The Post Graduate Diploma in Advanced Computing (PG-DAC) is the flagship programme of ACTS. The course is targeted towards engineers and IT professionals who wish to venture into the domain of advanced computing. The course aims to groom the students to enable them to work on current technology scenarios as well as prepare them to keep pace with the changing face of technology and the requirements of the growing IT industry. The course curriculum has been designed keeping in view the emerging trends in advanced computing as well as contemporary and futuristic human resource requirements of the ICT industry. The entire course syllabus, course ware, teaching methodology and the course delivery have been derived from the rich research and development background of C-DAC. The depth and width of the course is unique in the industry covering a wide spectrum of requirements of the ICT industry. Running successfully for more than seventeen years, the PG-DAC course has yielded more than quarter million of students, who are well positioned in the industry today.

Graduate in Engineering or equivalent (e.g. BE / BTech / 4-year BSc / AMIE / DoEACC B Level, etc.) in Electronics/ Computer Science/ IT or related areas, or Post Graduate in Engineering Sciences (e.g. MSc in Computer Science, IT, Electronics, etc.), or Graduate in any discipline of Engineering or equivalent, or MCA, MCM, OR Post Graduate in Physics/ Computational Sciences/ Mathematics or allied areas, or Post Graduate in Management with graduation degree in Science/ IT/ Computers. The candidates must have secured a minimum of 50% marks in their qualifying examination.

24 weeks full-time Post-Graduate Diploma with 900 hours' theory/lab/project (8 hours per day theory + lab sessions on 6 days a week in most centres, continuous lab and internal assessments during the course, and centralised course-end theory exams).

Sl# Major Modules
1
  • OOPs with C++ Programming
  • Algorithm & Data Structures
  • Advanced Software Development Methodologies
  • Operating Systems Concepts
  • Advanced Web Programming
  • MEAN Stack
  • Database Technologies
  • Java Technologies-I( Core Java)
  • Java Technologies-II( Web Based Java)
  • Microsoft.Net Technologies
  • Effective Communication
  • Aptitude & General English
  • Project

More Details To Click Here

The Diploma in Advanced Software Development Methodologies (DASDM) course is targeted towards students who wish to venture into the domain of computing. The DASDM course aims to groom the students to enable them to work on current technology scenarios as well as prepare them to keep pace with the changing face of technology and the requirements of the growing IT industry. After the completion of the course, students can work as software developer, programmer, tester, System Analyst and the like, in the IT industry and associated service sectors.

Graduate in Science / Mathematics / Physics / Allied Areas / Computational Sciences / Computing. A minimum of aggregate 50% marks is must.

One year distributed in four trimesters (3 months duration each)

Sl# Major Modules
1
  • Algorithm and Problem Solving
  • Programming Concepts (C, C++ and Python)
  • Database Technology and Testing
  • Software Engineering
  • Web Engineering
  • Java Programming
  • Application Security
  • Software Testing
  • Aptitude and Effective Communications

More Details To Click Here

Computer & Programming Concepts (40 Hours)

Fundamentals of Computers

Uses of Computer, Hardware, Accessories

Interfaces and their functions, Computer hardware connectivity

Primary and Secondary storage

Input-output devices

Software, types of software, Operating Systems

Software used in Academic departments and other area

Computer language, Different types of Programming Languages

Operating System

Programming concepts

Algorithm

Flow charts

Introduction to loops, functions

Web Programming a€“ I (HTML, CSS, Ajax) (60 Hours)

HTML 5.0 programming

Overview of Internet and Web Pages

Introduction to HTML Tags

Introduction to Web Browser / Composer

Introduction to HTML Editor

CSS Introduction

CSS Syntax

CSS Id & Class

CSS How To

CSS Styling

CSS Box Model

CSS Summary

Introduction to Ajax

Web services and Ajax

Ajax using HTML, CSS

Database Concepts (20 Hours)

Database Concepts

RDBMS Technologies

Codd's Rules

Normalization Techniques

SQL and PL/SQL

Overview of OORD (Oracle)

Introduction SQL*Plus

DDL, DML and DCL

Tables, Indexes and Views

Web Programming - II (PHP, Java scripts) (80 Hours)

Java Script Introduction

JS output

JS statement

JS Comments

JS Variable

JS data types

JS Switches, loops

Introduction to PHP

Working with arrays

Functions

Forms

Handling date and Times

Working with Files

Working with database

PHP and AJAX

Internet Terminologies (20 Hours)

Web services

Deployments of application on Internet

Maintenance of application

Management Development Program (60 Hours)

Introduction to communication, Barriers to communication, Kind of communication, Confidence building Non-verbal Communication, Fluency and vocabulary, Synonyms, Antonyms, Grammar, Noun Pronoun, Verb, Adjective, Preposition, Conjunction, Words of Idioms & phrases, Sentence Construction, Fill up the blanks, Pronunciation, Conversation practice, Polite Conversation, Greeting, Logical reasoning, General Aptitude, Writing: Covering letter, Resume, Email, Presentation Skill, group discussion, Interview skills, Mock

Sl# Topics Sub-Topics
1 Introduction to Machine Learning
  • Introduction To Machine Learning
  • History and Evolution
  • Artificial Intelligence Evolution
  • Find out where Machine Learning is applied in Technology and Science.
2 Machine Learning Categories
  • Supervised Learning
  • Unsupervised Learning
  • Reinforcement Learning
3 Machine Learning Python Packages
  • Data Analysis Packages
  • NumPy
  • SciPy
  • Matplotlib
  • Pandas
  • Slkearn
4 Supervised Machine Learning
  • Regression
  • Classification
  • Generalization, Overfitting and Underfitting
5 UnSupervised Machine Learning
  • Challenges in unsupervised learning
6 Supervised Machine Learning Algorithms
  • k-Nearest Neighbor
  • Linear models
  • Naive Bayes Classifiers
  • Decision trees
  • Support Vector Machines
7 Supervise ML - Classification
  • Classification
8 Supervised ML - Regression
  • Understand how continuous supervised learning is different from discrete learning.
  • Code a Linear Regression in Python with scikit-learn.
  • Understand different error metrics such as SSE, and R Squared in the context of Linear Regressions.
9 UnSupervise ML - Clustering
  • k-Means clustering
10 Dimensionality Reduction, Feature Extraction and
  • Preprocessing and Scaling
  • Applying data transformations
  • Scaling training and test data the same way
  • Principal Component Analysis (PCA)
11 Prepare Your Data For Machine Learning
  • Need For Data Pre-processing
  • Data Transforms
  • Rescale Data
  • Standardize Data
  • Normalize Data
  • Binarize Data
12 Feature Selection For Machine Learning
  • Feature Selection
  • Univariate Selection
  • Recursive Feature Elimination
  • Principal Component Analysis
  • Feature Importance
13 Evaluate the Performance of Machine Learning
  • Evaluate Machine Learning Algorithms
  • Split into Train and Test Sets
  • K-fold Cross Validation
  • Leave One Out Cross Validation
  • Repeated Random Test-Train Splits
  • What Techniques to Use When
14 Machine Learning Algorithm Performance Metrics
  • Algorithm Evaluation Metrics
  • Classi cation Metrics
  • Regression Metrics
15 Spot-Check Classification Algorithms
  • Algorithm Spot-Checking
  • Algorithms Overview
  • Linear Machine Learning Algorithms Spot-check
  • Nonlinear Machine Learning Algorithms Spot-check
16 Automate Machine Learning Workfows with Pipelines
  • Machine Learning Pipelines
17 Supervise ML - Classification
  • Finalize Your Model with pickle
  • Finalize Your Model with Joblib
18 Project Case Study
  • Project Description, Datasets, Coding of Implementation
19 Introduction to Deep Learning
  • A revolution in Artificial Intelligence
  • Limitations of Machine Learning
  • What is Deep Learning?
  • Advantage of Deep Learning over Machine learning
20 Introduction to Neural Networks with Tensor Flow
  • Introduction to Neural Networks
  • Neural Network Architecture
  • Linear Regression example revisited
  • TensorFlow code-basics
  • Tensorflow data types
  • CPU vs GPU vs TPU
  • Tensorflow methods
21 Introduction to Cloud Coumputing
  • What is Cloud
  • History of Cloud Computing
  • How Cloud Computing Works
  • Advantages & Disadvantages
  • Applications for Businesses
  • Cloud Service Providers
  • Cloud Computing Architecture
  • Cloud Computing Terminology
22 Introduction to AWS Cloud
  • Public Cloud Services a€“ using Amazon Cloud
  • Types, Priced and open source products in the market
  • Overview of Public Cloud vendors
  • Overview of Private cloud products
  • Introduction to Amazon AWS cloud a€“ Pricing, Regions Availability Zones, Types of instances
  • Overview of different services of AWS
  • Consuming EC2 Instance Service from AWS
  • Creating Linux and Windows Instances from the available AMIs connecting and remote control from the laptop
Network Fundamentals (40 Hours)

