- About Us
- Course Schedule
- Exam Center
- Guest Hse & Conferencing
DELTTAS training program will introduce you to the sought-after skillset in the areas of:
Mobile App Security
Web App Security
Internet of Things
Two types of program packages are being offered totaling 40 hours:
• A two-week training: a 4-hour evening class for 10 days
• A one-week training : an 8-hour per day class for 5 days
Immersion in the subject through hands-on learning experience
Training delivered by instructors who are subject matter experts in their fields
Courses schedule: 27th Feb – 3rd March 2017
Cloud computing infrastructure have become a mainstay of the IT industry, opening the possibility for on demand, highly elastic and infinite compute power with scalability and supporting the delivery of mission critical secure enterprise applications and services. This course provides the ground-up coverage on the high level concepts of cloud landscape, architectural principles, techniques, design patterns and real-world best practices applied to Cloud service providers and consumers and delivering secure Cloud based services. The course will describe the Cloud security architecture and explore the guiding security design principles, design patterns, industry standards, applied technologies and addressing regulatory compliance requirements critical to design, implement, deliver and manage secure cloud based services.
The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.
This program addresses the key questions of:
Device Architecture and Common Mobile Threats
The first section of the course quickly looks at the significant threats affecting mobile device deployments, highlighted with a hands-on exercise evaluating network traffic from a vulnerable mobile banking application. As a critical component of a secure deployment, we will examine the architectural and implementation differences and similarities in Android (including Android Marshmallow), Apple iOS 9, and the Apple Watch and Google Wear platforms. We will also look at the specific implementation details of popular platform features such as iBeacon, AirDrop, App Verification, and more. Hands-on exercises will be used to interact with mobile devices running in a virtualized environment, including low-level access to installed application services and application data.
This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.
Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
This network security course provides foundational knowledge for the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. Learnings include security controls of Cisco IOS devices , introduction to the Cisco Adaptive Security Appliance (ASA) and Cisco Intrusion prevention Systems.
Upcoming Network Security administrators
Impart knowledge in the following areas:
General Security Concepts and the survey of the current threat landscape, Securing Network Devices, Layer 2 & 3 Security, Firewall Technologies and VPN technologies and their Configuration.
VMware vSphere 6: Data Center Virtualization course is a start-to-finish approach to installing, configuring, managing, and monitoring a virtual environment using the VMware vSphere 6.0 product suite. You can attend the course to gain understanding of the vSphere product suite in preparation for a new virtual environment, or you can use it as a reference if you are an IT professional who has begun your virtualization and wants to complement your skills with real world tips, tricks, and best practices found in each module. This training, geared towards aspiring as well as practicing virtualization professional, provides information to help implement, manage, maintain, and troubleshoot an enterprise virtualization scenario.
This course provides the foundation necessary to configure, manage and gain maximum value from the Nutanix Xtreme Computing Platform. Students will learn how to configure network resources, provision storage, and monitor the usage of Nutanix cluster resources from Nutanix Prism management interfaces. This course provides instruction on cluster installation and expansion, site-to-site replication, and capacity and performance analytics. This course prepares students for the Nutanix Platform Professional (NPP) certification exam.
Systems Administrators, Engineers, Tech Support, Infra & Ops Professional, Storage Admins, Network Admins
Data Analytics is the science of analyzing data to convert information to useful knowledge. This knowledge could help us understand our world better, and in many contexts enable us to make better decisions. While this is the broad and grand objective, the last 20 years has seen steeply decreasing costs to gather, store, and process data, creating an even stronger motivation for the use of empirical approaches to problem solving. This course seeks to present you with a wide range of data analytic techniques and is structured around the broad contours of the different types of data analytics, namely, descriptive, inferential, predictive, and prescriptive analytics.
WEB PROGRAMMING (PHP, JAVA)
JAVA is geared towards students who wish to acquire a solid background in the area of object oriented programming using Java. This aim of the course is to introduce the concept of Java programming using object-oriented approach. By the end of this course, you should be able to:
PHP – Our aim of the course is to introduce the concept of Php programming and using object-oriented approach. By the end of this course, you should be able to: