Payments & Security


When your payment is completed, you will receive by e-mail your personal codes for entering the courses no later than the next working day.
For the convenience and service of all those who wish to buy from our store, offers you the following alternative payment methods:

1. By charging your debit or credit card. has taken all the necessary measures for the security of your transactions through your debit or credit card.


3. With cash on delivery with a charge of 5 euros. You will receive an envelope with information material and make your payment to the company employee Courier ELTA. When the payment is complete, you inform us (at 210-48.11.260 or at to receive by e-mail your personal codes for entering the courses.

4. WithBank Deposit to one of the following accounts with the beneficiary “Technology and Education S.A.”:

• Piraeus: GR6901720190005019000166171
• Alpha: GR7601401180118002320002791
• Eurobank: GR9002600350000110200151860
• National: GR3901101370000013747072737
Then you should send us the copy of the depository to or contact us at to receive by e-mail your personal codes for entering the courses.

Also, at you are given the option to choose whether your payment will be made with a retail sales receipt or with an invoice. An invoice is issued to companies and self-employed professionals if they fill in the following information during their order: Company name, Tax Number, D.O.Y. and profession for freelancers.


The website uses the SSL protocol, for secure online commercial transactions. This encrypts all your personal information, such as your credit card number, name and address, so that it cannot be read or changed in transit over the Internet.
The SSL (Secure Sockets Layer) protocol is today the global standard on the internet for certifying websites to web users and for encrypting information between web users and web servers. Encrypted SSL communication required all the information sent between the client and the server to be encrypted by the sending software and decrypted by the receiver software, thus protecting personal information during transmission. In addition, all information sent with the SSL protocol is protected by a mechanism which automatically verifies whether the data has been modified during transport.

Skip to content