Introduction to computer Networking

Categories of Networking according to size (LAN,WAN,DAN,MAN)

Types of connections

Network classifications (Wired, Wireless)

Network Hardware Devices (Hub, Switch, Modem, Router, Bridge , Repeaters ,firewall etc ) Overview

TCP/IP overview

IP addressing, Sub-netting, super-netting

IPv6

Planning and Implementing

Architecture of Internet and intranet

Port Security

Spanning tree Protocol

Troubleshooting

Network Defense and Countermeasures (100 Hours)

Security Fundamentals

Firewalls

Define The Type Of Firewalls

Security Fundamentals

Packet Filtering Firewalls

Hybrids

Intrusion Detection And Prevention

Intrusion risks

Security policy

Monitoring traffic and open ports

Detecting modified files

Investigating and verifying detected intrusions

Recovering from, reporting and documenting intrusions

Define the Types of intrusion Prevention Systems

Setup an IPS

Manage an IPS

Understand Intrusion Prevention

Issues with Intrusion Prevention

IP Signature and Analysis

Risk Analysis

Virtual Private Networks

Define Virtual Private Networks

Deploy User VPNs

Benefits of user VPNs

Managing User VPNs

Issues with User VPNs

Deploy Site VPNs

Benefits of Site VPNs

Managing Site VPNs

Issues with Site VPNs

IT Infrastructure Management (80 Hours)

Introduction to ITIL

Service Strategy

Service Design

Service Transition

Service Operation

Continual Service Improvement

Data Centre Management

Introduction to DCM

Data Centre design

Best Practices in IT

Server Security

Storage area network

Management Development Program (60 Hours)

Introduction to communication, Barriers to communication, Kind of communication, Confidence building Non-verbal Communication, Fluency and vocabulary, Synonyms, Antonyms, Grammar, Noun Pronoun, Verb, Adjective, Preposition, Conjunction, Words of Idioms & phrases, Sentence Construction, Fill up the blanks, Pronunciation, Conversation practice, Polite Conversation, Greeting, Logical reasoning, General Aptitude, Writing: Covering letter, Resume, Email, Presentation Skill, group discussion, Interview skills, Mock interview

Sl# Session Topics to be covered
1 Session - 1
  • Java Basics-Overview of Java,Features of Java
  • JDK and its Usage
  • Working with Data Types
  • Structure of Java Class
  • Importing Packages
  • Difference between Object Reference variable and Primitive Variable
  • Java Comments
  • Java Code compilation and Execution
2 Session - 2
  • Operators and Control Statements
  • Objects Life Cycle(creation, reassignment, garbage collection: new, finalize)
  • java.lang, java.math
  • Wrapper classes (Boolean, Double and Integer)
3 Session - 3
  • Packages and classpath
  • Methods and Encapsulation: Methods, Access Modifiers
  • Method Overloading, Passing Data, Creating Constructors, Immutable Classes
  • Arrays
  • Understanding of String Class, StringBuilder Class, StringBuffer class
4 Session - 4
  • Class Inheritance, Abstract Classes, Interface and Implementation classes.
  • Understanding Polymorphism: Object vs Reference, Object Casting
  • Virtual Methods, Method Overriding
  • Enumerations, Auto boxing, and Annotations
5 Session - 5
  • Exception-Handling: Basics, Role of Exceptions, Types
  • Using try and catch, Multiple Catch, Nested try (throw, throws, finally)
  • Built-in Exceptions, Runtime Exceptions Checked Exceptions, Errors
  • Creating own Exception Subclasses
6 Session - 6
  • Overview of Nested classes
  • Types of Nested Class
  • Complete understanding of static nested class
  • Complete understanding of non-static nested classes/Inner classes
  • Local classes
  • Anonymous classes
  • Anonymous Interface
7 Session - 7
  • Java Concurrency: Using threads in Java, Life cycle of thread
  • Advantages and issues
  • Thread class, thread groups
  • The Runnable interface
  • Synchronization, Inter-Thread communication
8 Session - 8
  • The java.io Package
  • Input and Output Streams
  • Files
  • Byte Streams and Unicode Character Streams
  • Persistence of objects
  • Object Serialization Methods
9 Session - 9
  • Understanding compile-time type-safety
  • Introduction to Generics
  • Defining a Generic class
  • Understanding Type Parameters
  • Sub-typing and Super-typing
  • Using wildcards
10 Session - 10
  • Introduction to collections
  • What is a collection framework
  • Benefits of collection framework
  • Interface Hierarchy
  • The java.util package and its implemented members
11 Session - 11
  • Introduction of JDBC API
  • JDBC Architecture & Drivers
  • Connection, Statement , PreparedStatement and Result Set interfaces and their relationship to provider implementations
  • Writing JDBC Application along with DAO & POJO Layers
12 Session - 12
  • Introduction to swing/awt
Sl# Session Topics to be covered
1 Introduction to Python
  • Introductory Remark about Python
  • A Brief History of Python
  • How Python is different from other languages
  • Python Version
  • Installing Python
  • IDLE
  • Getting Help
  • How To execute Python program
  • Writing your first program
2 Python Basics-1
  • Python coding Introduction
  • Python keywords and Identifiers
  • Python statements
  • Comments in python
  • Getting user input
  • Variables
  • Data types
  • Numbers
  • Strings
  • Lists ,tuples & dictionary
3 Python Basics-2
  • Control flow and syntax
  • The if statement
  • Python operators
  • The while Loop
  • Break and continue
  • The for Loop
  • Pass statement
4 Working with Functions
  • Introduction of Function
  • Calling a function
  • Function arguments
  • Built in function
  • Scope of variables
  • Decorators
  • Passing function to a function
  • Lambda expression
5 Modules and Packages
  • Modules and Packages
  • Importing Modules
  • Standard Modules- sys
  • Standard Modules- OS
  • The dir Function
  • Packages
6 Exception Handling
  • Exception Handling
  • Errors
  • Run Time Errors
  • Handling IO Exception
  • Trya€|.except statement
  • Raise
  • Assert
7 File Handling
  • Introduction to File Handling in Python
  • Files and Directories
  • Writing Data to a file
  • Reading data from a file
  • Additional file methods
  • Working with files
  • Working with Directories
  • The pickle Module
8 OOP's with Python
  • Classes & Objects
  • Introduction of classes and objects
  • Creating classes
  • Instance methods
  • Special class method
  • Inheritance
  • Method overriding
  • Data hiding
9 NumPy
  • Scientific Computing with NumPy.
  • N-Dimensional Array Object
  • Array Slicing Methods
  • Array reshapeing methods
  • Numerical routines in NumPy
10 Matplotlib
  • Introduction To Matplotlib
  • Python 2D plotting
  • Plotting with default settings
  • Customizing matplotlib Graphics with colors and line width
  • Generate plots, histograms, power spectra,
  • Generate bar charts, scatterplots
11 Introduction to Pandas
  • Introduction to pandas
  • Pandas data structures and data analysis
12 Project
  • Project Discusssion and Implementation

