facebook
favorite button
super instructor icon
Trusted teacher
This teacher has a fast response time and rate, demonstrating a high quality of service to their students.
member since icon
Since February 2022
Instructor since February 2022
Translated by GoogleSee original
Diploma in cyber security, specializing in digital forensics
course price icon
From 24.65 C$ /h
arrow icon
Objectives
The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to:

• Implement technical strategies, tools, and techniques to secure data and information for your organization
• Adhere to ethical security behavior to analyze and mitigate risks
• Understand security in cloud computing architecture in depth
• Understand legal requirements, privacy issues, and audit methodologies within a cloud environment
• Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework
what will you learn
1. Inactive survey conduct
Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing.

2. Take an active survey
So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement.

3. Gathering information and identifying weaknesses
Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle.

4. Application testing
There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction.

5. Digital Forensics
This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline.


6. Digital Forensics: Getting Started with File Systems
Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level.

7. Kali Linux Digital Forensics Tools: Imaging and Hash
Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful.

8. Practical coding using Python
Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career.

9. Social Engineering with Social Engineering Toolkit
The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently.

10. Penetration testing with Metasploit Framework
Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.
Location
location type icon
Online from Tunisia
About Me
Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.
Education
Computer Science Engineer, 2010
Professorship in Computer Science Applied to Disposition, 2008
2020 Full-Stack Web Development with React Specialization
2021 IBM Cybersecurity Analyst Professional Certificate
Experience / Qualifications
Operating systems, website programming, networks, computer maintenance, information security, graphic design,
Technical Support Fundamentals
The Bits and Bytes of Computer Networking
Operating Systems and You: Becoming a Power User
System Administration and IT Infrastructure Services
IT Security: Defense against the digital dark arts
Age
Children (7-12 years old)
Teenagers (13-17 years old)
Adults (18-64 years old)
Seniors (65+ years old)
Student level
Beginner
Intermediate
Advanced
Duration
60 minutes
120 minutes
The class is taught in
Arabic
English
Availability of a typical week
(GMT -05:00)
New York
at teacher icon
Online via webcam
Mon
Tue
Wed
Thu
Fri
Sat
Sun
00-04
04-08
08-12
12-16
16-20
20-24
This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities.

requirements
Networking basics basics
what will you learn
Wireshark Basic Functions
Use Wireshark's advanced features
Visualize network traffic with Wireshark
Using Wireshark on the command line
Network protocol analysis with Wireshark
Troubleshoot slow networks with Wireshark
Read more
A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters.

Required software:

-Photoshop

- Illustrator

-InDesign

program duration:

Photoshop: 6 hours

Illustrator: 6 hours

- InDesign: 6 hours
Read more
Show more
arrow icon
Similar classes
arrow icon previousarrow icon next
verified badge
Hi there!

My name is Gabriela, and I graduated with a Master of Science from Leiden University four years ago. Since then, I've been working in international organizations and recently joined the private sector; my day-to-day work is mostly focused on keeping people safe and secure by analyzing geopolitical, economic, social, legal and security developments globally.

My area of expertise is in the fields of Criminology, International Relations, International Law and Security Studies. I also provide tutoring in English for academic purposes (including IELTS prep), intensive writing and research methodologies.

I have substantial experience in writing academic research papers on a wide variety of subjects. I am here to help high school students and undergraduates develop their writing and analytical skills and become more confident in their abilities. I am also experienced in teaching English as a second language.

My purpose is to motivate and help students solve problems and come up with solutions on their own. I believe that with the right kind of preparation, no subject can be ‘too difficult’. I like seeing students going the extra mile and overcoming obstacles. My teaching method consists of giving students specific guidelines and directions so that they can engage in a learning process and become efficient problem solvers themselves. I see tutoring as the first step towards progress, but I want my students to develop the skills necessary to become successful learners on their own!

I also provide teaching support for younger students. I have experience working with children aged 7 to 14 years old.

Please feel free to contact me if you need any further information.
verified badge
The digital landscape is evolving at an unprecedented rate, and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add-on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.

This Cisco Certified Ethical Hacker course is designed to equip you with an Ethical Hacker skillset and provide a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.

After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyse, and respond to current security threats.

