Find Coding Bootcamps By Technology

87 Technologies

  1. Agile software development is a mode of developing software where teams work together using adaptive planning, empirical knowledge, and continual improvement.

  2. Algorithms are commonly used for data processing, calculation and other related computer and mathematical operations to solve problems efficiently and quickly. 

  3. Android is a mobile operating system primarily designed for touchscreen devices based on Linux and developed by Google.

  4. AngularJS is a JavaScript library that addresses some of the shortcomings of HTML, namely allowing the user to declare dynamic views in web-applications.

  5. Artificial Intelligence aims to create intelligent machines.

  6. ASP.NET is an open source web application framework developed by Microsoft to allow the production of dynamic web pages and applications.

  7. Augmented Reality (AR) is viewing and interacting with digital content placed in your physical space.

  8. Blockchain uses a decentralized, continuously growing record of transaction that is secure by nature.

  9. Business Intelligence is related to data analytics and it refers to providing historical, current, and predictive views of business operations.

  10. C# is a multi-paradigm programming language developed by Microsoft for use in their .NET framework.

  11. In 2020, most applications are developed and deployed on the cloud. Cloud computing allows users to store data and offload computing power without having to actively manage those resources.

  12. Cocoa is Apple's native application programming interface (API) for the OS X operating system.

  13. CompTIA A+ is a credential for IT professionals that you get by passing two exams: Core 1 (220-1001) and Core 2 (220-1002).

  14. CompTIA Network+ is a credential that you get by passing the N10-007 exam.

  15. CompTIA Security+ is a certification that you get by passing the SY0-501 exam. This credential is important if you want to pursue an IT security career and get jobs like Security Engineer, Security Administrator, Penetration Tester, etc. 

  16. Content Marketing is the creation and sharing of online material (such as blogs, videos, or social media posts) which subtly, not explicitly, promote the advertiser’s brand or product.

  17. Cryptocurrency (think: Bitcoin!) is an encrypted, digital currency operating independently of a central bank.

  18. Cryptography is the practice of securing communication between two parties (think: two-step authentication, encryption, etc).

  19. Cascading Style Sheets (CSS) is a style sheet language used for describing the look and format of a markup language such as HTML.

  20. Data Analytics refers to when data is categorized, stored and analyzed to study purchasing and business trends and patterns.

  21. Data engineers set up the infrastructure on which the data scientists and machine learning engineers do their work.

  22. Data Science in general refers to the extraction of information from data using a combination of statistics, information technology, mathematics, and programming.

  23.  Data structures help programmers implement various programming tasks by sorting data into the proper organizing units within larger data sets. 

  24. Data visualization is the visual representation and communication of data.

  25. Design in programming can refer to several disciplines including product design, graphic design, and user design.

  26. DevOps is a project management tool for the communication between the software development and operations teams.

  27. While you may think of marketing as print ads, commercials, direct mail, or telemarketing, expect digital marketing to soon overtake these traditional methods and impact how we consume ads.

  28. Django is an open source web application framework written in Python that uses the model-view-controller (MVC) architectural pattern and the Don't Repeat Yourself principle.

  29. Email Marketing is the use of email to promote products or services.

  30. Ethical Hacking is when cybersecurity experts hack into a system to identify and repair potential vulnerabilities, to effectively prevent exploitation by vindictive hackers.

  31. Excel is a spreadsheet application developed by Microsoft.

  32. Express.js is a Node.js web application backend server framework for building single-page, multi-page, and hybrid web apps.

  33. Front End Development refers to the creation of elements that users will see and interact with directly.

  34. Game development refers to any and all parts of the process of designing and developing video games for computers, dedicated gaming consoles, or mobile.

  35. Git is a distributed revision control system, the most widely used of its kind.

  36. GitHub is a website that hosts Git repositories online, making it easier for developers to share code. GitHub has become the centralized organization tool of the open source community and, in turn, is used by thousands of companies and teams. 

  37. Go, also known as golang, is a programming language based on C developed by Google.

  38. Growth hacking is a marketing strategy mostly deployed by startups and internet companies to utilize creative low cost techniques to grow profits and exposure.

  39. Hadoop is an open-source software framework written in Java and developed by Apache used for analysis of big data.

  40. HTML or HyperText Markup Language is the standard language used to create web pages.

  41. iOS is the operating system developed by Apple for use with all Apple hardware.

  42. Java is a popular general-purpose programming language derived from C and C++ that is popular for its code's ability to run on multiple platforms without being rewritten.

  43. JavaScript is the most popular coding language in the world.

  44. jQuery is a free, open source JavaScript library.

  45. Kotlin is a statically typed programming language that runs on the Java virtual machine and also can be compiled to JavaScript source code or use the LLVM compiler infrastructure.

  46. Linux is a free open-source operating system based on UNIX where users can modify and create variations of the source code.