This course will enable the participants to work with the Linux based operating systems and Exam & Bioa€?metric tools used by CDAC to conduct online Exams managed by Centre for Development of Advanced Computing.

Networking Fundamentals (24 Hours)

Networking Basics

Types of communication media

Network Topology

IP addressing, Class and Classless IP and subnet mask

DHCP and DNS

Networking and troubleshooting ( Destination Host unreachable, Request Timed Out ), Network Latency and ita€?s troubleshooting

Ports in Networking

Switches and its troubleshooting [ manageable or un manageable]

VLAN (How to manage network if VLAN created on switch)

PXE Boot (8 Hours)

What is Prea€?Boot Execution Environment

How PXE boot works

How to enable PXE boot in BIOS and setting priority for LAN Boot

UEFI mode in BIOS

Commands in PXE

Connecting PXE Server to internet: Directly through Ethernet or on Wifi network through hotspot

Operating System Administration (CentOS) (24 Hours)

Formatting of Laptops & PC(s) and installing cent OS and BOSS OS

Installation of Bio metric software and its troubleshooting. (.net framework, os compatibility)

Basic of Linux operating System

File system of Linux operating System

Working on Files and Directories

Settings in Cent OS [ Control panel on Linux ]

Commands in Linux
LS, CP, MV, CAT, MAN, WHATIS, WHEREIS, LOCATE, FIND, FILE, RM, MKDIR, RMDIR, CD, PWD, LN AND LN a€“S, GZIP AND GUNZIP, ZIP AND UNZIP, TAR AN ITS VARIANTS, ZCAT DATE,SCP, TIME, WC, TOUCH, ECHO, WHO, FINGER, W, WHOAMI, WHO AM I.

Networking utilities like telnet, ftp, ssh, and sftp, finger

Use of secondary storage devices (Like: a€? Hard disk, Floppy, CDROM) in Linux environment and formatting of these devices

Online Exam Management System (24 Hours)

CIs roles and responsibilities [Both Technical and Nona€?Technical]

Dashboard Management [Monitoring exam dashboard during exam hours for session mapping]

Failover Scenarios [Complete training on failover scenario for Exam Servers]

Processes to be followed during exams

Biometric Process
Detailed training on Biometric Software installation.
Downloading and extracting exam centre data slotwise.
Working of Biometric software, capturing candidate attendance.
Merging attendance of two different pc on single pc.

Attendance process for exam

Process to be followed on mock and actual exam system

Pre and Post exam process
Uploading biometric attendance and response files on Result Processing System (RPS)
Generating backup files at both the exam servers
Scanning physical attendance data

This course will enable the participant to learn and understand the various tool and techniques to recover the lost data of the storages disk/drives and various data sanitization techniques.

Introduction to Data management and storage devices (12 Hours)

Why You Should Learn About Data Management?

"Delete" is Not Really Deleting Your Files!

What is data loss? Causes of data loss

HDD vs SSD

HDD vs SSD, Recovery Point of View

Reasons for HDD/SSD Failure

Signs of HDD/SSD Failure

Failure Types

Check SSD/HDD health

What if Health is not OK!

Data Backup - Introduction

Manual Backup

Folder synchronizing

Clone Partition

Windows/Linux Back Up

Permanent data Deletion (Data Sanitization) (16 Hours)

Introduction and Objectives

Data Sanitization Method

What Files are Erased, Benefits and Features?

Secure Erase

File Eraser and Shredder

Random Data Sanitization Method

Write Zero method

Antia€?Virus Builta€?in Shredder

Shredding Test

File Shredding Using Recovery Software

Partition Free Space Shredding

NUKE your Drive!

Wipe with Cipher

Selfa€?Destruct

Remote Data Deletion

Data Loss Prevention (16 Hours)

Introduction and Objectives

Data Lifecycle

Data in Motion

Data in Use

Data at Rest

Data Breach

Information Security

Security Awareness

Data Loss

Types of Data Loss

Number Involved in Data Loss

How to Respond to Data Loss

Scenarios in Data Recovery

Backup Strategy for Data Recovery

Foundation of DLP

Overview of Data Loss Prevention

Data Loss Prevention

Introduction to Common Themes in DLP

People, Process, Technology

DLP in Common Themes

Need for DLP

Risks in DLP

Areas of Data Loss

DLP vs Data Leakage

Data Destruction (18 Hours)

Introduction and Objectives

Introduction to Data Destruction

Introduction to the Methods of Data Destruction

Delete / Format

Degaussing

Physical Destruction

Software Overwrite

Dead Storage

Importance of Data Destruction

Erasure of Different Types of Media

Introduction and Objectives

Computer Hard Drive

Printer Hard Drive

USB and Other Flash Media

Flash Hard Drive

Zip, Jaz and Rev Disks

Data Recovery (18 Hours)

Introduction

Our Setup

Files Recovery/Accidental Delete a€? Windows Only

Files Recovery/Quick Format a€? Windows Only

Files Recovery a€? Windows/Linux/Mac

How Good Was our Recovery? ALMOST PERFECT!