**** Module Covered ****
+ Module 1: Introduction to Ethical Hacking and Penetration Testing
+ Module 2: Planning and Scoping a Penetration Testing Assessment
+ Module 3: Information Gathering and Vulnerability Scanning
+ Module 4: Social Engineering Attacks
+ Module 5: Exploiting Wired and Wireless Networks
+ Module 6: Exploiting Application-Based Vulnerabilities
+ Module 7: Cloud, Mobile, and IoT Security
+ Module 8: Performing Post-Exploitation Techniques
+ Module 9: Reporting and Communication
+ Module 10: Tools and Code Analysis
+ Final Capstone Activity

** Module Exams: 10 Module Exams
** Final Course Exam: 01 Final Course Exam
** Approximately 70 hours of training.
verified badge
This course provides an overview of the concepts and fundamentals of computer networks.

Topics include an overview of network architectures and topologies, IP addressing and subnetting, congestion mechanism CSMA/CD, troubleshooting commands and methods, switching and routing devices and their related decisions, TCP/IP layers and their protocols (FTP, HTTP, SMTP, DNS, DHCP, UDP, TCP, IP, ICMP etc...), security measures and how to secure your network using Access Lists and Firewall.

The Networking course is a course where you actively learn by doing. You will learn network concepts and protocols by configuring a network, observing the actual behavior of its components and analyzing the results.

Topics include: Basic computer network components, network cabling and cable types, IP addressing and TCP/IP configuration, Peer to Peer and switch-based network, email, HTTP, DHCP and DNS servers, Intrusion attack and firewall configuration.
verified badge
I can help you with your python project works. With live coding sessions, tips, and tricks you will have a chance to improve your knowledge or complete your coding project/assignments with great insight into the code. I am working with the following libraries in my everyday work AI developer:

Numpy
Pandas
Scipy
Scikit-learn
Tensorflow / Keras
Pytorch
OpenCV
Tesseract
Pillow
Tkinter
Flask
selenium
Matplotlib and many more...
verified badge
Sometimes studying can be tough, I can help you improve your grades and enjoy your learning. As an advanced teaching practitioner I have substantial knowledge and expertise in helping students enjoy and achieve in their learning since my lessons are based around the individual needs of the student.

I’ve taught in Colleges, Secondary Schools, Universities, I’ve been head of computer science and head of higher education in a number of educational establishments. I really enjoy teaching and helping students to realise their potential.

I’m a grade 1 Outstanding teacher, and an advanced teaching practitioner. I've taught Computing/IT & Computer Science for over 25 years.
I teach GCSE, A level and Degree courses in ICT and Computer Science. My specialist subjects cover the whole curriculum subject areas for Degree, A level and GCSE.

I have experience of mentoring and coaching students from various backgrounds and nationalities. If you need help to get those grades in your GCSE or A level exams, book a lesson with me and I'll get you up to speed in the area you need help in.
verified badge
Welcome to our immersive journey into the world of cloud computing, where theory meets practice. Led by an industry professional with a Master of Science degree in IT from Carnegie Mellon University and hands-on experience as a Software Engineer at Ansys, this course is crafted to provide you with practical skills from the outset. Explore cloud service models, deployment strategies, and leading platforms like AWS, Azure, and Google Cloud through interactive labs and hands-on exercises. Dive deep into real-world scenarios as you deploy virtual machines, configure cloud storage, and optimize network settings. Whether you're a student venturing into the tech world or a professional seeking to harness the power of the cloud, this course will empower you with the tools and confidence to navigate the complexities of cloud computing. Join us and embark on a journey where learning is synonymous with doing!
verified badge
This course is intended for preparatory year university students and all majors that rely on the study of differential and integral calculus (Calculus 1 & 2), such as: engineering in all its branches, natural sciences, computer science, economics, and management, in addition to any field that requires a strong foundation in mathematics.

In this course, we will go through a step-by-step explanation of the concepts of differentiation and integration, starting with limits, derivatives, and their rules, then moving on to practical applications of differentiation, such as maximum rates of change and solving physical and engineering problems. Finally, we will discuss definite and indefinite integration and its various methods of calculation, with practical applications for areas, volumes, and solving equations.

The lessons are designed in a simple and streamlined style that helps students understand complex concepts easily, with a focus on practical training through solving exercises and questions similar to those found on university exams. Detailed explanations of common mistakes and practical tips are also provided for confidently passing Calculus and achieving outstanding results.

This course is not limited to simply solving problems, but rather aims to build a solid mathematical foundation that will enable the student to pursue his other university courses more easily.
verified badge
This course offers a comprehensive and interactive introduction to Communication Systems, covering the essential concepts behind how information is transmitted, received, and processed across various communication channels. The course adapts to the student’s level (beginner, intermediate, or advanced) and provides a solid foundation in both analog and digital communication.

Students will learn the theoretical principles that govern modern communication systems and reinforce learning through practical examples and optional hands-on simulations using MATLAB or Python. Real applications related to wireless networks, mobile communications, satellite links, IoT, and modern digital communication can be integrated depending on the student’s interests.
verified badge
C is one of the most important programming languages in computer science. It builds the foundation for understanding how software really works—memory, logic, and efficient problem-solving.
This course is designed as a practical and beginner-friendly introduction to C programming and the core concepts of algorithms and data structures.

You will learn how to write clean C programs, understand how data is stored and manipulated, and apply essential algorithms used in real applications.
We will work through examples, exercises, and small projects to help you build solid problem-solving skills.

By the end of this course, you will be able to:

Write and understand C programs

Work with variables, loops, conditions, functions, and memory

Use essential data structures (arrays, linked lists, stacks, queues...)

Understand key algorithms (sorting, searching, recursion...)

Approach problems step-by-step like a real programmer

This course is ideal for beginners, students, or anyone who wants a strong foundation in programming and computer science.
verified badge
Give your child a head start in the future by introducing them to Artificial Intelligence in a way that’s fun, simple, and safe.

In this hands-on class, children learn how AI works and how to use tools like ChatGPT to learn faster, think creatively, and solve problems—all through interactive activities, games, and real-life examples designed just for kids.
No technical background needed. Just curiosity and imagination!

🚀 What Your Child Will Learn

✔ What AI is (explained simply) and how it’s used in everyday life
✔ How to talk to AI properly and ask smart questions (prompt skills for kids)
✔ AI for school:
- Understanding lessons better
- Getting help with homework (the right way!)
- Creating summaries and explanations in kid-friendly language

✔ AI for creativity & fun:
- Writing stories, poems, and comics
- Creating images with AI
- Brainstorming ideas for projects and presentations

✔ AI for organization & confidence:
- Planning homework and study time
- Improving writing and communication skills
- Learning how to explain ideas clearly

✔ Safe & responsible AI use:
- Understanding what AI can and can’t do
- Using AI ethically and safely
- Building digital responsibility from an early age

👨‍👩‍👧‍👦 Who This Class Is For
- Children ages 8–14
- Curious kids who love learning and technology
- Students who want extra support with schoolwork
- Creative kids who enjoy writing, drawing, and problem-solving
- No experience required

💡 Why Parents Love This Class
✔ Designed specifically for children
✔ Focuses on learning, creativity, and critical thinking — not shortcuts
✔ Encourages independent thinking, not copying
✔ Builds future-ready skills in a positive and age-appropriate way
✔ Hands-on, engaging, and easy to follow

This is not a boring tech lecture.
Children learn by doing, exploring, and creating—with guidance every step of the way.

🎓 By the End of the Class
- Your child will:
- Feel confident using AI as a learning helper
- Understand how to use technology smartly and responsibly
- Improve school skills, creativity, and organization
- Be excited about learning and the future of technology

👉 A perfect introduction to AI for young minds—turning curiosity into confidence.
verified badge
Personalized support for students, freelancers and entrepreneurs wishing to succeed in their IT projects.

Help with:

Project structuring

Technology choices

Specifications

Code correction and improvement

University projects (final year projects, final year projects, dissertations)

Finalization and delivery of the project
verified badge
I solve any problem related to IT systems, networks, and cybersecurity. I offer online classes. I resolve any issue remotely. Classes are available for vocational students, engineering students, general IT support, and anyone who wants to learn for any reason!
verified badge
This class covers the fundamental principles of digital logic design typically taught in undergraduate computer engineering and computer science programs.

Topics include Boolean algebra, logic gates, truth tables, combinational and sequential circuits, minimization techniques, and an introduction to timing and state machines.

The class is suitable for undergraduate students at any stage and can be adapted to match specific course syllabi, assignments, or exam preparation needs. Students may request special topics or focus areas depending on their goals.
verified badge
My classes are geared towards teenagers, young adults, and adults who want to learn programming from scratch. I explain the fundamentals with practical examples and simple projects, adapting the pace to each student. The goal is for you to acquire a solid and understandable foundation to confidently advance in the world of software.
verified badge
Technology is everywhere, and understanding how it works and how to protect it can open doors to exciting opportunities. I’ve designed this course as a hands-on journey into networking, programming, and cybersecurity, where you don’t just learn theory, you practice real skills that matter in the digital world.

In this course, I’ll guide you through building and analyzing networks, writing programs with Python and other languages, and exploring how systems communicate and interact. You’ll dive into cybersecurity fundamentals, learn to identify vulnerabilities, understand how attacks happen, and practice defending systems like a pro.

Through interactive exercises, practical examples, and real-world scenarios, I’ll show you how hackers think, how organizations respond to threats, and how to secure systems effectively.

By the end of the course, you’ll have the confidence, knowledge, and hands-on experience to tackle networking, programming, and security challenges and apply these skills in your studies, career, or personal projects.
message icon
Contact امين
repeat students icon
1st lesson is backed
by our
Good-fit Instructor Guarantee
Similar classes
arrow icon previousarrow icon next
verified badge
Hi there!

My name is Gabriela, and I graduated with a Master of Science from Leiden University four years ago. Since then, I've been working in international organizations and recently joined the private sector; my day-to-day work is mostly focused on keeping people safe and secure by analyzing geopolitical, economic, social, legal and security developments globally.

My area of expertise is in the fields of Criminology, International Relations, International Law and Security Studies. I also provide tutoring in English for academic purposes (including IELTS prep), intensive writing and research methodologies.

I have substantial experience in writing academic research papers on a wide variety of subjects. I am here to help high school students and undergraduates develop their writing and analytical skills and become more confident in their abilities. I am also experienced in teaching English as a second language.

My purpose is to motivate and help students solve problems and come up with solutions on their own. I believe that with the right kind of preparation, no subject can be ‘too difficult’. I like seeing students going the extra mile and overcoming obstacles. My teaching method consists of giving students specific guidelines and directions so that they can engage in a learning process and become efficient problem solvers themselves. I see tutoring as the first step towards progress, but I want my students to develop the skills necessary to become successful learners on their own!

I also provide teaching support for younger students. I have experience working with children aged 7 to 14 years old.

Please feel free to contact me if you need any further information.
verified badge
The digital landscape is evolving at an unprecedented rate, and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add-on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.

This Cisco Certified Ethical Hacker course is designed to equip you with an Ethical Hacker skillset and provide a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.

After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyse, and respond to current security threats.

**** Module Covered ****
+ Module 1: Introduction to Ethical Hacking and Penetration Testing
+ Module 2: Planning and Scoping a Penetration Testing Assessment
+ Module 3: Information Gathering and Vulnerability Scanning
+ Module 4: Social Engineering Attacks
+ Module 5: Exploiting Wired and Wireless Networks
+ Module 6: Exploiting Application-Based Vulnerabilities
+ Module 7: Cloud, Mobile, and IoT Security
+ Module 8: Performing Post-Exploitation Techniques
+ Module 9: Reporting and Communication
+ Module 10: Tools and Code Analysis
+ Final Capstone Activity

** Module Exams: 10 Module Exams
** Final Course Exam: 01 Final Course Exam
** Approximately 70 hours of training.
verified badge
This course provides an overview of the concepts and fundamentals of computer networks.

Topics include an overview of network architectures and topologies, IP addressing and subnetting, congestion mechanism CSMA/CD, troubleshooting commands and methods, switching and routing devices and their related decisions, TCP/IP layers and their protocols (FTP, HTTP, SMTP, DNS, DHCP, UDP, TCP, IP, ICMP etc...), security measures and how to secure your network using Access Lists and Firewall.

The Networking course is a course where you actively learn by doing. You will learn network concepts and protocols by configuring a network, observing the actual behavior of its components and analyzing the results.

Topics include: Basic computer network components, network cabling and cable types, IP addressing and TCP/IP configuration, Peer to Peer and switch-based network, email, HTTP, DHCP and DNS servers, Intrusion attack and firewall configuration.
verified badge
I can help you with your python project works. With live coding sessions, tips, and tricks you will have a chance to improve your knowledge or complete your coding project/assignments with great insight into the code. I am working with the following libraries in my everyday work AI developer:

Numpy
Pandas
Scipy
Scikit-learn
Tensorflow / Keras
Pytorch
OpenCV
Tesseract
Pillow
Tkinter
Flask
selenium
Matplotlib and many more...
verified badge
Sometimes studying can be tough, I can help you improve your grades and enjoy your learning. As an advanced teaching practitioner I have substantial knowledge and expertise in helping students enjoy and achieve in their learning since my lessons are based around the individual needs of the student.

I’ve taught in Colleges, Secondary Schools, Universities, I’ve been head of computer science and head of higher education in a number of educational establishments. I really enjoy teaching and helping students to realise their potential.

I’m a grade 1 Outstanding teacher, and an advanced teaching practitioner. I've taught Computing/IT & Computer Science for over 25 years.
I teach GCSE, A level and Degree courses in ICT and Computer Science. My specialist subjects cover the whole curriculum subject areas for Degree, A level and GCSE.

I have experience of mentoring and coaching students from various backgrounds and nationalities. If you need help to get those grades in your GCSE or A level exams, book a lesson with me and I'll get you up to speed in the area you need help in.
verified badge
Welcome to our immersive journey into the world of cloud computing, where theory meets practice. Led by an industry professional with a Master of Science degree in IT from Carnegie Mellon University and hands-on experience as a Software Engineer at Ansys, this course is crafted to provide you with practical skills from the outset. Explore cloud service models, deployment strategies, and leading platforms like AWS, Azure, and Google Cloud through interactive labs and hands-on exercises. Dive deep into real-world scenarios as you deploy virtual machines, configure cloud storage, and optimize network settings. Whether you're a student venturing into the tech world or a professional seeking to harness the power of the cloud, this course will empower you with the tools and confidence to navigate the complexities of cloud computing. Join us and embark on a journey where learning is synonymous with doing!
verified badge
This course is intended for preparatory year university students and all majors that rely on the study of differential and integral calculus (Calculus 1 & 2), such as: engineering in all its branches, natural sciences, computer science, economics, and management, in addition to any field that requires a strong foundation in mathematics.

In this course, we will go through a step-by-step explanation of the concepts of differentiation and integration, starting with limits, derivatives, and their rules, then moving on to practical applications of differentiation, such as maximum rates of change and solving physical and engineering problems. Finally, we will discuss definite and indefinite integration and its various methods of calculation, with practical applications for areas, volumes, and solving equations.

The lessons are designed in a simple and streamlined style that helps students understand complex concepts easily, with a focus on practical training through solving exercises and questions similar to those found on university exams. Detailed explanations of common mistakes and practical tips are also provided for confidently passing Calculus and achieving outstanding results.

This course is not limited to simply solving problems, but rather aims to build a solid mathematical foundation that will enable the student to pursue his other university courses more easily.
verified badge
This course offers a comprehensive and interactive introduction to Communication Systems, covering the essential concepts behind how information is transmitted, received, and processed across various communication channels. The course adapts to the student’s level (beginner, intermediate, or advanced) and provides a solid foundation in both analog and digital communication.

Students will learn the theoretical principles that govern modern communication systems and reinforce learning through practical examples and optional hands-on simulations using MATLAB or Python. Real applications related to wireless networks, mobile communications, satellite links, IoT, and modern digital communication can be integrated depending on the student’s interests.
verified badge
C is one of the most important programming languages in computer science. It builds the foundation for understanding how software really works—memory, logic, and efficient problem-solving.
This course is designed as a practical and beginner-friendly introduction to C programming and the core concepts of algorithms and data structures.

You will learn how to write clean C programs, understand how data is stored and manipulated, and apply essential algorithms used in real applications.
We will work through examples, exercises, and small projects to help you build solid problem-solving skills.

By the end of this course, you will be able to:

Write and understand C programs

Work with variables, loops, conditions, functions, and memory

Use essential data structures (arrays, linked lists, stacks, queues...)

