from29.90CAD/ h
Computer Sciences for college students database specialist
Relational Databases: Relational databases organize data into tables consisting of rows and columns, with each row representing a record and each column representing an attribute. They use structured query language (SQL) for querying and manipulating data. Examples include MySQL, PostgreSQL, Oracle, SQL Server, and SQLite.
Information systems are critical assets for organizations in today's digital age, enabling them to leverage data and technology to achieve their strategic objectives, gain competitive advantage, and drive innovation and growth.
Information systems are critical assets for organizations in today's digital age, enabling them to leverage data and technology to achieve their strategic objectives, gain competitive advantage, and drive innovation and growth.
Extra information
N/ALocation
At student's location: Around Muscat, Oman












|
Use ctrl + wheel to zoom!
General info
Age: | Teenagers (13-17 years old) Adults (18-64 years old) Seniors (65+ years old) |
---|---|
Student level: | Beginner Intermediate Advanced |
Duration: | 60 minutes |
The class is taught in: | Arabic, English |
Ask a question
Send a message explaining your needs and Dalia will reply soon:
The more detail, the better.
Ex. "Hi, when are you available to meet for a lesson?"
Ex. "Hi, when are you available to meet for a lesson?"
Availability of a typical week
(GMT -05:00) Chicago
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | Monday at 1:00 | Tuesday at 1:00 | Wednesday at 1:00 | Saturday at 1:00 | Sunday at 1:00 | ||
2 | Monday at 2:00 | Tuesday at 2:00 | Wednesday at 2:00 | Saturday at 2:00 | Sunday at 2:00 | ||
3 | Monday at 3:00 | Tuesday at 3:00 | Wednesday at 3:00 | Saturday at 3:00 | Sunday at 3:00 | ||
4 | Monday at 4:00 | Tuesday at 4:00 | Wednesday at 4:00 | Saturday at 4:00 | Sunday at 4:00 | ||
5 | Monday at 5:00 | Tuesday at 5:00 | Wednesday at 5:00 | Saturday at 5:00 | Sunday at 5:00 | ||
6 | Monday at 6:00 | Tuesday at 6:00 | Wednesday at 6:00 | Saturday at 6:00 | Sunday at 6:00 | ||
7 | Monday at 7:00 | Tuesday at 7:00 | Wednesday at 7:00 | Saturday at 7:00 | Sunday at 7:00 | ||
8 | Monday at 8:00 | Tuesday at 8:00 | Wednesday at 8:00 | Saturday at 8:00 | Sunday at 8:00 | ||
9 | Monday at 9:00 | Tuesday at 9:00 | Wednesday at 9:00 | Saturday at 9:00 | Sunday at 9:00 | ||
10 | Monday at 10:00 | Tuesday at 10:00 | Wednesday at 10:00 | Saturday at 10:00 | Sunday at 10:00 | ||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from C$29.90At student's home
100% Satisfaction Guarantee
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Online reputation
- Instructor since March 2024
- Google connected
Availability of a typical week
(GMT -05:00) Chicago
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | Monday at 1:00 | Tuesday at 1:00 | Wednesday at 1:00 | Saturday at 1:00 | Sunday at 1:00 | ||
2 | Monday at 2:00 | Tuesday at 2:00 | Wednesday at 2:00 | Saturday at 2:00 | Sunday at 2:00 | ||
3 | Monday at 3:00 | Tuesday at 3:00 | Wednesday at 3:00 | Saturday at 3:00 | Sunday at 3:00 | ||
4 | Monday at 4:00 | Tuesday at 4:00 | Wednesday at 4:00 | Saturday at 4:00 | Sunday at 4:00 | ||
5 | Monday at 5:00 | Tuesday at 5:00 | Wednesday at 5:00 | Saturday at 5:00 | Sunday at 5:00 | ||
6 | Monday at 6:00 | Tuesday at 6:00 | Wednesday at 6:00 | Saturday at 6:00 | Sunday at 6:00 | ||
7 | Monday at 7:00 | Tuesday at 7:00 | Wednesday at 7:00 | Saturday at 7:00 | Sunday at 7:00 | ||
8 | Monday at 8:00 | Tuesday at 8:00 | Wednesday at 8:00 | Saturday at 8:00 | Sunday at 8:00 | ||
9 | Monday at 9:00 | Tuesday at 9:00 | Wednesday at 9:00 | Saturday at 9:00 | Sunday at 9:00 | ||
10 | Monday at 10:00 | Tuesday at 10:00 | Wednesday at 10:00 | Saturday at 10:00 | Sunday at 10:00 | ||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from C$29.90At student's home
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Share
You are here
Similar classes
Karim
Cours en réseaux, sécurité des systèmes et architecture systèmeAre you ready to step into the world of Application Security? This course is perfect for beginners and intermediates looking to understand how to protect modern applications from security threats. Whether you’re a developer, aspiring ethical hacker, or tech enthusiast, this course will guide you through the essential principles and practices of securing web and mobile applications.
