from13.14USD/ h
Network Traffic Analysis with Wireshark - for Software Developers and Network Engineers
Translated by Google. Click to view original.
This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities.requirements
Networking basics basics
what will you learn
Wireshark Basic Functions
Use Wireshark's advanced features
Visualize network traffic with Wireshark
Using Wireshark on the command line
Network protocol analysis with Wireshark
Troubleshoot slow networks with Wireshark
Location
Online via webcam
General info
Age: | Children (7-12 years old) Teenagers (13-17 years old) Adults (18-64 years old) Seniors (65+ years old) |
---|---|
Student level: | Beginner Intermediate Advanced |
Duration: | 60 minutes |
The class is taught in: | Arabic, English |
About Me
Translated by Google. Click to view original.
Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.Education
Translated by Google. Click to view original.
Computer Science Engineer, 2010Professorship in Computer Science Applied to Disposition, 2008
2020 Full-Stack Web Development with React Specialization
2021 IBM Cybersecurity Analyst Professional Certificate
Experience / Qualifications
Translated by Google. Click to view original.
Operating systems, website programming, networks, computer maintenance, information security, graphic design,Technical Support Fundamentals
The Bits and Bytes of Computer Networking
Operating Systems and You: Becoming a Power User
System Administration and IT Infrastructure Services
IT Security: Defense against the digital dark arts
A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters.
Required software:
-Photoshop
- Illustrator
-InDesign
program duration:
Photoshop: 6 hours
Illustrator: 6 hours
- InDesign: 6 hours
The Cisco CCNA Exam is designed to verify an individual's knowledge of and operation of data network protocols. For most people, the use of more than one instructional method is important to solidify an understanding of the complex and interconnected systems of data network protocols. Watching videos and reading books are very important and this course is designed to add an extra and active learning method. In this course, The Basics, each unit examines a specific and fundamental topic in data networks. First, you will explore MAC and ARP addresses. Next, you will walk through VLANs, Trunking and InterVLAN routing. Finally, you will test static routing and dynamic routing. By the end of this course, you will have gone step-by-step through the challenges, solutions to problems, and how to solve them for each topic.
The courses cover the topics that get you working with the Linux operating system. This includes discussing Linux installation and configuration scenarios before starting to manage Linux processes. By the end of this course, you will have built a solid foundation with Linux which will serve as a starting point for your Linux skills and roles
Basic requirements
Knowledge of operating systems may be helpful, but not necessary.
what will you learn
Working with Linux and open source software
Linux installation and boot management
Linux environment management
Working with Linux package managers
Understand the command line
Find system help
Working with the Linux file system
Objectives
The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to:
• Implement technical strategies, tools, and techniques to secure data and information for your organization
• Adhere to ethical security behavior to analyze and mitigate risks
• Understand security in cloud computing architecture in depth
• Understand legal requirements, privacy issues, and audit methodologies within a cloud environment
• Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework
what will you learn
1. Inactive survey conduct
Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing.
2. Take an active survey
So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement.
3. Gathering information and identifying weaknesses
Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle.
4. Application testing
There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction.
5. Digital Forensics
This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline.
6. Digital Forensics: Getting Started with File Systems
Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level.
7. Kali Linux Digital Forensics Tools: Imaging and Hash
Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful.
8. Practical coding using Python
Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career.
9. Social Engineering with Social Engineering Toolkit
The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently.
10. Penetration testing with Metasploit Framework
Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.
Ask a question
Send a message explaining your needs and امين will reply soon:
The more detail, the better.
Ex. "Hi, when are you available to meet for a lesson?"
Ex. "Hi, when are you available to meet for a lesson?"
