Arusha Computing Centre

Imparting Knowledge & Technical Skills

Short Courses

Short courses cater for practical training on Computer Application Programmes for users who cannot leave their occupations for longer period. Courses are run regularly and others tailored to suit customer needs.

MICROCOMPUTER APPLICATIONS

Each student to comprehend foundational knowledge of common microcomputer applications (Microsoft office) software.

ADVANCED MICROCOMPUTER APPLICATIONS

Students will learn complex Word processing, Spreadsheet, Database Processing, PowerPoint Presentations through the use of realistic business situations.

Executive Computer Applications for Senior Officers

To equip senior officers from Public and Private Institutions/Companies with current ICT knowledge and skills.

EXECUTIVE COMPUTER APPLICATIONS FOR TEACHERS

Teachers and Supporting staff from Pre-Primary & Primary Schools, Secondary Schools, Colleges and Universities will be equipped with the current ICT knowledge and skills.

ICT Governance

To impart IT knowledge, skills and techniques of managing computer documents, scheduling, project management, presentation techniques and explore the powers of spreadsheet in arithmetic manipulation.

Executive Computer Applications for Tour Operators

This course will enable Tour Operators to be competent in utilizing technologies in all aspects of operating a Tour and Travel Company. Tour Operators will learn more on Computer operation, websites, Social Media & Market place.

Digital Marketing Management

Digital marketing knowledge helps in reaching a wide audience, scale the business further and generate more revenue, setting up a business online, running ad campaigns, developing content strategies etc. All these helps digital experts to provide tangible results

Computer Maintenance and Repair

Is the process of identifying, troubleshooting and resolving problems and issues on a faulty computer.

Basics of Printers & Photocopier Maintenance

All machines should receive proper care and maintenance to prevent issues or mechanical failures. Regular Printer and photocopier maintenance can increase productivity and allow for consistent, high-quality prints.

Data Analysis with SPSS

Is a software package used for the analysis of statistical data. SPSS is commonly used in Education research, Healthcare, Marketing etc.

Microsoft Project Management

Is a project management software product, it is designed to assist a Project managers in developing schedules, assigning resources to tasks, tracking processes, managing the budget, and analyzing workloads.

Electronic Records Management & Information Security (e-RM)

To enable participants to understand the importance of an e-records management system given the development in the business World today.

Graphics Design

Graphic Designers create visual concepts, using computer software to communicate ideas that inspire, inform, and captivate consumers. With graphic design, you can design publications like Advertisements, Brochures, Magazines etc.

Advanced Graphics Design

Advanced Graphics Design incorporates advanced graphics design techniques and the production capabilities of Desktop Publishing. This course will reinforce the full range of design and production methods from publication layout to computer generated prepress files.

Multimedia

Multimedia is the form of communication that combines different content forms such as text, audio, image, animations, or video into a single interactive presentation, in contrast to traditional mass media which features little to or no interaction from users.

Web Development Application

Web Development is the work involved in developing a website for the internet or intranet. Web development can range from developing a simple single static page of plain text to complex web applications, electronic businesses, and social Network services.

Advanced Web Development Application (Systems Design and Implementation)

Systems design is the process of defining the components, modules, interfaces, and data for a system to satisfy specific requirements.

OR

OR

OR

Computer Programming

Computer programming is the process that professionals use to write codes that instructs how a computer, application or software program performs.

Mobile Application Development

This is the process of designing and creating a specific software app that works on mobile devices. It is a technique that supports all the features a mobile device has to offer.

Database Administration and Management

Database administration is the whole set of activities performed by a database administrator to ensure that a database is always available as needed. Other related tasks and roles are database security, database monitoring and troubleshooting and plan for future growth. 

Financial Accounting Systems (QuickBooks / Tally)

Is a computer program/software that maintains account books on computers, including recording, transactions, account balances etc.

Engineering Design Package (Auto CAD)

Is the use of Computer-based software to aid in design processes. CAD allows experts to create more accurate design representations. CAD replaced manual design drafting, allowing design development, alteration and optimization. CAD enables Engineers to craft more precise designs and manipulate them virtually. CAD software calculates how multiple materials relate.