In this course, you’ll explore common vulnerabilities like SQL injection and Cross-Site Scripting (XSS) and learn how to defend against them using real-world techniques. We’ll dive into secure coding practices, threat modeling, and the basics of ethical hacking to equip you with the skills to analyze, identify, and fix security issues effectively.
By the end of the course, you’ll have a solid foundation in application security, gaining the confidence to think like a security expert and proactively protect your applications. Join us on this journey to start mastering the art of securing digital spaces!
Gergely
Data Recovery Help & File Format Reverse EngineeringYou found an old file—something important, maybe even sentimental—but your computer just won’t open it. Or maybe you’re dealing with a custom software system that uses a weird, proprietary format. What now?
I specialize in rescuing, translating, and reverse-engineering data formats that most people don’t even recognize. Whether it’s a corrupted calendar file from a PDA or a bizarre export from a dead program, I approach it like a digital archaeologist.
It’s not magic—it’s patience, logic, and deep technical skill. If something should work but doesn’t, let me figure out why.
Miriam
Cours de Comptabilité & Gestion & Cost accounting , Économie (Micro & Macro) et Informatique (IT): 1er cours gratuitPassionate bachelor student offering expert tutoring in accounting, economics, and IT on Apprentus.com. Unlock the complexities of these subjects with my advanced knowledge, tailored to help you succeed. Elevate your understanding and excel in your coursework with personalized guidance from a dedicated and knowledgeable tutor. Book a session now to embark on a journey of academic excellence!
The initial 45-minute session comes at no charge!
Anas
SAP Introduction Training (hands-on training) / Remote training_*IMPORTANT*_
It will depend on how fast you learn, but you should allow at least 3 hours for a quick start.
Here is the proposed program:
I) What is SAP?
* Introduction to SAP (ECC)
* The main functions of SAP
* SAP architecture
* Structure and organizational data
* Overview of SAP functional modules (FI, SD, MM, PP etc.)
II) SAP : Getting Started
* Navigating the SAP system
* Logging in and out
* Presentation of the home screen
* Organization of SAP screen (fields, tabs, tables...)
* Use of the data search functions
* How to navigate in SAP
* Transaction system
* Examples of flows
David
Training and assistance in IT and use of personal computersUsing a computer and these applications can be complicated for some and I therefore offer training to those who need it.
This training includes basic and advanced use of Windows computers and/or Mac OS (Apple) multiple applications such as the MS-Office suite (Word, Powerpoint, Excel etc.), Teams, Outlook etc...
Being a graduate with more than 20 years of experience at different levels in the field, it is possible to approach different levels of complexity from beginner to expert in Microsoft/Windows and/or Apple/MacOS/IOS environments.
Do not hesitate to contact me and I will be happy to answer your questions.
David
Sameh
Information and Communication Technology (ICT): computer hardware and software, digital communication tools, internet technologies, data manThis course introduces students to the fundamentals of Information and Communication Technology (ICT) and its role in modern society. Topics include computer hardware and software, digital communication tools, internet technologies, data management, cybersecurity, and emerging trends. Students will gain practical skills in using productivity software, conducting online research, and understanding the ethical and responsible use of digital resources. The course emphasizes both technical proficiency and digital literacy, preparing learners to confidently navigate and contribute to a technology-driven world.
