Search Results for:
 /  Search:

PSEA

The Post-Secondary Education Scheme helps parents save for their children’s post-secondary education by maintaining a Post-Secondary Education Account (PSEA) for each eligible child. This is part of the Government’s efforts to encourage every Singaporean to complete his post-secondary education. It also underscores the Government’s commitment to support families in investing in the future education of Read more
53rd National Day Exclusive Promotion!

53rd National Day Exclusive Promotion!

BridgingMinds is extending exclusive promotion to all who sign up courses with us during the month of August. Sign up today till 9th August 2018, applicable to any courses, your 2nd course is just S$530.

Read more
Cisco Certified Network Associate (CCNA)

Cisco Certified Network Associate (CCNA)

Participants will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats. It also includes more in-depth topics that teach learners how to perform basic troubleshooting steps in enterprise branch office networks, preparing Read more
Certified Blockchain Security Professional

Certified Blockchain Security Professional

This 3 day instructor-led course will allow a business or a Blockchain network to have elevated Consensus security. The highest-level security breach in Decentralized Blockchain Network is the subversion of the node network or consensus mechanism. Any actors with malicious agenda are the threat, whom need to accumulate significant financial resources to take over. At Read more
Certified Blockchain Developer – Hyperledger

Certified Blockchain Developer – Hyperledger

This instructor-led Hyperledger training course is designed for developers and administrators who want to take a comprehensive deep dive on Hyperledger Fabric v1.1 and Hyperledger Composer. This Hyperledger training course has several comprehensive labs, giving you real world experience. In 3 days, you will learn the need for blockchain applications, where blockchain is used, and Read more
Certified Blockchain Developer – Ethereum

Certified Blockchain Developer – Ethereum

This 3 day instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. You will learn solidity and build both a basic app and smart contract with our exclusive hands-on labs. This course will introduce you to the Read more
C++ Programming

C++ Programming

C++ Programming training will develop the student’s ability to design and write programs in the C++ Language, Emphasizing object-oriented approaches to designing solutions. Targeted for programmers responsible for the development of advanced applications or systems programs in C++. OVERVIEWWHO SHOULD ATTENDEXAMS AND STUFFCOURSE SCHEDULEOVERVIEW 1. Course Introduction Course Objective Course Overview Suggested References 2. Concepts Read more
C Programming

C Programming

C Programming training will develop the student’s ability to design and write programs in the C Programming Language, Targeted for programmers new to the ANSI C language. This is a hands-on programming class. It is an introduction to a working programming language, not an academic overview of syntax and grammar. OVERVIEWWHO SHOULD ATTENDEXAMS AND STUFFCOURSE Read more
Python Programming

Python Programming

Python Programming training leads the student from the basics of writing and running Python scripts to more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python modules. Extra emphasis is placed on features unique to Python, such as tuples, array slices, output formatting. This is Read more
EC-Council Certified Incident Handler

EC-Council Certified Incident Handler

ECIH is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. After attending this course, they will be able to create incident handling and response policies Read more

Course search