Partition Recovery

Logical Recovery of disabled hard drives

Using file format recognition tools

Logical recovery via avoiding BIOS interrupts

Motions that unlock the actuator of a drive

Diagnosing the physical recovery of drives

Logic board replacements

Dealing with damaged sectors

Reverse scanning

Working with the Service Area (SA) of a drive

Reviewing data structures with a Hex Editor

Diagnosing "clicking noises"

Mac OS X Data Recovery

Linux Data Recovery

Vista and Recovery of Shadow Copies

Clearing passwords on a password protected drive

Solid state drive recovery

Firmware issues

Sl# Major Modules
1
  • Use & Importance Of Computer
  • Introduction to Window
  • Window Application
  • Note Pad
  • My Computer
  • Typing Tutor
  • Introduction to MS Word
  • Creating File, Save File, Open In MS Word
  • Editing in MS Word
  • View and insert command in MS Word
  • Format and Tool command in MS word
  • Table and font setting in MS Word
  • Print Command in MS Word
  • Introduction to power point
  • Creating slide in Power point
  • Introduction MS Excel
  • Internet surfing and uses
  • Networking (Hardware & Software)
  • Emails - Creation and Communication
  • Online Accounting Application : GEM & CFMS
  • Online Filing of Taxes, TDS & GST Returns
  • Understanding Cyber Security aspects
  • Basics of Cyber threats and frauds
  • Preventive Meajures in Cyber threats and frauds
  • Basic of IT act 2000 And recent Changes/revisions
  • Computer virus
  • Knowledge of computer virus
  • Knowledge of antivirus program
Cyber Crime Investigation

Electronic evidences and relevant changes in Indian evidence act, primary evidence and secondary evidence.

Information technology Act 2003 amended in 2008 with relevant sections of IPC and Cr.p.C.

A brief discussion on storage of data in different storage medium like binary module, slack space deletion, wiping of data, MFT, FAT and NTFS system, digital signatures, Email header analysis.

Acquisition, authentication, chain of custody of digital evidences - detailed discussion with live demonstration of each and every aspect using existing hardwarea€?s and softwarea€?s.

Mobile forensics - Acquisition, authentication and extraction of mobile data for investigation lead, live demonstration.

Admissibility aspect in following cases

(a) Computer hard disk, pen drive memory card and other storage devices

(b) Mobile data, Bluetooth, WIFI dongle and other devices

(c) Analysis of CCTV footage

(d) CDR analysis

(e) Social media data like Facebook, twitter, WhatsApp etc.

(f) Analysis of digital signatures, Incorporation of email header analysis

Important and landmark judgments of The SC and The HC in each and every above-mentioned topic.

Brief discussion on ransom ware, malware, ethical hacking. Live demonstration of ransom ware, malware, ethical hacking analysis etc.

Brief discussion on cyber security, data protection laws regarding UIDAI, bitcoin, blockchain, dark web

Relevance and SOP in Letter rogatory and mutual legal assistance Treaty-Important case study.

Cyber Forensics

What is cyber Forensics? Traditional "Post-Mortem" Forensics

Cyber-Crime & Cyber, Taxonomy of Computer crime scene

Computer Forensic involves, preservation, Goals of forensic analysis

Cyber Forensic procedure, forensic duplication, incident notification checklist, slight diversion, Encoding and Encryption Computer Forensic

Cyber Forensics Tools, Utilities, Forensic Acquisition Utilities (FAU), Concealment Techniques, Forensic Implications

Digital Forensics Laboratory, Forensic Implication, Privacy and cyber forensics

Forensic Value and corporate Exposure

Cyber Forensics and law

Cyber Forensics and the Investigating Criminal Behaviour Electrically Stored Information and Cyber Forensics

Sl# Session Topics to be covered
1 Session - 1
  • What is Cloud
  • History of Cloud Computing
  • How Cloud Computing Works
  • Advantages & Disadvantages
  • Applications for Businesses
  • Cloud Service Providers
  • Cloud Computing Architecture
  • Cloud Computing Terminology
2 Session - 2

    Basics of Linux

  • 1. Basics Commands
  • 2. Apache Server
  • 3. FTP Server
  • Windows Server Basics