Availability of a typical week
(GMT -05:00) Chicago
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | Monday at 1:00 | Tuesday at 1:00 | Wednesday at 1:00 | Thursday at 1:00 | Friday at 1:00 | Saturday at 1:00 | |
2 | Monday at 2:00 | Tuesday at 2:00 | Wednesday at 2:00 | Thursday at 2:00 | Friday at 2:00 | Saturday at 2:00 | |
3 | Monday at 3:00 | Tuesday at 3:00 | Wednesday at 3:00 | Thursday at 3:00 | Friday at 3:00 | Saturday at 3:00 | |
4 | Monday at 4:00 | Tuesday at 4:00 | Wednesday at 4:00 | Thursday at 4:00 | Friday at 4:00 | Saturday at 4:00 | |
5 | Monday at 5:00 | Tuesday at 5:00 | Wednesday at 5:00 | Thursday at 5:00 | Friday at 5:00 | Saturday at 5:00 | |
6 | Monday at 6:00 | Tuesday at 6:00 | Wednesday at 6:00 | Thursday at 6:00 | Friday at 6:00 | Saturday at 6:00 | |
7 | Monday at 7:00 | Tuesday at 7:00 | Wednesday at 7:00 | Thursday at 7:00 | Friday at 7:00 | Saturday at 7:00 | |
8 | Monday at 8:00 | Tuesday at 8:00 | Wednesday at 8:00 | Thursday at 8:00 | Friday at 8:00 | Saturday at 8:00 | |
9 | Monday at 9:00 | Tuesday at 9:00 | Wednesday at 9:00 | Thursday at 9:00 | Friday at 9:00 | Saturday at 9:00 | |
10 | Monday at 10:00 | Tuesday at 10:00 | Wednesday at 10:00 | Thursday at 10:00 | Friday at 10:00 | Saturday at 10:00 | |
11 | Monday at 11:00 | Tuesday at 11:00 | Wednesday at 11:00 | Thursday at 11:00 | Friday at 11:00 | Saturday at 11:00 | |
12 | Monday at 12:00 | Tuesday at 12:00 | Wednesday at 12:00 | Thursday at 12:00 | Friday at 12:00 | Saturday at 12:00 | |
13 | Monday at 13:00 | Tuesday at 13:00 | Wednesday at 13:00 | Thursday at 13:00 | Friday at 13:00 | Saturday at 13:00 | |
14 | Monday at 14:00 | Tuesday at 14:00 | Wednesday at 14:00 | Thursday at 14:00 | Friday at 14:00 | Saturday at 14:00 | |
15 | Monday at 15:00 | Tuesday at 15:00 | Wednesday at 15:00 | Thursday at 15:00 | Friday at 15:00 | Saturday at 15:00 | |
16 | Monday at 16:00 | Tuesday at 16:00 | Wednesday at 16:00 | Thursday at 16:00 | Friday at 16:00 | Saturday at 16:00 | |
17 | Monday at 17:00 | Tuesday at 17:00 | Wednesday at 17:00 | Thursday at 17:00 | Friday at 17:00 | Saturday at 17:00 | |
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from $13.14Online via webcam
100% Satisfaction Guarantee
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Online reputation
- Instructor since February 2022
- Phone number verified
- Linkedin connected
Availability of a typical week
(GMT -05:00) Chicago
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | Monday at 1:00 | Tuesday at 1:00 | Wednesday at 1:00 | Thursday at 1:00 | Friday at 1:00 | Saturday at 1:00 | |
2 | Monday at 2:00 | Tuesday at 2:00 | Wednesday at 2:00 | Thursday at 2:00 | Friday at 2:00 | Saturday at 2:00 | |
3 | Monday at 3:00 | Tuesday at 3:00 | Wednesday at 3:00 | Thursday at 3:00 | Friday at 3:00 | Saturday at 3:00 | |
4 | Monday at 4:00 | Tuesday at 4:00 | Wednesday at 4:00 | Thursday at 4:00 | Friday at 4:00 | Saturday at 4:00 | |
5 | Monday at 5:00 | Tuesday at 5:00 | Wednesday at 5:00 | Thursday at 5:00 | Friday at 5:00 | Saturday at 5:00 | |
6 | Monday at 6:00 | Tuesday at 6:00 | Wednesday at 6:00 | Thursday at 6:00 | Friday at 6:00 | Saturday at 6:00 | |
7 | Monday at 7:00 | Tuesday at 7:00 | Wednesday at 7:00 | Thursday at 7:00 | Friday at 7:00 | Saturday at 7:00 | |
8 | Monday at 8:00 | Tuesday at 8:00 | Wednesday at 8:00 | Thursday at 8:00 | Friday at 8:00 | Saturday at 8:00 | |
9 | Monday at 9:00 | Tuesday at 9:00 | Wednesday at 9:00 | Thursday at 9:00 | Friday at 9:00 | Saturday at 9:00 | |
10 | Monday at 10:00 | Tuesday at 10:00 | Wednesday at 10:00 | Thursday at 10:00 | Friday at 10:00 | Saturday at 10:00 | |
11 | Monday at 11:00 | Tuesday at 11:00 | Wednesday at 11:00 | Thursday at 11:00 | Friday at 11:00 | Saturday at 11:00 | |
12 | Monday at 12:00 | Tuesday at 12:00 | Wednesday at 12:00 | Thursday at 12:00 | Friday at 12:00 | Saturday at 12:00 | |
13 | Monday at 13:00 | Tuesday at 13:00 | Wednesday at 13:00 | Thursday at 13:00 | Friday at 13:00 | Saturday at 13:00 | |
14 | Monday at 14:00 | Tuesday at 14:00 | Wednesday at 14:00 | Thursday at 14:00 | Friday at 14:00 | Saturday at 14:00 | |
