Empower Yourself with Cutting-Edge Tech Courses: Master Practical Skills to Boost Your Peformance and Impress Clients and Future Employers!
Real Time Embedded Linux
Course NameEveningMorningDuration
C For Embedded Call US Call US90
Arm - Embedded systemsCall US Call US90
R.T ConceptsCall US Call US40
Embedded LinuxCall US Call US90
Linux Kernel and Device DriversCall US Call US90
FreeRTOSCall US Call US90
Yocto Call US Call US20
MPSoCCall US Call US90
PetalinuxCall US Call US40
Full Stack
Course NameEveningMorningDuration
Java FundementalsCall US Call US60
HTML5Call US Call US20
CSS3 Call US Call US20
Javascript Call US Call US75
MongoDBCall US Call US30
NodeJSCall US Call US60
TypescriptCall US Call US10
ReactJSCall US Call US60
Web FoundationsCall US Call US10
BootstrapCall US Call US20
Machine Learning
Course NameEveningMorningDuration
C Plus PlusCall US Call US90
ML FundamentalsCall US Call US25
Machine Learning with PythonCall US Call US50
Scientific PythonCall US Call US30
Deep Learning with TensorflowCall US Call US50
CUDA10/04 Call US35
Open CVCall US Call US40
General Data VisualizationCall US Call US20
Data Visualization with TableauCall US Call US20
A/B TestingCall US Call US20
Data Analysis with ExcelCall US Call US20
Data Analysis with Power BICall US Call US20
Cyber
Course NameEveningMorningDuration
NetworkingCall US Call US40
Linux AdministrationCall US Call US50
Bash ScriptingCall US Call US25
Python ProgrammingCall US Call US90
Git10/07 Call US25
Cyber Security NetworkingCall US Call US20
Cyber Attack InfrastructureCall US Call US50
SIEM-SOCCall US Call US50
Malware AnalysisCall US Call US40
Forensics Investigation & Incident ResponseCall US Call US50
Penetrating Testing for Web ApplicationCall US Call US50
Cyber Security in Web ServersCall US Call US30
Cyber Networking InfrastructureCall US Call US60
Cyber Security in IOTCall US Call US25
Cyber Security in Cloud CompCall US Call US25
Identifying Cyber Security ThreatsCall US Call US30
Incident Response and AccountabilityCall US Call US20
Information Security GovernanceCall US Call US25
CISO Roles & ResponsibilitiesCall US Call US40
Devops
Course NameEveningMorningDuration
Computer ArchitectureCall US Call US20
SQL11/18 Call US30
JenkinsCall US Call US30
Terraform11/01 Call US20
Monitoring (Prometheus/Zabbix) 11/12 Call US25
DockerCall US Call US30
AnsibleCall US Call US25
KubernetesCall US Call US30
AWS09/24 Call US35
Monitoring ToolsCall US Call US20
AZURECall US Call US20
GRAFANA12/17 Call US15
HELMCall US Call US10
QA
Course NameEveningMorningDuration
QA MethodologiesCall US Call US40
JiraCall US Call US20
SeleniumCall US Call US30
Courses for Organizations
Course NameEveningMorningDuration
AngularCall US Call US50
Big DataCall US Call US40
Linux Lpi - 102Call US Call US45
Linux FundamentalsCall US Call US75
C++ ASTCall US Call US45
OpenCLCall US Call US90
OpenGLCall US Call US90
Reverse EngineeringCall US Call US90
Assembly for Cyber SecurityCall US Call US90
All rights reserved Embedded Academy ©