  47. Machine learning is when artificial intelligence is geared towards the technological development of human knowledge.

  48. Mobile refers to both mobile computing and mobile technology, which is the use of computing devices that are transported during normal usage.

  49. Mobile Security focuses on efforts to secure data on mobile devices like smartphones and tablets.

  50. MongoDB is a cross-platform, document-oriented database.

  51. Model View Controller (known as MVC) is the architectural pattern used for building user interfaces, and divides an application into three parts - the model, the view, and the controller.

  52. MySQL is the world's second most used relational database management system.

  53. .NET is a software framework developed by Microsoft that runs on Microsoft Windows.

  54. Networking is also known as network security and is a subset of cybersecurity.

  55. Network security involves using physical and software techniques to prevent and monitor from threats to network systems and infrastructures like unauthorized access, hacking, modification, misuse, and destruction.

  56. Node.js is an open source runtime environment for applications written in JavaScript.

  57. NoLang is a programming language used for teaching developed by Pen and Paper Coding. NoLang is optimized for learning, and draws heavily from popular languages such as Python, Go and Java.

  58. Objective-C is a general purpose, object-oriented programming language developed by Apple that is currently the main programming language for both iOS and OS X.

  59. Penetration testing (or pen-testing) is a security assessment method to test, measure and enhance established security measures on information systems and support areas.

  60. PHP is a an efficient, server-side interpreted, non-compiled scripting language developed in 1994.

  61. Product Management is an organizational function within companies that deals with the planning, development, or marketing of a product at any point in that product's lifecycle.

  62. Python is a powerful, open-source, multi-paradigm programming language used to build websites, provide database access, and build software and games. Python is such a versatile programming language that it can be used for full stack development, data science, game development, business intelligence, cybersecurity, machine learning, and more.

  63. Quality Assurance (QA) testing or software testing exists to confirm that the product being built is the product that the client wants and is released with no bugs. A QA tester understands and champions thes customer mindset the long haul, and QA is involved in every step of the agile development process to make sure nothing is missed.

  64. R is a programming language and software environment for statistical computing and graphics.

  65. Ruby on Rails, or simply Rails, is an open source back-end web application framework developed as a reaction against messier, more idiosyncratic coding languages.

  66. React (aka – React.js or ReactJS) is an open-source JavaScript library maintained by Facebook that provides a view for HTML data or user interfaces.

  67. Representational State Transfer (REST) is a style of software architecture which defines the standards for creating webs services, to facilitate communication between different systems.

  68. Ruby is an object-oriented programming language with features like dynamic type and automatic memory management.

  69. Sales refers to the part of a company in charge of sales operations, sales processing, and sales analysis.

  70. The cloud-based software Salesforce provides customer relationship management service.

  71. Scrum is a framework for effective team collaboration on complex products.

  72. Search Engine Marketing (SEM) - SEM uses paid and unpaid marketing strategies such as Display Ads and native advertising to gain more traffic from search engines. Technical skills such as SEO, SMM, SEM, and digital design are necessary to be successful as a Digital Marketer.

  73. Search Engine Optimization (SEO) is the process of improving a website's visiblity in a search engine's natural results.

  74. Security, information, and event management (SIEM) is an approach to security management which aggregates log data from multiple sources, identifies discrepancies, security threats, and suspicious behavior, then takes appropriate action.

  75. Sinatra is a free and open source web application framework written in Ruby.

  76. Social Media Marketing (SMM) - SMM is the use of social media platforms to promote a product or service.

  77. Solidity is a blockchain programming language – specifically created to implement smart contracts for the Ethereum blockchain.

  78.  Spark is an open-source program used for data analytics and data science.

  79. Structured Query Language (SQL) is a programming language designed for managing data in a relational database management system.

  80. Swift is a multi-paradigm compiled programming language developed by Apple for iOS and OS X mobile development.

  81. Unity is widely known as a game engine but it can also be used for other applications like AR and VR.

  82. User Experience Design (UXD or UED) is the process of improving the ways in which users interact with computers whether that be usability, pleasure, or ease of use.

  83. Virtualization manages workloads by transforming traditional computing to make it more scalable.

  84. Virtual Reality (VR) involves wearing a headset and essentially placing yourself in a digital space separate from actual reality.

  85. For Web3 enthusiasts, Web3 is the next phase of the internet – a decentralized internet based on the blockchain.

  86. Wordpress is a free, open-source blogging platform powered by PHP and MySQL.

  87. Xcode is an integrated development environment developed by Apple for software development in OS X and iOS.

Get our FREE Ultimate Guide to Paying for a Bootcamp

By submitting this form, you agree to receive email marketing from Course Report.

Get Matched in Minutes

Just tell us who you are and what you’re searching for, we’ll handle the rest.

Match Me