Introduction to CyberSecurity

CyberSecurity and IT Security are used interchangeably to refer to the art of protecting data and information systems from unauthorized access. It involves implementing processes that prevent the misuse, modification, or theft of sensitive company information.

CyberSecurity Essentials

CyberSecurity and IT Security are used interchangeably to refer to the art of protecting data and information systems from unauthorized access. It involves implementing processes that prevent the misuse, modification, or theft of sensitive company information.

CyberOps Associate

CyberOps Associate covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Cybersecurity Analyst working in a Security Operations centre (SOC).

Secure Networks: Designing and Implementation

This course aims to create Network Administrators that can effectively plan, design, deploy/install and manage the organizational network infrastructure.

Network Security

Upon completion of the Network Security course, students will be able to perform various tasks that fall in the following three categories: Preventing Intrusions, Security Hardening systems and Developing and implementing security policies.

Cloud Security

Cloud Security is aligned with the Certificate of Cloud Security Knowledge (CCSK). The CCSK certificate is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud.

Networking Essentials

The Networking Essentials course is designed for people who want to learn the knowledge and skills they need to work in Information Technology (IT) and Networking.

Certified Cisco Network Associate (CCNA)

This course aims to create Network Administrators that can effectively plan, design, deploy/install and manage the organizational network infrastructure. 

Certified Information Systems Auditor (CISA)

Is a certification and globally recognized standard for appraising an IT auditor’s knowledge, expertise and skills in assessing vulnerabilities and instituting IT controls in an enterprise environment. CISA provides a valid and reliable means for enterprises to identify technologists who are competent in incorporating privacy by design into technology platforms, products and processes, communicating with legal professionals, and keeping the organization compliant efficiently and cost effectively.

Monitoring and Evaluation for Development Projects and Programmes

This training is design to impact job-oriented skills for monitoring and evaluation that are highly demanded in the development industry. After following this course, you will be capable of designing and managing Monitoring and Evaluation Systems which meet the standards of donor agencies. It is aimed at providing an overview of monitoring and evaluation methods for development results with practical applications of tools and methods.

NB:

The duration and fee for Tailor-made programmes will be established after consultation between Arusha Computing Centre and the Client

Mobile Data Collection using ODK and Kobol ToolBox for Monitoring and Evaluation

Data collection and monitoring and evaluation (M&E) have always been an integral part of development work. In the past, these tasks were performed with paper and pen, which made them prone to error, difficult to conduct on a large scale, and high in transaction costs.

NB:

The duration and fee for Tailor-made programmes will be established after consultation between Arusha Computing Centre and the Client

GIS for Monitoring and Evaluation

GIS is a computer system capable of assembling, storing, manipulating and displaying geographically referenced information, i.e. data identified according to their locations. This training will present a practical guide for using a geographic information system (GIS) integrated with Monitoring and Evaluation.

NB:

The duration and fee for Tailor-made programmes will be established after consultation between Arusha Computing Centre and the Client

Impact Evaluation (IE) for Development Projects

The course aimed to address an important prerequisite for incorporating impact evaluation (IE) into programme design: a theoretical and practical understanding of IE approaches to enable selection of appropriate methodologies, coupled with careful appraisal of the resulting evidence.

NB:

The duration and fee for Tailor-made programmes will be established after consultation between Arusha Computing Centre and the Client

Results Based Monitoring and Evaluation of Development Projects

Monitoring and evaluation helps track project performance at any given time and provides reasons for an observed project status. In addition, understanding how approaches in Monitoring and Evaluation can be modified or enhanced to optimize positive impact on the intended beneficiaries is important. This five-day course is aimed at providing an overview of results-based monitoring and evaluation methods particularly in projects.

NB:

The duration and fee for Tailor-made programmes will be established after consultation between Arusha Computing Centre and the Client

CCTV Camera Installation and Management

This course will take you step-by-step through the wiring, installation and configuration of a professional security camera system.  You will also set up an app that will allow you to view the cameras on your phone, tablet, or computer.

NB:

The duration and fee for Tailor-made programmes will be established after consultation between Arusha Computing Centre and the Client