15 | Monday at 15:00 | Tuesday at 15:00 | Wednesday at 15:00 | Thursday at 15:00 | Friday at 15:00 | Saturday at 15:00 | |
16 | Monday at 16:00 | Tuesday at 16:00 | Wednesday at 16:00 | Thursday at 16:00 | Friday at 16:00 | Saturday at 16:00 | |
17 | Monday at 17:00 | Tuesday at 17:00 | Wednesday at 17:00 | Thursday at 17:00 | Friday at 17:00 | Saturday at 17:00 | |
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from $13.14Online via webcam
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Share
You are here
Similar classes
Rony
Learn Data Communication and Networking! From the fundamentals to the deeper concepts!Learn Data Communication & Networking!🌐
Are you interested in understanding how data moves across networks, how the internet works, and how to build efficient communication systems? I’m excited to announce that I will be offering Data Communication and Networking classes!
📌 What You’ll Learn:
✅ Networking fundamentals and protocols
✅ OSI and TCP/IP models explained
✅ Wired vs. wireless communication
✅ IP addressing and subnetting
✅ Network security basics
✅ Real-world applications and hands-on practice
📌 Who Is This For?
🔹 Students, tech enthusiasts, and IT professionals
🔹 Anyone looking to improve their networking skills
🔹 Those preparing for networking certifications
📌 Why Join?
✔️ Practical, easy-to-understand lessons
✔️ Hands-on exercises and real-world examples
✔️ Learn from an experienced instructor
If you’re interested, feel free to reach out for more details. Let’s dive into the world of networking together! 🚀
Mohamed
Teaching Many Engineering Courses for College StudentsTeaching All Engineer Courses for Mechanical Engineering Students which will suits also Mechanical Engineering Students, Electrical Engineering Students and Computer Engineering Students. It will include theoretical teaching lessons and practical teaching lessons and also include many software such as Matlab.
Abderraouf
Software Engineer – Passionate Maths Tutor from Middle School to Bac+2, Online Across Île-de-FranceI'm a software engineer offering online maths tutoring for students from middle school (Brevet) up to Bac+2 level. Passionate about teaching and science, I adapt my approach to each student’s pace and level to make maths more accessible, engaging, and concrete. Whether it’s about reinforcing fundamentals, exam prep, or tackling advanced concepts, I provide personalized support tailored to each learner.
Based in Île-de-France and fully available online, I bring a structured, patient, and motivating teaching style.
Abdallah
Networking and IT operations ( CCNA, MCSA, AZURE administration, cloud computing) online everywhere and offline in EgyptAfter Completing Our Course:
- Career Advancement: Gain certifications like CCNA and MCSA, which are highly valued in the IT industry and can significantly boost your career prospects.
- High Earning Potential: IT professionals with certifications in networking and cloud computing often command higher salaries and have better job security.
- Versatile Skill Set: Acquire a comprehensive understanding of networking, cloud services, and IT operations, making you a valuable asset in various IT roles.
- Hands-On Experience: Develop practical skills through real-world scenarios and labs, preparing you to tackle complex IT challenges with confidence.
- Cutting-Edge Knowledge: Stay updated with the latest technologies and best practices in networking and cloud computing, ensuring you remain competitive in the job market.
- Global Opportunities: With expertise in networking and IT operations, you can explore job opportunities worldwide, expanding your professional horizons.
- Professional Networking: Connect with industry experts and peers, building a strong professional network that can support your career growth.
### Course Description: Networking and IT Operations
#### Overview
This comprehensive course is designed for individuals seeking to enhance their skills in networking and IT operations. The curriculum covers essential certifications such as CCNA, MCSA, and Azure Administration, along with in-depth knowledge of cloud computing. The course is available both online globally and offline in Egypt, providing flexible learning options to suit your needs.