  • 1. IIS
  • 2. FTP Server
  • 3. Taking backups using command line tools
3 Session - 3
  • Public Cloud Services a€“ using Amazon Cloud
  • Types, Priced and open source products in the market
  • Overview of Public Cloud vendors
  • Overview of Private cloud products
  • Introduction to Amazon AWS cloud a€“ Pricing, Regions Availability Zones, Types of instances
  • Overview of different services of AWS
  • Consuming EC2 Instance Service from AWS
  • (Creating Linux and Windows Instances from the available AMIs connecting and remote control from the laptop)
  • Consuming EBS block storage service from AWS a€“ Adding volumes to Instances Taking snapshots, creating volumes from snapshots, attaching volumes to running instances
  • Using Elastic IP service a€“Assigning Public IP addresses and connecting from the internet
4 Session - 4
  • Installing additional software components on the instances
  • Automating installations and tasks at the booting time of a instance
  • Using the Load Balancers for load distribution
  • Installing command line tools
  • Using cloud watch service
  • Using Route 53 Service
  • Creating own AMIs
5 Session - 5
  • Virtual Private Cloud - Public and Private Network Scenarios
  • Using AWS S3 service
  • Using Glacier Services
6 Session - 6
  • Creating databases using RDS service
  • IAM a€“Identity Access Management
  • MFA
  • Elastic Beanstalk
  • Cloud Watch
Sl# Topics Sub-Topics
1 Introduction to Machine Learning
  • Introduction To Machine Learning
  • History and Evolution
  • Artificial Intelligence Evolution
  • Find out where Machine Learning is applied in Technology and Science.
2 Machine Learning Categories
  • Supervised Learning
  • Unsupervised Learning
  • Reinforcement Learning
3 Machine Learning Python Packages
  • Data Analysis Packages
  • NumPy
  • SciPy
  • Matplotlib
  • Pandas
  • Slkearn
4 Supervised Machine Learning
  • Regression
  • Classification
  • Generalization, Overfitting and Underfitting
5 UnSupervised Machine Learning
  • Challenges in unsupervised learning
6 Supervised Machine Learning Algorithms
  • k-Nearest Neighbor
  • Linear models
  • Naive Bayes Classifiers
  • Decision trees
  • Support Vector Machines
7 Supervise ML - Classification
  • Classification
8 Supervised ML - Regression
  • Understand how continuous supervised learning is different from discrete learning.
  • Code a Linear Regression in Python with scikit-learn.
  • Understand different error metrics such as SSE, and R Squared in the context of Linear Regressions.
9 UnSupervise ML - Clustering
  • k-Means clustering
10 Dimensionality Reduction, Feature Extraction and
  • Preprocessing and Scaling
  • Applying data transformations
  • Scaling training and test data the same way
  • Principal Component Analysis (PCA)
11 Prepare Your Data For Machine Learning
  • Need For Data Pre-processing
  • Data Transforms
  • Rescale Data
  • Standardize Data
  • Normalize Data
  • Binarize Data
12 Feature Selection For Machine Learning
  • Feature Selection
  • Univariate Selection
  • Recursive Feature Elimination
  • Principal Component Analysis
  • Feature Importance
13 Evaluate the Performance of Machine Learning
  • Evaluate Machine Learning Algorithms
  • Split into Train and Test Sets
  • K-fold Cross Validation
  • Leave One Out Cross Validation
  • Repeated Random Test-Train Splits
  • What Techniques to Use When
14 Machine Learning Algorithm Performance Metrics
  • Algorithm Evaluation Metrics
  • Classi cation Metrics
  • Regression Metrics
15 Spot-Check Classification Algorithms
  • Algorithm Spot-Checking
  • Algorithms Overview
  • Linear Machine Learning Algorithms Spot-check
  • Nonlinear Machine Learning Algorithms Spot-check
16 Automate Machine Learning Workfows with Pipelines
  • Machine Learning Pipelines
17 Supervise ML - Classification
  • Finalize Your Model with pickle
  • Finalize Your Model with Joblib
18 Project Case Study
  • Project Description, Datasets, Coding of Implementation
Sl# Topics Sub-Topics
1 Introduction to Deep Learning
  • A revolution in Artificial Intelligence
  • Limitations of Machine Learning
  • What is Deep Learning?
  • Advantage of Deep Learning over Machine learning
2 Introduction to Neural Networks with Tensor Flow
  • Introduction to Neural Networks
  • Neural Network Architecture
  • Linear Regression example revisited
  • TensorFlow code-basics
  • Tensorflow data types
  • CPU vs GPU vs TPU
  • Tensorflow methods
Sl# Session Topics to be covered
1 Session - 1
  • Core Java Revision
  • Inner Classes,Exception
  • Collections Framework
2 Session - 2
  • Introduction to Android
  • Overview of Mobile Application Development
  • Android Stack Overview of Stack Linux Kernel
  • Native libraries
  • Dalvik Virtual Machine Application Framework
  • Android Platform Components
  • Android Development Tools
3 Session - 3
  • Android Development Environment
  • System requirements
  • Android Studio and SDK installation
  • Creating first Android application
  • Project Structure
  • Activating components
  • Shutting down components
  • Life Cycle of Application
  • Declarative Event Handling
4 Session - 4
  • Android application building blocks
  • Activity
  • Intent
  • Services
  • Content Providers
  • Broadcast Receivers
  • Start Activity
  • Shut down Activity
  • Intenta€?s Extras Object
  • Intent Filter in Manifest File
5 Session - 5
  • XML Vs Java UI
  • Layouts
  • Common UI Component
  • Drag and Drop UI Design
  • Menu Creation,Dialog, Toast, Alert, Time Picker,Date Picker,Custom Dialog
  • Pre-condition and Post-condition
  • Event listeners
  • Event handlers
  • Touch mode
  • Toast Notification
  • Status Notification
  • Applying Style and theme
6 Session - 6
  • Providing Resources
  • Accessing Project Resources
  • Accessing System Resources
  • Handling Run Time changes
  • Resources Type
7 Session - 7
  • Security model
  • File System
  • Multimedia Supported audio formats
  • Simple media playback
  • Supported video formats
  • Simple video playback
  • Internal Storage (Files)
  • External Storage(SD Card)
  • Shared Preferences
8 Session - 8
  • SQLite Databases
  • Notifications
9 Session - 9
  • Map Layout
  • Get user Location
  • Content provider MIME types
  • Searching for content
  • Adding, changing, and removing content
  • Working with content files
10 Session - 10
  • Overview of services in Android
  • Implementing a Service
  • Service life-cycle
  • Bound versus unbound services
  • Android Media Player class
  • Functions of Media Player class
  • Working with Seekbar and Progressbar
11 Session - 11
  • Introduction to Content Provider
  • User Defined Content Provider
  • System Content Provider
  • What are Broadcast Receivers
  • Implementing broadcast receiver
  • System broadcasts and how to use them
  • Role of filters
  • Intent-matching rules
  • Filters in your manifest
  • Filters in dynamic Broadcast Receivers
12 Session - 12
  • How Sensors work
  • Listening to Sensor readings
  • Monitoring and managing Internet connectivity.
  • Managing active connections
13 Session - 13
  • Taking pictures
  • Rendering previews
  • Controlling local Bluetooth device
  • Discovering and bonding with Bluetooth devices
  • Managing Bluetooth connections
  • Communicating with Bluetooth
  • Managing WiFi
  • Firebase Server connectivity
Sl# Topic Topics to be covered
1 Introduction to Programming language
  • Programming language, Types of programming Language
  • Introduction of C, History of C
  • Structure of C Program , Compilation and Execution of Program
2 Data Types and Operators
  • Data Types, Storage Class
  • Type Casting
  • Operators and Types of Operators
  • Operators precedence and Associativity
  • if, if-else, if-else ladder, nested if-else
3 Control Statements and Looping
  • switch, goto
  • while, do-while, for
  • break, continue
  • Nested Loop
4 Array, String
    <
  • Introduction To Arrays
  • Types Of Arrays
  • Declaration and Initialization of string
  • String Handling Function
5 Functions
  • Function and its Components
  • Types of Function
  • Types of Calling , Recursion
  • Function with Array
6 Pointers and Dynamic Memory Allocation
  • Declaration and Initialization of Pointer
  • Pointer Expresion, Scale Factor
  • Constant Pointer , Generic Pointer
  • Pointers with String , Structure and Union
  • Malloc , calloc, free function for dynamic allocation
7 Structure and Union
  • Structure
  • Array of Structure
  • Array within Structure
  • Nested Structure
  • Union
8 File handling
  • File Handling Concept
