Skip to content
IEEE.org
IEEE
Xplore
Digital Library
IEEE Standards
IEEE Spectrum
More Sites
IEEE.org
IEEE
Xplore
Digital Library
IEEE Standards
IEEE Spectrum
More Sites
INR
INR
USD
EUR
AUD
AED
GBP
CNY
JPY
Login
Register
INR
INR
USD
EUR
AUD
AED
GBP
CNY
JPY
Login
Register
About BLP
Courses
Wearable Technology
Introduction to Wearable Technologies
5G
IEEE CDOT Certified Telecom Expert Program – ICCTEP
Blockchain
Cloud
Cloud Computing for IoT Systems
Introduction to Cloud Computing
Cyber Security
Ethical Hacking
Concept of Operating Systems and Administration – COSA
Introduction to Cyber Security
Public Key Infrastructure – PKI
Operation Technology Security – Part 1
Operation Technology Security – Part 2
Drones
Embedded Systems with Drones
EMI/EMC
Advanced Aspects of Electromagnetic Compatibility
Introduction to Electromagnetic Compatibility
Intellectual Property (IP)
Innovation Management and Intellectual Property – Advance
Introduction to Innovation Management and Intellectual Property
IoT
Communication Models and Protocols for IoT Systems
Embedded Computing for IoT Systems
Embedded Linux for IoT Systems
Introduction to Blockchain
Introduction to Cloud Computing
Introduction to Embedded Systems and ARM for IoT
Introduction to IoT
IoT Node Specialist
Mobile Application Development
Python for Everyone
Sensor Networks for Internet of Things
AI/ML
IEEE Awareness Module on AI Ethics
Machine Learning
IEEE Ethics for AI System Design Training
IEEE Responsible AI Procurement Training
POSH
Anti Ragging Course for Academia
Prevention of Sexual Harassment – POSH for Academia
WiFi
Building Wireless Community Networks 2.0
Software Engineering
Data Structures for Application Development
Government Engagements
Ministry of Electronics and Information Technology (MeitY)
Certifications
IEEE C-DOT Certified Telecom Expert Program (ICCTEP)
Events
Blogs
About BLP
Courses
Wearable Technology
Introduction to Wearable Technologies
5G
IEEE CDOT Certified Telecom Expert Program – ICCTEP
Blockchain
Cloud
Cloud Computing for IoT Systems
Introduction to Cloud Computing
Cyber Security
Ethical Hacking
Concept of Operating Systems and Administration – COSA
Introduction to Cyber Security
Public Key Infrastructure – PKI
Operation Technology Security – Part 1
Operation Technology Security – Part 2
Drones
Embedded Systems with Drones
EMI/EMC
Advanced Aspects of Electromagnetic Compatibility
Introduction to Electromagnetic Compatibility
Intellectual Property (IP)
Innovation Management and Intellectual Property – Advance
Introduction to Innovation Management and Intellectual Property
IoT
Communication Models and Protocols for IoT Systems
Embedded Computing for IoT Systems
Embedded Linux for IoT Systems
Introduction to Blockchain
Introduction to Cloud Computing
Introduction to Embedded Systems and ARM for IoT
Introduction to IoT
IoT Node Specialist
Mobile Application Development
Python for Everyone
Sensor Networks for Internet of Things
AI/ML
IEEE Awareness Module on AI Ethics
Machine Learning
IEEE Ethics for AI System Design Training
IEEE Responsible AI Procurement Training
POSH
Anti Ragging Course for Academia
Prevention of Sexual Harassment – POSH for Academia
WiFi
Building Wireless Community Networks 2.0
Software Engineering
Data Structures for Application Development
Government Engagements
Ministry of Electronics and Information Technology (MeitY)
Certifications
IEEE C-DOT Certified Telecom Expert Program (ICCTEP)
Events
Blogs
₹
0.00
0
Cart
₹
0.00
0
Cart
Verify
Login
Sign Up
Remember me
Forgot Password?
Sign in
I have read and accept
IEEE Privacy Policy
Sign Up
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
Email Reset Link
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }
INR
INR
USD
EUR
AUD
AED
GBP
CNY
JPY
Login
Register
INR
INR
USD
EUR
AUD
AED
GBP
CNY
JPY
Login
Register
About BLP
Courses
Wearable Technology
Introduction to Wearable Technologies
5G
IEEE CDOT Certified Telecom Expert Program – ICCTEP
Blockchain
Cloud
Cloud Computing for IoT Systems
Introduction to Cloud Computing
Cyber Security
Ethical Hacking
Concept of Operating Systems and Administration – COSA
Introduction to Cyber Security
Public Key Infrastructure – PKI
Operation Technology Security – Part 1
Operation Technology Security – Part 2
Drones
Embedded Systems with Drones
EMI/EMC
Advanced Aspects of Electromagnetic Compatibility
Introduction to Electromagnetic Compatibility
Intellectual Property (IP)
Innovation Management and Intellectual Property – Advance
Introduction to Innovation Management and Intellectual Property
IoT
Communication Models and Protocols for IoT Systems
Embedded Computing for IoT Systems
Embedded Linux for IoT Systems
Introduction to Blockchain
Introduction to Cloud Computing
Introduction to Embedded Systems and ARM for IoT
Introduction to IoT
IoT Node Specialist
Mobile Application Development
Python for Everyone
Sensor Networks for Internet of Things
AI/ML
IEEE Awareness Module on AI Ethics
Machine Learning
IEEE Ethics for AI System Design Training
IEEE Responsible AI Procurement Training
POSH
Anti Ragging Course for Academia
Prevention of Sexual Harassment – POSH for Academia
WiFi
Building Wireless Community Networks 2.0
Software Engineering
Data Structures for Application Development
Government Engagements
Ministry of Electronics and Information Technology (MeitY)
Certifications
IEEE C-DOT Certified Telecom Expert Program (ICCTEP)
Events
Blogs
Facebook-f
Instagram
Twitter
Youtube