#### Course Objectives
- **Networking Fundamentals**: Understand the basics of networking technologies, including network topologies, protocols, and hardware.
- **CCNA Certification**: Gain the skills needed to configure, manage, and troubleshoot Cisco networks, preparing you for the CCNA certification exam3.
- **MCSA Certification**: Learn to manage and maintain Windows Server environments, covering key topics required for the MCSA certification.
- **Azure Administration**: Develop expertise in managing Azure subscriptions, securing identities, configuring virtual networks, and implementing storage solutions12.
- **Cloud Computing**: Explore the principles of cloud computing, including deployment models, service models, and cloud security.
#### Key Topics
1. **Networking Technologies**
- Network topologies and protocols
- IP addressing and subnetting
- Routing and switching fundamentals
2. **Cisco Certified Network Associate (CCNA)**
- Network access and IP connectivity
- Security fundamentals
- Automation and programmability
3. **Microsoft Certified Solutions Associate (MCSA)**
- Installation, storage, and compute with Windows Server
- Networking with Windows Server
- Identity with Windows Server
4. **Microsoft Azure Administration**
- Managing Azure subscriptions and resources
- Implementing and managing storage
- Configuring and managing virtual networks
- Monitoring and backing up Azure resources
5. **Cloud Computing**
- Cloud service models (IaaS, PaaS, SaaS)
- Cloud deployment models (public, private, hybrid)
- Cloud security and compliance
#### Learning Outcomes
By the end of this course, participants will be able to:
- Design, implement, and manage network infrastructures.
- Configure and troubleshoot Cisco network devices.
- Administer Windows Server environments effectively.
- Manage and secure Azure cloud environments.
- Understand and apply cloud computing concepts in real-world scenarios.
#### Delivery Method
- **Online**: Accessible from anywhere in the world, providing flexibility for remote learners.
- **Offline**: In-person classes available in Egypt, offering hands-on experience and direct interaction with instructors.
#### Target Audience
This course is ideal for:
- IT professionals looking to advance their careers in networking and cloud computing.
- Students preparing for CCNA, MCSA, and Azure certification exams.
- Individuals seeking to gain practical skills in IT operations and cloud management.
#### Prerequisites
- Basic understanding of computer networks and operating systems is recommended.
- No prior certification is required, but a willingness to learn and engage with the material is essential.
Ready to take your IT skills to the next level? Enroll now and start your journey towards becoming a certified networking and cloud computing professional!
Rafael
The C++ programming language -- basic and advanced conceptsC++ is a leading programming language used in game development, virtual reality, real-time simulation and high-frequency trading, where efficiency and speed matter.
One reason why C++ is so effective is its ability to work very closely with hardware. Additionally, as an object-oriented programming language, it offers flexibility in development. This makes it the go-to language when speed and performance are non-negotiable.
With a competitive base salary, there is a significant demand for C++ developers in high-stake fields like game development.
Salim
Computer science courses (Algorithms, Python, SQL, Power BI and MS office)Hi there!
I'm a Data Scientist and Data Analyst with over five years of experience, here to help you master Python, algorithms, SQL, and Power BI.
I focus on practical, real-world applications, so whether you're just starting or looking to advance, my lessons will equip you with the skills to succeed. Let's make learning fun and effective!
Thomas
Python for Beginners or Tech Enthusiasts! Start now!Dive into the world of programming with Python! This introductory class offers a hands-on approach to learning Python's core concepts. Ideal for aspiring IT professionals, software engineers, and data enthusiasts, you'll gain practical experience and build a solid foundation in Python programming.
Jaydip
Python Tutor - Machine Learning - AI - A Professional Python developer is happy to teach you Python code/projects (software development).I can help you with your python project works. With live coding sessions, tips, and tricks you will have a chance to improve your knowledge or complete your coding project/assignments with great insight into the code. I am working with the following libraries in my everyday work AI developer:
Numpy
Pandas
Scipy
Scikit-learn
Tensorflow / Keras
Pytorch
OpenCV
Tesseract
Pillow
Tkinter
Flask
selenium
Matplotlib and many more...
Cyril
3D Modeling Course with Rhino and GrasshopperCourse description:
This comprehensive course is designed for architects, designers, engineers, and creatives who are passionate about 3D modeling and parametrics. You will learn to master Rhino 3D, a powerful 3D modeling software, as well as Grasshopper, a parametric plugin that allows you to generate complex shapes using visual programming.
