#CM-42
Product Design (UX) - Product Design (UI)
Our comprehensive UX Design class is tailored for aspiring designers and professionals alike, offering hands-on learning and practical insights to master the art of crafting seamless and intuitive user experiences. Whether you're new to UX or seeking...Learn More
#CM-113
Biology - Supporting tissues and systems
We offer detailed explanation about the forms and functions of various organs and systems in the body of living organisms.
#CM-103
Cyber Security - Cybersecurity weekday
This course helps you make an entryinto the world of Cybersecurity with a focus on Ethical Hacking and Countermeasures. You get to use tools and labs to understand the Tactics, Techniques and Procedures of attackers.
#CM-120
Digital Marketing - Introduction To Digital Marketing (3weeks)
Unlock the power of online marketing with our Digital Marketing Essentials course. This comprehensive program covers key strategies in SEO, social media, email marketing, and content creation, Gain hands-on experience with real-world tools and techni...Learn More
#CM-281
Data Science and Machine Learning with python - Data Science with Python Programming
This course trains you to be a data scientist with python programming
#CM-212
Web Design HTML,CSS, Bootstrap and Javascript - Web Development(HTML, CSS, Bootstrap, and JavaScript) for 10weeks
In this course, I will train you on the design and development of a beautiful, responsive and functional website. We will cover extensively HTML, CSS, Bootstrap, and JavaScript. I will be using easy-to-understand approach, methodologies and analogies...Learn More
#CM-43
Product Management - Product Mangement class
Learn Product Mangement
#CM-90
Data Analytics with Python - data analytics with python weekend 001
This course provides a foundational introduction to data analysis using Python. you'll gain hands-on experience with essential tools and techniques for data manipulation, visualization, and basic analysis.
#CM-117
Hacking Methodology - Introduction to hacking methodology
This is about the methodology used by attackers to breach information systems. You will learn the different steps they employ to carry out malicious attacks and breaches against information assets and systems.
#CM-190
ICT/Computer Studies - ICT/Computer Studies
Unlock your potential with our comprehensive ICT/Computer Studies course, designed to equip you with the essential skills for today’s digital world. Whether you're a beginner or looking to enhance your tech knowledge, our course covers everything f...Learn More
#CM-132
Mobile App Development with React Native - Mobile App Development with React Native
Mobile app development involves creating software applications that run on mobile devices, such as smartphones and tablets. It includes designing the user interface (UI), coding the app's functionality, testing for performance and usability, and depl...Learn More
#CM-175
Data Analytics With Excel, SQL,Tableau, PowerBi - Data Analytics With Excel, SQL, Power BI
We have done it before, and we keep doing it right, all the time. We only started this year and have secured jobs for our learners. From Bolaji, to Godwin, Anulika and others. we don't just believe in theory, we take you 7 steps higher, to handle rea...Learn More
#CM-278
Data Analytics With Excel, SQL,Tableau, PowerBi - Data Analytics with Excel, Power BI, Tableau and SQL
• Expert-Led Training (with a track record of teaching over 100 students) • Flexible Learning Options • Hands-on Real-Life Projects • One-on-One Mentorship • Creation of Portfolio and Resume • Monetization of Your Skills • Community S...Learn More
#CM-239
Digital Marketing - Advance Digital Marketing Training Secrets
2
In-depth SEO strategies, Content Writing winning tips, Social Media Management, Paid advertising insight, Analytics and How to Develop an Outstanding Digital Marketing Strategy.