  • File Opening Modes
  • File Handling Functions
  • File Input/ Output
9 OOPs Concepts
  • Difference between C and C++
  • Discussion on Object oriented concepts
  • Classes and Objects, Access Specifiers, Overloading, Inheritance, Polymorphism
10 Classes and Functions
  • Classes and Objects,Message Passing
  • Constructors and Destructors
  • Inline functions
  • Dynamic initialization of objects
11 Inheritance and Polymorphism
  • Introduction
  • Types of inheritance and their implementaion
  • Virtual base class
  • Constructors in derived class
  • Types of Polymorphism
  • Overloading functions
  • Overloading Operators
  • Friend Functions
12 Exception Handling
  • Exception Handling Introduction
  • Exception handling a€“ throwing, catching, re-throwing an exceptions
  • Specifying exceptions etc.
13 Generic Programming -Templates
  • Generic Programming
  • What is template?
  • Function and Class templates
Sl# Topic Topics to be covered
1 Introduction to Python
  • Introductory Remark about Python
  • A Brief History of Python
  • How Python is different from other languages
  • Python Version
  • Installing Python
  • IDLE
  • Getting Help
  • How To execute Python program
  • Writing your first program
2 Python Basics-1
  • Python coding Introduction
  • Python keywords and Identifiers
  • Python statements
  • Comments in python
  • Getting user input
  • Variables
  • Data types
  • Numbers
  • Strings
  • Lists ,tuples & dictionary
3 Python Basics-2
  • Control flow and syntax
  • The if statement
  • Python operators
  • The while Loop
  • Break and continue
  • The for Loop
  • Pass statement
4 Working with Functions
  • Introduction of Function
  • Calling a function
  • Function arguments
  • Built in function
  • Scope of variables
  • Decorators
  • Passing function to a function
  • Lambda expression
5 Modules and Packages
  • Modules and Packages
  • Importing Modules
  • Standard Modules- sys
  • Standard Modules- OS
  • The dir Function
  • Packages
6 Exception Handling
  • Exception Handling
  • Errors
  • Run Time Errors
  • Handling IO Exception
  • Trya€|.except statement
  • Raise
  • Assert
7 File Handling
  • Introduction to File Handling in Python
  • Files and Directories
  • Writing Data to a file
  • Reading data from a file
  • Additional file methods
  • Working with files
  • Working with Directories
  • The pickle Module
8 OOP's with Python
  • Classes & Objects
  • Introduction of classes and objects
  • Creating classes
  • Instance methods
  • Special class method
  • Inheritance
  • Method overriding
  • Data hiding
9 PyNumPy
  • Scientific Computing with NumPy.
  • N-Dimensional Array Object
  • Array Slicing Methods
  • Array reshapeing methods
  • Numerical routines in NumPy
10 Matplotlib
  • Introduction To Matplotlib
  • Python 2D plotting
  • Plotting with default settings
  • Customizing matplotlib Graphics with colors and line width
  • Generate plots, histograms, power spectra,
  • Generate bar charts, scatterplots
11 Introduction to Pandas
  • Introduction to pandas
  • Pandas data structures and data analysis
12 Project
  • Project Discusssion and Implementation
Sl# Topic Topics to be covered
1 Session-1
  • Java Basics-Overview of Java,Features of Java
  • JDK and its Usage
  • Working with Data Types
  • Structure of Java Class
  • Importing Packages
  • Difference between Object Reference variable and Primitive Variable
  • Java Comments
  • Java Code compilation and Execution
2 Session-2
  • Operators and Control Statements
  • Objects Life Cycle(creation, reassignment, garbage collection: new, finalize)
  • java.lang, java.math
  • Wrapper classes (Boolean, Double and Integer)
3 Session-3
  • Packages and classpath
  • Methods and Encapsulation: Methods, Access Modifiers
  • Method Overloading, Passing Data, Creating Constructors, Immutable Classes
  • Arrays
  • Understanding of String Class, StringBuilder Class, StringBuffer class
4 Session-4
  • Class Inheritance, Abstract Classes, Interface and Implementation classes.
  • Understanding Polymorphism: Object vs Reference, Object Casting
  • Virtual Methods, Method Overriding
  • Enumerations, Auto boxing, and Annotations
5 Session-5
  • Exception-Handling: Basics, Role of Exceptions, Types
  • Using try and catch, Multiple Catch, Nested try (throw, throws, finally)
  • Built-in Exceptions, Runtime Exceptions Checked Exceptions, Errors
  • Creating own Exception Subclasses
6 Session-6
  • Overview of Nested classes
  • Types of Nested Class
  • Complete understanding of static nested class
  • Complete understanding of non-static nested classes/Inner classes
  • Local classes
  • Anonymous classes
  • Anonymous Interface
7 Session-7
  • Java Concurrency: Using threads in Java, Life cycle of thread
  • Advantages and issues
  • Thread class, thread groups
  • The Runnable interface
  • Synchronization, Inter-Thread communication
8 Session-8
  • The java.io Package
  • Input and Output Streams
  • Files
  • Byte Streams and Unicode Character Streams
  • Persistence of objects
  • Object Serialization Methods
9 Session-9
  • Understanding compile-time type-safety
  • Introduction to Generics
  • Defining a Generic class
  • Understanding Type Parameters
  • Sub-typing and Super-typing
  • Using wildcards
10 Session-10
  • Introduction to collections
  • What is a collection framework
  • Benefits of collection framework
  • Interface Hierarchy
  • The java.util package and its implemented members
11 Session-11
  • Introduction of JDBC API
  • JDBC Architecture & Drivers
  • Connection, Statement , PreparedStatement and Result Set interfaces and their relationship to provider implementations
  • Writing JDBC Application along with DAO & POJO Layers
12 Session-12
  • Introduction to swing/awt
Sl# Topic Topics to be covered
1 Introduction to C# Language and OOPS
  • .Net Framework Fundamental
  • What is Object Oriented Programming
  • Features of OOPs Languages.
  • Introduction of C#
2 Inheritence
  • What is Inheritance?
  • Types of inheritance
  • Visibility of inherited members
  • Constructor & Distructor in Inheritance
  • Hiding methods using new modifier
  • Abstract class
  • Abstract method
3 Interface
  • Interface
  • Implementing Interface
  • Interface and inheritance
  • Explicit Interface Implementation
  • Abstract class and interface
4 Collection Framework
  • What Are Collections
  • Collections Implementation
  • System.Collections Namespace
5 Genric
  • Introduction to generic
  • Generic class and methods
6 Delegate and Event
  • What is delegate
  • Delegate declaration
  • Delegate Methods
  • Delegate Instantiation
  • Delegate Invocation
  • Event
7 New language features
  • Auto Emplemented Properties
  • Object Initilizer & Collection Initilizer
  • Lamda Expression
8 Working With SQL Server
  • Introduction to SQL
  • Performing DDL,DML,DQL
9 Working with Data using ADO.NET
  • Introduction to ADO.NET
  • Working with ADO.NET
  • Limitation of ADO.NET
10 Working with Data using Entity Framework
  • Introduction to Entity Framework
  • Evolution of Entity Framework
  • Entity Framework Architecture
  • Setup EntityFramework Environment
  • Create Entity Data Model
  • Querying with EDM
  • Types of Entity in Entity Framework
  • Entity Life Cycle
  • DBContext
  • DBSet Class
  • Approaches to modeling for Entity Framework( Code, Model, Database First)
  • Add Entity
  • Update Entity
  • Delete Entity
11 Introduction to MVC
  • A Brief History of Web Development
  • Traditional ASP.NET Web Forms
  • Evolution of MVC
  • Benefits of ASP.NET MVC
12 MVC Architecture
  • MVC Design Pettern
  • Domain models and Repositories
  • Designing Simple MVC Application
13 Working with Controllers and Action
  • Introducing the Controller
  • Creating a Controller with Icontroller
  • Creating a Controller by Deriving from the Controller Class
  • Receiving Input from Context Objects and Action Method Parameters
  • Producing Output using Action Results
  • Returning HTML by Rendering a View, Passing Data from an Action Method to a View and Performing Redirections
  • Returning Text Data
  • Returning XML Data
  • Returning JSON Data
14 Working with View
  • Overview of ASPX engine
  • Working with the Razor Engine
  • Partial Views
  • Adding Dynamic Content to a Razor View : Inline Code and Partial Views
  • Using Built in HTML Helper
15 Working with Model
  • Templated View Helpers
  • Customizing the Templated View Helper System
  • Using Metadata for Data Values
  • Understanding Model Binding
  • Using the Default Model Binder
  • Manually Invoking Model Binding