Course objectives:
Learn how to use Rhino's basic and advanced tools to create accurate and detailed 3D models.
Master the concepts of parametric modeling using Grasshopper to generate dynamic and adaptive shapes.
Understand how Rhino and Grasshopper integrate to automate design processes and improve efficiency.
Create real-world projects ranging from designing simple geometric shapes to complex, custom structures.
Course content :
Introduction to Rhino 3D: Interface, basic commands, and navigation in the 3D workspace.
Advanced modeling techniques: Creation of surfaces, solids and networks of curves.
Introduction to Grasshopper: Understanding the logic of visual programming and its applications in parametric design.
Parametric Design: Using Grasshopper to create complex shapes based on variables and constraints.
Practical application: Completing a complete project by combining Rhino and Grasshopper, from design to completion.
Prerequisites: No specific prerequisites are necessary for this course. However, a basic knowledge of 3D design or modeling software is a plus.
Target audience :
Architects and designers wishing to deepen their skills in 3D modeling and parametric design.
Engineers and technicians interested in design automation and the integration of digital solutions into their creative process.
Methodology: The course combines theoretical explanations with practical exercises and case studies. Question-and-answer sessions and workshops will allow participants to work on personal projects throughout the training.
Mohamed
Python (Software Engineers and Data Science): From Basics to MasteryDive into the world of Python, one of the most powerful programming languages for Data Engineers and Data scientists. With hands-on projects, real-world examples, and engaging lessons, you'll not only learn the fundamentals of Python but also gain the confidence to tackle complex programming challenges.
Fady
Project Channel and SDMS; Life of an Information System Project.Developing an SI project, from conception to implementation, is a complex process that requires the capabilities, competencies, knowledge and cooperation of all the people and groups involved.
A successful project is a project that satisfies financial users regarding fixed fees, delays and quality restrictions.
Alexandre
Programming class teacher for Bachelor, College and middle schoolEmbark on an immersive journey that will help you and clarify the material as we take a deep dive into of Java, Python, Object-Oriented Programming (OOP), Machine Learning, and Deep Learning, focusing on neural networks, Liquid State Machines (LSM), Genetic Algorithms (GA), and more.
Special rate applies for purely web/app development as a part-time full-stack developer/engineer.
Ahmed
Teaching programming to children smoothly by using the latest methods suitable for this age of children in an enjoyable wayBy using the Scratch program, you can start, little programmer, so that you can easily and smoothly understand the principles of programming and develop your own games and many practical and applied applications that will enable you to then move on to writing large programs using advanced languages and using different technologies to produce more powerful programs.
Yousra
Machine learning( Exploratory Data Analysis, Supervised & Unsupervised Machine Learning, Deep Learning and Reinforcement Learning )Machine Learning is one of the most sought-after skills in the modern world of AI applications, with hiring in this field growing at a staggering 74% annually for the last four years. This program is designed to equip you with the skills and experience needed to pursue a successful career in Machine Learning, and explore the main types of Machine Learning: Unsupervised Learning, Supervised Learning, Deep Learning, and Reinforcement Learning. You'll also delve into special topics to complement your learning.
The program comprises of 6 courses that offer a solid theoretical understanding and ample opportunities to practice the main algorithms, uses, and best practices associated with Machine Learning. You'll code your own projects using the most relevant open-source frameworks and libraries, and apply what you learn in various courses to a final project.
Whether you're already familiar with Python programming, statistics, and linear algebra, or just have a general interest in data analysis and self-learning, this intermediate series is suitable for you. We start with the basics, offer a solid theoretical foundation, code-along labs and demos, and build up to more advanced topics, making it an exciting and rewarding learning experience.
Dave
Software engineering techniques and practices using C, C++ or VB as examplesThis course is more about teaching you how to engineer and how a computer actually works than it is about the languages. All computer software engineering follows similar principles and I have 40 years of engineering things from your mobile phone to the aircraft you fly in.
Besides the software you will learn about computers - how they work, the history and background, the uses being made of them (far more than most people think). This background is not just for fun but it is to help understand the whys and whats of what we do.
You will learn about:
security - how to thwart the hackers by doing your code the right way.
security in terms of signing and encryption of data both in the computer and between computers.
safety critical systems like automotive control
data processing
strengths and weaknesses of some languages and approaches
cloud
up and coming trends such as 'codeless' programming and 'artificial intelligence'
web pages and web backends