Understand key algorithms (sorting, searching, recursion...)

Approach problems step-by-step like a real programmer

This course is ideal for beginners, students, or anyone who wants a strong foundation in programming and computer science.
verified badge
Give your child a head start in the future by introducing them to Artificial Intelligence in a way that’s fun, simple, and safe.

In this hands-on class, children learn how AI works and how to use tools like ChatGPT to learn faster, think creatively, and solve problems—all through interactive activities, games, and real-life examples designed just for kids.
No technical background needed. Just curiosity and imagination!

🚀 What Your Child Will Learn

✔ What AI is (explained simply) and how it’s used in everyday life
✔ How to talk to AI properly and ask smart questions (prompt skills for kids)
✔ AI for school:
- Understanding lessons better
- Getting help with homework (the right way!)
- Creating summaries and explanations in kid-friendly language

✔ AI for creativity & fun:
- Writing stories, poems, and comics
- Creating images with AI
- Brainstorming ideas for projects and presentations

✔ AI for organization & confidence:
- Planning homework and study time
- Improving writing and communication skills
- Learning how to explain ideas clearly

✔ Safe & responsible AI use:
- Understanding what AI can and can’t do
- Using AI ethically and safely
- Building digital responsibility from an early age

👨‍👩‍👧‍👦 Who This Class Is For
- Children ages 8–14
- Curious kids who love learning and technology
- Students who want extra support with schoolwork
- Creative kids who enjoy writing, drawing, and problem-solving
- No experience required

💡 Why Parents Love This Class
✔ Designed specifically for children
✔ Focuses on learning, creativity, and critical thinking — not shortcuts
✔ Encourages independent thinking, not copying
✔ Builds future-ready skills in a positive and age-appropriate way
✔ Hands-on, engaging, and easy to follow

This is not a boring tech lecture.
Children learn by doing, exploring, and creating—with guidance every step of the way.

🎓 By the End of the Class
- Your child will:
- Feel confident using AI as a learning helper
- Understand how to use technology smartly and responsibly
- Improve school skills, creativity, and organization
- Be excited about learning and the future of technology

👉 A perfect introduction to AI for young minds—turning curiosity into confidence.
verified badge
Personalized support for students, freelancers and entrepreneurs wishing to succeed in their IT projects.

Help with:

Project structuring

Technology choices

Specifications

Code correction and improvement

University projects (final year projects, final year projects, dissertations)

Finalization and delivery of the project
verified badge
I solve any problem related to IT systems, networks, and cybersecurity. I offer online classes. I resolve any issue remotely. Classes are available for vocational students, engineering students, general IT support, and anyone who wants to learn for any reason!
verified badge
This class covers the fundamental principles of digital logic design typically taught in undergraduate computer engineering and computer science programs.

Topics include Boolean algebra, logic gates, truth tables, combinational and sequential circuits, minimization techniques, and an introduction to timing and state machines.

The class is suitable for undergraduate students at any stage and can be adapted to match specific course syllabi, assignments, or exam preparation needs. Students may request special topics or focus areas depending on their goals.
verified badge
My classes are geared towards teenagers, young adults, and adults who want to learn programming from scratch. I explain the fundamentals with practical examples and simple projects, adapting the pace to each student. The goal is for you to acquire a solid and understandable foundation to confidently advance in the world of software.
verified badge
Technology is everywhere, and understanding how it works and how to protect it can open doors to exciting opportunities. I’ve designed this course as a hands-on journey into networking, programming, and cybersecurity, where you don’t just learn theory, you practice real skills that matter in the digital world.

In this course, I’ll guide you through building and analyzing networks, writing programs with Python and other languages, and exploring how systems communicate and interact. You’ll dive into cybersecurity fundamentals, learn to identify vulnerabilities, understand how attacks happen, and practice defending systems like a pro.

Through interactive exercises, practical examples, and real-world scenarios, I’ll show you how hackers think, how organizations respond to threats, and how to secure systems effectively.

By the end of the course, you’ll have the confidence, knowledge, and hands-on experience to tackle networking, programming, and security challenges and apply these skills in your studies, career, or personal projects.
Good-fit Instructor Guarantee
favorite button
message icon
Contact امين