What We Offer

Emblic Institute of Technology (EIT) is an indigenous ICT institute with a perfect culture and decent environment that fosters rapid learning, growth and high performance to make you become an expert in your chosen ICT field. With our competent trainers/instructors, we offer world-class training and strive to maintain the highest standards within the dynamic ICT industry. Our Training methodology is flexible and highly convenient. It also has emphasis on “best practice”. We are committed to providing practical IT training to our students thereby filling up the overwhelming gap in the Nigerian educational system with regards to the development of ICT competences, skills and applications. We have our training centers across cities in Nigeria such as Port-Harcourt, Warri and others.

Statements

To become the foremost IT refinery in Nigeria, where individuals are refined and equipped with technological skills
To fill up the overwhelming gap in the Nigerian educational system with regards to the development of ICT competences, skills and applications.
Corporate Trainings - We provide corporate training service to employees of companies and different institutions in IT related fields.
Our corporate training package is guaranteed to give your company an edge over your competitors as it is tailored at enhancing your staff competence level which will in turn drive performance and improve productivity.
Individual Trainings - Due to our flexible methodology we saw the need to provide this service for interested individuals. This is to help them acquire their desired IT skills conveniently without interfering with their jobs or key activities.
Class room Training - With our state-of-the-art facilities, learning has been made very much easier for our students. Our class rooms are spacious, air-conditioned and well equipped.
Even without a personal computer, you can still learn that IT skill you desire. Our classrooms are equipped with computer systems for student use.

Our Courses

• Introduction to Information Technology
• Introduction to Operating System
• Introduction to Information Security
• Networking Fundamentals
• CMD
• Linux
• Microsoft Word
• Microsoft Excel
• Microsoft PowerPoint
• Microsoft Access
• Microsoft Outlook
• Corel Draw and Photoshop
• HTML 5
• CSS 3
• Javascript
• JQuery
• Angular JS
• React
• Bootstrap 3 and 4
• PHP
• PHP OOP
• Laravel
• MySQL RDB
• Basic graphic technique using CorelDraw and Photoshop
• JavaScript, JQuery, Angular JS and React
• Cascading Style Sheet (CSS 3) and HTML 5
• Bootstrap 3 & 4
• Ajax
• Backend development using PHP and PHP OOP
• Creating relational database using MySQL
• Laravel
• Building and Managing APIs
• How to manage CPanel and Domain name registration
• Node.JS
• Java Programming Language Data Structure and Algorithms
• Logic Building and Effective ways of solving problems
• Object Oriented Analysis and Design
• Creating relational database using MySQL and SQLite
• windows Application Development using Java
• Web Component Development using Servlets and JSP
• Database Application Development using JDBC
• Secured Application Development using Java
• Application Testing and Quality Assurance
• Introduction to .NET Framework
• Business Logic and Software Development Life Cycle
• Object Oriented Analysis and Design
• Programming using C# Language
• Relational Database Design, Querying, Managing and Administering Database Using MS SQL SERVER
• Distributed Application Development using XML
• Windows Application Development using .NET Framework
• Database Application Development using ADO.NET
• Web Application Development using ASP.NET
• Secured Application Development using .NET Framework
• Application Testing and Quality Assurance
• Basic Java Programming Language
• Creating relational database using SQlite, MySql
• Android
• Asterisk
• 3CX
• Linux
• IVR
• Call Routing
• Introduction
• Ethics and Legality
• Footprinting
• Scanning
• Enumeration
• System Hacking
• Trojans and Backdoors
• Sniffers
• Denial of Service
• Social Engineering
• Session Hijacking
• Hacking Web Servers
• Web Application Vulnerabilities
• Web-Based Password Cracking Techniques
• SQL Injection
• Wireless Hacking
• Virus and Worms
• Physical Security
• Linux Hacking
• Evading IDS, Honeypots, and Firewalls
• Buffer Overflows
• Cryptography
• Penetration Testing Methodologies
• Modern Forensics
• Investigation Process
• Searching and Seizing
• Digital Evidence
• Incidence/ First Response
• Computer Forensics Labs
• Hard Disk and Files Systems
• Windows Forensics
• Data Acquisition
• Recovering and Deleting Files
• Access data
• Image Files
• Steganography
• Application Password Checkers
• Log Capturing
• Coding
• Vulnerability Assessments
• Penetration Testing
• Ethical Hacking
• Computer Forensics
• Compliance
• Network Security
• Operating System Security
• Mobile Devices Security
• Wireless Security
• Database Security
• Application Security
• Learn latest cyber attacks and how to defend yourself
• Know about difference malwares, Viruses, spywares, exploits, backdoors and their missions
• How to analyze your computer and emails
• Learn the technique and tool to detect and eliminate viruses without anti-virus
• How to securely surf the internet
• Know about firmware that is in your devices like Laptops, Phones, CCTV Cameras and (IoT)Internet of Things like Card, Car, TV etc
• Know more about Bluetooth, GPRS, Webcam, general text massages, Images, Videos and Audios

Testimonials

Contact

  • 79 Stadium Road, Opp. FIRS Office, Rumuomasi, Port Harcourt, Rivers State.
  • KM 4, Along Eku/Effurrun Road, Osubi Express, Beside Preslyn Resources Ltd. Warri, Delta State, Nigeria.
  • +234 (0) 703 435 6313, +234 (0) 703 835 9834, +234 (0) 805 419 3083
  • info@emblictech.com