16 Model Validation
  • Explicitly Validating a Model
  • Displaying Validation Messages
  • Alternative Validation Techniques
  • Performing Client-Side Validation
17 Working with URLs and Routing
  • About Routing
  • Understanding the Routing Mechanism
  • Adding a Route Entry
  • Using Parameters
  • Using Defaults
  • Using Constraints
18 Filters
  • Introducing the Four Basic Types of Filters
  • Applying Filters to Controllers and Action Methods
  • Using Authorization Filters
  • Using Exception Filters
  • Using Action and Result Filters
  • Using Other Filter Features
  • Using the Built-in Filters
19 Ajax and Client Scripting
  • ASP.NET MVCa€?s Ajax Helpers
  • Using jQuery with ASP.NET MVC
20 Security
  • Authentication
  • Authorization
21 Deployment
  • Preparing an Application for Deployment
  • Understanding the IIS Fundamentals
  • Preparing the Server for Deployment
  • Deploying an Application
Sl# Topic Topics to be covered
1 Introduction to Electronics
  • Introduction to Basic Components
  • Introduction of power suply
  • Inroduction of singnals Singnals
  • Digital systems
  • Inroduction of Digital Circuit
  • Inroduction of Logic Gate
  • Inroduction of Microprocessor &
  • Microcontroller
  • Inroduction of Architechture of
  • Microcontroller
  • Introduction of embedded system.
  • Features of embedded system.
  • Application of embedded system.
  • Introduction to Microcontrollers
  • Microcontroller vs. Microprocessor
  • Which microcontroller to chose and why?
  • Atmega-16 Architecture , Pin configuration
2 EMBEDDED ELECTRONICS DIGITAL(I/O)
  • How microcontroller works?
  • Introduction of development board.
  • How microcontroller is programmed?
  • Introduction to CVAVR (compiler)
  • Basics of embedded C programming
  • Digital Input / Output Ports
  • Demo: Writing first program, giving output,
  • LED glowing/blinking , taking input, controlling
  • LED glow though switch, glowing LED patterns
3 Embedded Electronics-II (LCD, ADC,Timers)
  • Interfacing 16x2 LCD
  • Demo: Printing strings / numbers on LCD.
  • Displaying moving strings.
  • ADC (Analog to Digital Converter)
  • Demo: Displaying ADC values on LCD.
  • Timers, CTC and PWM Mode
  • Demo: using Timers in CTC and PWM Mode
4 Embedded Electronics-III (UART,SPI)
  • UART Communication (Universal Asynchronous
  • Receiver Transmitter)
  • Interfacing computer with microcontroller
  • using UART with IC-MAX232
  • Demo: Data communication b/w
  • microcontroller and computer.
  • SPI Communication (Serial Peripheral Interface)
  • Interfacing two microcontrollers using SPI
  • Demo: Data communication b/w and 2
  • microcontrollers using SPI.
5 Projects in Embedded System
  • Students will be encouraged to implement
  • their own ideas into projects using the KIT
  • provided. Following are few examples
  • Calculator Interfacing switch and LCD
  • Midi-player Interfacing buzzer and keypad
  • Stop-watch Interfacing Switches and LCD
  • Digital Voltmeter Interfacing ADC and LCD
  • Digital Clock Interfacing switches and LCD
  • Electronic Voting Machine Interfacing keypad
  • and LCD
6 INTRODUCTION TO ROBOTICS (HARDWARE)
  • Basic concept of robotics.
  • Various types of robots.
  • Use of robots in industries.
  • Discussion on Robotics.
  • Various parts of Autonomous Robot .
  • Mechanical aspects of robotics.
  • Use of caster wheel.
  • Chassis making for the robot.
7 INTRODUCTION TO MOTORS
  • Introduction to DC, Stepper and Servo Motors
  • Driving DC Motor
  • Speed control of DC Motor using PWM (Pulse
  • Width Modulation)
  • Direction control using H Bridges
  • IC L-293, L-298
  • Speed and Direction control of DC Motor from
  • microcontroller using L-293
  • Demo: Circuit implementation for driving DC
  • Motor from microcontroller using L-293
8 INTRODUCTION TO SENSORS
  • Introduction to IR Sensors
  • Demo: Implementing Digital Sensor and
  • Interfacing with microcontroller to display
  • results on LCD.
9 ROBOTICS/AUTOMATION
  • How to design a Line Following Robot?
  • Assembling all the circuit on the Robot Body.
  • Writing basic control programs.
  • Discussion on Autonomous Robots such as :
  • Line Following Robot
  • Object avoidance Robot
  • Line counting Robot
10 PROJECTS IN ROBOTICS AND AUTOMATION
  • Line Following Robot
  • Object avoiding Robot
  • Never falling Robot
  • Never fall from height robot
  • Robot counts the line.
  • Computer controlled Robot.
Sl# Topic Topics to be covered
1 Session-1
  • Introduction to the term Networking
  • Types of Network
  • OSI Model
  • Client/Server Configuration
  • Topologies
  • Media (Guided Media)
  • IP Address (IPv4, IPv6)
  • VLSM, CIDR, Subnetting (Network/Host)
  • Devices
  • Protocols
  • TCP/IP Applications and Services
2 Session-2
  • Introduction of Linux
  • History of Linux & Unix
  • Installation of RHEL-6 & 7
  • Directory Structure
  • Basic Commands
  • VI Editor
  • Permissions
  • Users & Groups
  • I/O Redirectors
  • Hardlink and Softlink
  • Compression/Decompression, Backup and Scheduling Tasks
3 Session-3
  • Filter commands
  • Finding and processing files
  • Process commands
  • Analyzing logs
  • Exploring virtual file system (Proc)
4 Session-4
  • The module briefs about information security, information security threats and attack vectors.
  • Discusses various hacking concepts, type and phases.
  • Addresses the pre-requisites to become an ethical hacker and also the scope and limitations of ethical hacking
  • Discusses various information security controls such as Information Assurance (IA), Defense- in-path, security policies, physical security, risk management, threat modelling, incident management, AI/ML, Etc.
  • Addresses the penetration testing process and security testing methodology
  • Discusses various information security acts and laws
5 Session-5
  • Discusses footprinting terminologies.
  • Briefs on the footprinting methodologies such as footprinting through search engines, web services, social networking sites, social engineering, website footprinting, Email footprinting, competitive intelligence gathering, whois footprinting, DNS footprinting, etc.
  • Provides an assessment of various footprinting tools used to collect information regarding a system or network.
  • Discusses various footprinting countermeasures to defend against footprinting attacts.
  • escribes various penetration testing steps involved in footprinting.
  • Discusses various information security acts and laws
6 Session-6
  • Discusses network scanning concepts
  • The module briefs on scanning methodology used to identify the hosts, ports, and services in a network that includes:
  • Checking for live systems and ports using various scanning techniques
  • Identifying services using various scanning techniques
  • IDS/firewall evasion techniques
  • Banner grabbing/OS fingerprinting
  • Drawing network diagrams of the vulnerable hosts
  • Provides an assessment of various scanning tools used to collect information regarding hosts , ports, and services in a network
  • Discusses various IP spoofing detection techniques
  • Discusses various penetration testing steps used to scan the network
7 Session-7
  • This module explains the process of extracting user names, machine names, network resources, shares, and services from a system
  • Describes the techniques for enumeration such as NetBIOS Enumeration, SNMP enumeration, LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration, IPsec enumeration, VoIP enumeration, RPC enumeration, and Unix/Linux user enumeration
  • Lists the enumeration tools that can be used to extract the data
  • Discusses various enumeration countermeasures to defend against enumeration attacks
  • Assesses various penetration testing steps used to extract the data from a system
8 Session-8
  • Discusses vulnerability assessment concepts
  • Briefs the working of vulnerability scanning solutions and criteria for choosing those too Is
  • Describes the importance of vulnerability scoring systems in vulnerability assessment
  • Lists various tools used to perform vulnerability assessment
  • Discusses how to generate and analyze vulnerability assessment reports
  • Describes the CEH system hacking process which is classified into three stages: gaining access (by cracking passwords and escalating privileges), maintaining access (executing applications and hiding files), and clearing logs (covering tracks)
9 Session-9
  • Explains the hacking tools (keyloggers, spywares, and rootkits, etc.) that aid the hacking process
