t: +254-710-207061, +254-020-2655011/2

Cyber Forensics, Ethical Hacking, Cloud Security, Network Security, Web/Mobile App Security – Feb/Mar 2017

delttas_logoDELTTAS training program will introduce you to the sought-after skillset in the areas of:

Cyber Security
Cyber Forensics
Ethical Hacking
Cloud Security
Network Security
Mobile App Security
Web App Security

Cloud Computing

Internet of Things
Data Analytics

App Development

Two types of program packages are being offered totaling 40 hours:

• A two-week training: a 4-hour evening class for 10 days
• A one-week training : an 8-hour per day class for 5 days

Immersion in the subject through hands-on learning experience
Training delivered by instructors who are subject matter experts in their fields

Courses schedule: 27th Feb – 3rd March 2017


    Cloud computing infrastructure have become a mainstay of the IT industry, opening the possibility for on demand, highly elastic and infinite compute power with scalability and supporting the delivery of mission critical secure enterprise applications and services. This course provides the ground-up coverage on the high level concepts of cloud landscape, architectural principles, techniques, design patterns and real-world best practices applied to Cloud service providers and consumers and delivering secure Cloud based services. The course will describe the Cloud security architecture and explore the guiding security design principles, design patterns, industry standards, applied technologies and addressing regulatory compliance requirements critical to design, implement, deliver and manage secure cloud based services.

    More Info




    The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.


    This program addresses the key questions of:

    • What should one do when there is a suspicion of a computer-based crime?
    • What tools and techniques are most likely to yield the right set of clues?
    • Demonstration with the worlds’ leading forensics tool – Encase

    More Info


    Mobile Device Security and Ethical Hacking


    Device Architecture and Common Mobile Threats

    The first section of the course quickly looks at the significant threats affecting mobile device deployments, highlighted with a hands-on exercise evaluating network traffic from a vulnerable mobile banking application. As a critical component of a secure deployment, we will examine the architectural and implementation differences and similarities in Android (including Android Marshmallow), Apple iOS 9, and the Apple Watch and Google Wear platforms. We will also look at the specific implementation details of popular platform features such as iBeacon, AirDrop, App Verification, and more. Hands-on exercises will be used to interact with mobile devices running in a virtualized environment, including low-level access to installed application services and application data.

    More Info




    This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.

    Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

    More Info




    This network security course provides foundational knowledge for the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. Learnings include security controls of Cisco IOS devices ,  introduction to the Cisco Adaptive Security Appliance (ASA) and Cisco Intrusion prevention Systems.

    Target Audience
    Upcoming Network Security administrators

    Impart knowledge in the following areas:
    General Security Concepts and the survey of the current threat landscape, Securing Network Devices, Layer 2 & 3 Security, Firewall Technologies and VPN technologies and their Configuration.

    More Info

  • VMware vSphere 6: Data Center Virtualization



    VMware vSphere 6: Data Center Virtualization course is a start-to-finish approach to installing, configuring, managing, and monitoring a virtual environment using the VMware vSphere 6.0 product suite. You can attend the course to gain understanding of the vSphere product suite in preparation for a new virtual environment, or you can use it as a reference if you are an IT professional who has begun your virtualization and wants to complement your skills with real world tips, tricks, and best practices found in each module. This training, geared towards aspiring as well as practicing virtualization professional, provides information to help implement, manage, maintain, and troubleshoot an enterprise virtualization scenario.

    Target Audience:

    • Systems Administrators, Engineers, Tech Support (L1L4),
    • Infra & Ops Professional, Storage Admins, Network Admins

    More Info



    nutanixThis course provides the foundation necessary to configure, manage and gain maximum value from the Nutanix Xtreme Computing Platform. Students will learn how to configure network resources, provision storage, and monitor the usage of Nutanix cluster resources from Nutanix Prism management interfaces. This course provides instruction on cluster installation and expansion, site-to-site replication, and capacity and performance analytics. This course prepares students for the Nutanix Platform Professional (NPP) certification exam.

    Target Audience:
    Systems Administrators, Engineers, Tech Support, Infra & Ops Professional, Storage Admins, Network Admins

    More Info



    Data Analytics is the science of analyzing data to convert information to useful knowledge. This knowledge could help us understand our world better, and in many contexts enable us to make better decisions. While this is the broad and grand objective, the last 20 years has seen steeply decreasing costs to gather, store, and process data, creating an even stronger motivation for the use of empirical approaches to problem solving. This course seeks to present you with a wide range of data analytic techniques and is structured around the broad contours of the different types of data analytics, namely, descriptive, inferential, predictive, and prescriptive analytics.

    More Info



    JAVA is geared towards students who wish to acquire a solid background in the area of object oriented programming using Java. This aim of the course is to introduce the concept of Java programming using object-oriented approach. By the end of this course, you should be able to:

    • Understand the fundamental aspects of Java.
    • Understand the important concepts and terminologies in object-oriented programming.
    • Write Java applications using object oriented approach.
    • Write Java Applets.
    • Write Java Applets that have event handling and exceptional handling.

    More Info

    PHP – Our aim of the course is to introduce the concept of Php programming and using object-oriented approach. By the end of this course, you should be able to:

    • Understand the fundamental aspects of Php.
    • Understand the important concepts and terminologies in object-oriented programming.
    • Write Php applications using object oriented approach.
    • Write Php Applets.
    • Write Php that have event handling and exceptional handling.

    More Info

Contact Person
Khamsa Enaya
Email: khamsa@delttas.org