Sameh
Information Technology, Data Centers: From Design phase till Operations and OptimizationThis course provides a foundational understanding of Information Technology, data centers, covering architecture, power & cooling, networking, storage, virtualization, security and lots more. Learn best practices for efficiency, scalability, and reliability while exploring emerging data center solutions. Ideal for IT professionals, engineers, and facility managers involved in data center deployment or management.
This course offers a comprehensive exploration of Information Technology, data center infrastructure, guiding students through the entire lifecycle—from initial design and planning to day-to-day operations and long-term performance optimization. Students will learn the critical components of data center design, including site selection, power and cooling systems, space planning, networking, and physical security. The course also covers operational best practices, monitoring tools, energy efficiency strategies, disaster recovery planning, and emerging trends. By integrating technical, environmental, and management perspectives, students will gain the knowledge and skills required to build and maintain high-performance, cost-effective, and sustainable data center environments.
Dr Zeeshan
Ethical Hacking and Penetration Testing in 4 WeeksObjective: Equip students with foundational skills in ethical hacking and penetration testing to secure web applications, focusing on open-source tools and DVWA (Damn Vulnerable Web Application).
(Capstone Project: Website Penetration Testing Report)
Throughout the weeks, students will work on a capstone project where they will perform a comprehensive penetration test on a simulated website using DVWA. They will document their findings, create detailed reports, and suggest mitigation strategies. This project will be their portfolio piece to showcase their skills.
1. Week 1: Introduction to Information Security
- Topics covered: Cybersecurity Fundamentals, Introduction to Ethical Hacking, Basic Network Security, Introduction to Cryptography, Practical Cybersecurity Tips
2. Week 2: Introduction to Ethical Hacking
- Topics covered: Orientation and Course Overview, Setting Up a Virtual Lab, Key Tools and Software, Network Security Basics, Identifying Common Vulnerabilities, Exploring common network vulnerabilities, Hands-on practice with vulnerability scanning using OpenVAS.
3. Week 3: Website Penetration Testing Fundamentals with DVWA
- Topics covered: Website Architecture, Overview of how websites function, Introduction to client-server model and HTTP/HTTPS, Setting Up DVWA, Installing and configuring DVWA, Understanding the purpose and use of DVWA in penetration testing, SQL Injection with DVWA, Understanding SQL injection attacks, Practicing SQL injection techniques and defences using DVWA, Cross-Site Scripting (XSS) with DVWA, Understanding XSS attacks, Practising XSS techniques and defences using DVWA, Hands-on OWASP Top 10 with DVWA, Detailed exploration of the OWASP Top 10 vulnerabilities, Practical exercises to identify and exploit vulnerabilities using DVWA
4. Week 4: Advanced Penetration Testing Techniques
- Topics covered: Advanced Exploitation Techniques, Techniques for privilege escalation, Using Metasploit for advanced exploitation, Social Engineering Attack, Understanding social engineering, Practical examples of phishing and other attacks, Reporting and Documenting Findings, Importance of documentation in penetration testing, How to create detailed and professional reports, Ethical Considerations and Legal Aspects, Understanding the ethics of hacking, Legal implications and compliance, Project Presentation and Feedback, Students present their penetration testing report, Personalized feedback and improvement tips. ---
At the end of the 4 weeks,
• Students will have beginner-to-advanced knowledge about ethical hacking and penetration testing using open-source tools and DVWA.
• Students will have enhanced professional writing skills, and technical documentation skills along with research skills.
• Students will have a capstone project which will serve as a significant portfolio piece, demonstrating their practical skills and readiness for the cybersecurity job market
Issamo
FORTINET NSE6 fortiweb web application firewall administrationFortiweb and the FORTINET web application firewall which protects your application against sql injection attacks, cross site script, ...
During this course, we will learn the configuration of fortiweb to protect WEB servers either with http or https
Cristian
Data Analysis and Visualization Classes with Power BI*Query Editor: Connecting our data to Power BI, cleaning and transforming our data, Exploring the different data sources in Power BI.
*Connections to data sources, Transformations with Power Query, Data Modeling and Visual Objects
*Data Modeling, Cross Filter Detail and Hierarchies - tooltips in visuals, Types of visuals and their properties.
*Visuals, Report Details, Tool Information
*DAX Functions - Measurements, Calculated Columns
*Folder Read, Combine queries with double column, Additional DAX functions
*Scatter Plot, Choropleth Map, Main Menu, Insert Buttons
*Visualization (Indicator Meter), Measurement Summary (Minimum, Maximum, Median, Average), Mobile Design, Import Visual Object
*Power BI Service Licenses License Comparison, Dashboard Publishing
*Connection, Power Query, Transformation, Calculated Fields, Measures, Visualizations, Bookmarks
Dr. Saeed
Calculus calculus for students of the faculties of computers and information and faculties of artificial intelligenceExplain the lessons of finite and infinite calculus with applications on calculus
Explanation of Diff & Integral.
Applications on calculus.
Are and volume calculations for solids boundaries by curves
In an easy and simplified way, with the solution of the examples mentioned in the previous exams and Assignments & Quizzes
Casper
Computer science, Internet security and computer skillsAnswer to the many questions related to information technology.
Want to know how something works, or how you can prevent something.
You have come to the right place, I can teach you in all areas of information technology.
Below you see several questions to which I can give you a clear and straightforward answer. I can explain this to you at any level and we can go deep where you want it. Is your question not listed? Let me know. There are simply too many questions to write here.
How does the internet work?
How does a computer network work?
What is a DHCP server and how does DNS work?
How do I keep my identity hidden online?
What are cookies?
What does my computer store?
How does the Wehkamp site know that I like those pants?
How does Excel work? and Word? and Powerpoint?
What is a router?
How does WiFi work and can my neighbor on my network?
Do I have a strong password?
What is hacking?
How does a computer virus and ransomware work?
How does a firewall work?
What is blockchain?
I teach at different levels, if you are interested you can always send an email without obligation with your question. We can then make a personal study plan.
My specialization is internet security, but I got there by gaining knowledge within all facets of information technology. From system administration, network management and explaining the various functions in Windows or IOS to repairing the hardware of a PC.
I studied business informatics at the Hogeschool van Amsterdam. Nowadays I live on Curacao, but I can give great lessons via webcam. And through the possible use of team viewer or G + I can show on your computer how to configure a router, for example. Nothing is impossible ;-)
Zakaria
I am an associate professor in mathematics and computer scienceI put my services at your disposal to train you from A to Z in the areas of IT development and programming languages.
In development :
-Python
-Artificial intelligence
-Machine Learning
-C and C++
- Web development
-JAVA
- ...
Create your business applications from A to Z
Professeur
Programming courses for beginners: Introducing young people to the fundamentals of programmingCourse description:
Title: Programming course for beginners
Duration: 8 weeks (16 sessions of 2 hours each)
Description:
This programming course for beginners is designed for average students who want to learn the solid foundation of programming. Whether you are interested in Python, JavaScript, HTML, CSS or PHP, this course will provide you with the essential knowledge to create your own programs and applications.
Through clear explanations, real-world examples and practical exercises, you will develop your understanding of key programming concepts and be able to apply this knowledge in real-world projects.
Lesson Plan :
Week 1-2: Introduction to programming and fundamental concepts
- Presentation of programming languages (Python, JavaScript, HTML, CSS, PHP)
- Understand variables, data types and basic operations
- Introduction to control structures (loops, conditions)
- The functions and organization of the code
Week 3-4: Object Oriented Programming
- Understand the basic concepts of object-oriented programming
- Creation of classes and objects
- Using attributes and methods
Week 5-6: Web development
- Introduction to HTML and CSS
- Creation of static web pages
- Using JavaScript to interact with page elements
Week 7-8: Applications and projects
- Using Python, JavaScript, HTML, CSS or PHP to create simple programs and applications
- Creation of a final project to put into practice all the skills acquired
Each session will include a theoretical part followed by practical exercises to consolidate the concepts covered. You will also be encouraged to ask questions and work on personal projects to reinforce your learning.
Join this exciting course and develop your programming skills, you'll be ready to create your own programs and applications in no time!
Hafizou
Certification Audit of Information Systems CISA (Certified Information System Auditor)The main goal of this training is to prepare you in the best possible conditions to successfully pass the CISA certification.
It will give you the skills to lead and control corporate IT and perform an effective security audit on any organization. You gain expertise in the acquisition, development, testing and implementation of information systems and you will learn the guidelines, standards and best practices to protect them.