etc... Almost all companies need IT profiles so this is an area where there are too many opportunities. So the courses I will share with you my knowledge and my knowledge, also my experience in this field, where you will become able to solve problems and find creative solutions.

    Michael
    Master Unity Engine and C# Programming by Building A FULL RPG Game With Top Rated Udemy and SkillShare Instructor With More Than 15k Student
    Programming and Video Game Development have been a passion of mine for the last 10 years. I've been through hundreds of bad Unity courses and have been instructed by very bad teachers. But from that, I've developed a strategy that has helped Thousands of students achieve their goals of creating real-world video games. And I want to do the same for You! My teaching techniques are Tailored for Complete beginners with zero coding experience to dive in with me and achieve a degree of mastery they never thought possible in such a short period of time. Our journey starts with the very basics, where we leave no stone unturned. We understand what every single button, tab, and window in the Unity Engine does. Next, we'll create our First Video Game just to get our initial fears out of the way. This will be a simple intro into Unity to make sure we understand the basics. But what really makes my instruction guide special is that I allow my students to choose how they would like to proceed from here. Is your goal to create a 2D RPG? A 3D First-Person Shooter? A 2D platformer? I will give you all these options, and you can freely choose which one suits your ambitions the most. And this is where the strategy comes in. We start building our project one gameplay mechanic at a time, and at every step we learn new video game design techniques, gain mastery of better programming methods, and increase our understanding of the Unity Engine. And the most amazing part is. We're doing all of this with the latest version of Unity and the most modern programming techniques. But what will really set you apart from all other students in your field and maximize your knowledge retention is my philosophy of learning "Doing > Watching." At every step of the way, you'll have challenges that you need to solve by yourself. But don't worry, even if you can't figure out how to do the challenges, I'll be there to help you after you try and complete the challenge with you. This method has shown an increase of 59% in student mastery of any subject, especially programming. So what should you expect by the end of my course? You'll become a master problem solver. You'll understand the fundamentals of coding and learn how to program video games just like the ones you've always dreamed of. I'm so excited to get started and I hope you are too. This is the perfect time to start learning Unity Engine, so dive in with me and I will help you along every step of your Video Game Development journey.

    Shabbir
    Full Stack Web Development, Front End, Databases, Backend
    Starting from HTML5, CSS3 proceeding to bootstrap we will cover responsive web development from the basics to expert and build independent websites. Proceeding to Backend Technologies: preferred and a suitable language can be mutually agreed upon from Ruby, Python, Java. etc. Including additional frontend frameworks considering JS Basics, Advanced JS, React, Redux. As a bonus on completion of the full course which is approximately 6-7months with daily classes. Soft skills and Interview and Career preparation training are provided. (1 months - EGP 5000/- Value)

    Mihajlo
    Programming in C, Python, JavaScript, and Computer Science concepts
    Adapted to your requests, you can learn about various Computer Science topics such as coding, problem-solving, data structures, web development, and other programming concepts. I can teach you how to program in Python, C, or JavaScript, and utilize various libraries and frameworks like, for example, React and Node for web development. This class is for current students in Computer Science, or someone who just wants to get started/ better themselves in the field, or feels stuck and unable to understand certain concepts.

    Luis
    Private coding / programming lessons c#, Python. Beginners or interview preparation.
    I'm a software engineer with 12 years of experience in software development, 5 years working for Amazon, with good experience teaching and conducting interviews. I can help you learn the basics of programing so you start learning and developing your coding skills, or I can help you prepare for software engineer interviews,

    Izhar
    C Language -- Computer Language Course by a trained professional having Master's Degree in Computers.
    Do you want to start your career in coding? There are excellent chances of growth in this sector. Do you think it'll be tough to learn this language. No! Not at all! I am an expert in C language having practical work experience. I'll start from the scratch, strengthen your basics and help you to master this language. I am providing you a brief summary of our course which we generally follow but that doesn't mean that I am bound to just this much content. In case you have any doubt for any other specific topic related to the subject, you could always come up to me or you need any help in your assignments or projects, you are always welcome. Here is a brief summary of our course : –Introduction to Programming –Fundamentals in C –Operators and Expressions –Data types –Input-Output Library Functions –Control statements –Function –Storage class –Pointer –Pointer and Function –Array –Pointer and array –Array and function –Dynamic memory allocation –String –String and function –Command line arguments –Preprocessor –Structure –Structure and function –File Handling –ODBC Programming –Process and threads –Graphics In case you have any query, feel free to contact me. Give yourself a chance for a better future. All the best

    Servet
    Software Lessons from a Youtuber with +90k Subscribers
    Hello! I am currently a Senior Computer Science student at Bilkent University. I've got a coding channel with +90k subscribers. I've started coding in my highschool years, and everything about programming and computer become my passion. I've got experience in many areas. I know website development, browser games, desktop applications, mobile & desktop game development, mobile app development and so many other things. If you are new to programming, welcome aboard. I am here to guide you. I can lead you and I can tell what you should do. I can help you with: C++, MIPS Assembly, JavaScript, C#, C, Python, Java, System Verilog, SQL, MarlinOS, HTML, CSS

    Issamo
    Formation CERTIFED ETHICAL HACKING with labs in kali
    Ceh is verry intersting formation in security , the goal of this formation is to help student to know how hacker work in the goal to block all threat from real hacker, is ethical hacker. When you think like hacker you can block them, this formation is very interested

    Adam
    PLC Programmable Logic Controllers, S7-1200, S7-1500, TIA PORTAL, Programming SIMATIC Siemens
    My name is Adam and I am an automation engineer and programmer with 12 years practically experience in industry. I focus on the accuracy of knowledge transfer and understanding by the student. I can learn you: PLC programming (S7-1200 / 1500, S7-300 series in TIA portal and STEP7), automation & control theory, AVR microcontroller programming, C / C ++ / C # languages and finally I can also develop some program on the specific software platforms you finally need. I only use proven and tested methods in my work. I will never cheat you if I will not know something. My code is fully agreed and clear. I also have extensive programming facilities in software and hardware (for example: real PLC in my private home-lab with full remote access by the student who cooperate, or for example many hand-made education materials that may be helpful for you in future) . My passion is passing the knowledge with combine it with a practice, that is why I can give you very lot of practical examples and opportunities how can you use this knowledge in practical (in your future work for example). I can also guarantee that I will do my best for improve your knowledge and I will share you with my experiences also. Lessons will be in English, not German unfortunately.

    Abdullah
    First Steps to becoming a Software Engineer/Programmer
    If you want to become a Software Engineer, Enhance your career, build a cool application or even develop your own website and you need some guidance on how and where to start, I am here for you. My objective is to stop teaching you in about 3 months, so you can be on your own, learn to learn, and have fun building software with your own touch and spirit.

    Ankit
    Online tutoring for Computer science Engineering students.
    followings things i can teach, Data Structures (Beginner-Expert) Theory of Automata (Beginner-Expert) Theory of Computation (Beginner-Expert) DBMS (Beginner-Intermediate) Python (Beginner-Intermediate) C (Beginner-Expert) Competitive Programming (Beginner-Expert) Graph Theory and Combinatorics (Beginner-Expert) JAVA (Beginner-Intermediate) Database Management Systems (Beginner-Expert) Object oriented programming (Beginner-Expert) Database management system (Beginner-Expert) Operating Systems (Beginner-Intermediate) Theory of computations (Beginner-Expert) Data Structures and Algorithms in Python (Beginner-Expert) Programming for Job interviews (Beginner-Expert) Leetcode Solving for Job Interviews (Beginner-Intermediate) Algorithm design and analysis (Beginner-Expert) Algorithm Analysis (Beginner-Expert) Data Structure and Algorithms (Beginner-Expert)

    Sami
    Private lessons in computer science (Programming-algorithmic)
    This course is for people who are looking to improve their computer skills. I am a computer engineer and I have been working as a manager for two years. I will help you according to your level to progress and evolve.