  • Discusses various steganography techniques for hiding a secret message
  • Explains various steganalysis methods and steganography detection tools
  • Presents the countermeasures that can be applied at every stage to prevent an attack on the system
  • iscusses various penetration testing steps
10 Session-10
  • Discusses various malware and malware propagation techniques
  • Discusses Trojans and viruses, their types, and how they infect files/systems
  • Lists some of the latest Trojans that are used to infect a system
  • Discusses worms that can compromise a business or systema€?s security
  • Explains the static and dynanic malware analysis process
  • Briefs on the various methods of virus detection
  • Discusses various countermeasures to defend against malware attacks
  • Lists anti-malware tools
  • Assesses various malware penetration testing steps
11 Session-11
  • Briefs about the basic concepts of sniffing network and various types of sniffing
  • Discusses various sniffing techniques such as MAC attack, DHCP attack, ARP poisoning, DNS poisoning etc.
  • Discusses on how to defend against various sniffing attacks
  • Features various sniffing tools and explains how an attacker hacks a network using them
  • Lists a number of countermeasures to defend against sniffing
  • Explains various sniffing detection methods and tools
  • Discusses various penetration testing steps
12 Session-12
  • Introduces social engineering concepts and various attack phases
  • Describes the different types of social engineering with examples
  • Explains various types of insider threats
  • Explains in detail how impersonation on social engineering sites is carried out
  • Briefs how attackers obtain and exploit personally identifiable information and authenticate themselves, in order to impersonate victim
  • Lists various social engineering, insider threats, and identity theft countermeasures
  • Lists anti-phishing tools to detect phishing emails and websites
  • Tabulates common social engineering tactics and proposes combat strategies to prevent such attacks
  • Talks about social engineering penetration testing
13 Session-13
  • This module explains DoS/DDoS attacks, the classification of DoS/DDoS attacks, and various attack techniques
  • Discusses Botnets, the types of bots, and how they infect the system
  • Demonstrates various tools to perform DoS and DDoS attacks
  • Discusses various techniques to detect, prevent, and mitigate DoS/DDoS attacks
  • Briefs about various post-attack forensic methods
  • Explains various techniques to defend against botnets
  • Lists various DoS/DDoS protection tools
  • Explains countermeasures to prevent DoS/DDoS attacks and pen testing steps
14 Session-14
  • This module explains session hijacking concepts
  • Discusses about network and application level session hijacking
  • Explains various session hijacking tools
  • Explains various session hijacking detection methods and tools
  • Explains countermeasures to prevent session hijacking attacks
  • Discusses various approaches vulnerable to session hijacking and their preventative solutions
  • Discusses various penetration testing steps involved in session hijacking
15 Session-15
  • This module gives an introduction to IDS, firewall and honeypot concepts and types
  • Demonstrates various IDS, firewall and honeypot solutions
  • Describes various IDS and firewall evasion techniques
  • Explains various techniques to detect and defeat honeypots
  • Lists various IDS/firewall evasion tools and honeypot detection tools
  • Discusses the countermeasures to defend against IDS/firewall evasion
  • Discusses various penetration testing steps involved in in firewall/IDS penetration testing
16 Session-16
  • Explains open source web server and IIS architecture
  • Discusses various reasons why web servers are compromised
  • Demonstrates various key web server attack techniques and tools
  • Discusses about web server attack methodology and tools
  • Discusses various methods to detect web server hacking attempts
  • Explains countermeasures to prevent web server attacks
  • Explains what is patch management and associated concepts
  • Lists various web server security tools
  • Discusses various penetration testing steps involved in web server pen testing
17 Session-17
  • This module gives an introduction to web application architecture and demonstrates how web applications work?
  • Lists and explains various web application threats and attacks
  • Explains web application hacking methodology
  • Demonstrates various web application hacking tools
  • Discusses countermeasures to defend against web application attacks
  • Demonstrates various web application security tools
  • Discusses various penetration testing steps and tools involved in web application pen testing
18 Session-18
  • This module gives an introduction to SQL Injection and threats from SQL injection attacks
  • Explains various types of SQL injection attacks with examples
  • Explains SQL injection methodology
  • Demonstrates various SQL injection and detection tools
  • Explains various evasion techniques
  • Explains countermeasures to prevent SQL injection attacks
19 Session-19
  • The module gives an introduction to wireless terminologies, types, standards, etc.
  • Discusses the types of wireless encryption and their working
  • Lists and explains various wireless threats
  • Describes wireless hacking methodology
  • Demonstrates various wireless hacking tools
  • Discusses about Bluetooth hacking, threats, and Bluetooth hacking tools
  • Discusses how to defend against wireless attacks
  • Illustrates various wireless security tools
  • Discusses various penetration testing steps and tools involved in wireless penetration testing
20 Session-20
  • This module discusses mobile platform attack vectors in detail and explores app sandboxing issues
  • Discusses Android OS architecture briefly and demonstrates hacking android OS using various tools
  • Illustrates working of various Android Trojans and guidelines for securing Android devices
  • Gives a brief knowledge on jailbreaking iOS, its types, techniques and tools required for jailbreaking
  • Illustrates various iOS Trojans and guidelines for securing iOS devices
  • Discusses about different mobile spyware
  • Explains about mobile device management and solutions for mobile device management
  • Lists guidelines for BYOD security
  • Provides brief knowledge on mobile security guidelines and lists various mobile security tools
  • Discusses various penetration testing steps involved in pen testing for Android phones and I Phones
21 Session-21
  • Introduction to Cyber Security
  • What is a Firewall?
  • Various Implementations of Firewall
  • Expectations of a Firewall Implementation
  • Advantages and Disadvantages of Firewall
  • Types fo Firewalls
22 Session-22
  • Detection and Prevention tools
  • Intrusion detection and prevention tools used for both networks and systems.
  • Anti-Virus/Anti-Malware11:22
  • Snort10:19
  • HIDs and HIPs8:30
23 Session-23
  • This module gives an introduction to cryptography concepts
  • Discusses the types of cryptography and their working process
  • Discusses about ciphers and its types
  • Explains various encryption algorithms with examples
  • Discusses various hashing algorithms and lists various hash calculators
  • Lists and features various cryptography tools
  • Explains Public Key Infrastructure (PKI) and its components
  • Discusses email encryption, disk encryption, and cryptography attacks
  • Briefs various cryptanalysis methods and lists various cryptanalysis tools
  • Explains how to defend against cryptographic attacks
Sl# Topic Topics to be covered
1 Session-1
  • Introduction to web technology
  • Basic Structure of html code
  • Writing First Code, Running & Editing
  • Introduction of properties/attribute & its syntax.
  • font Formatting, Built In Headings
  • img, marquee tags, hyperlink, properties of body & paragraph
  • Ordered list & unordered list
  • Form controls & properties
  • Layout management with table, div, & span
  • Some HTML 5 tags and attributes.
  • video & audio tag
2 Session-2
  • Introduction Of CSS
  • Different ways to use CSS.
  • Different type of selector
  • Responsive Website
  • Grid In bootstrap
  • Some important properties
3 Session-3
  • Introduction to javascript
  • Basic program of javascript
  • Function & Some data types like array, object
  • Event In Javascript
  • Validating form using javascript
  • Jquery Introduction
  • selectors in Jquery
  • Introduction to AJAX
  • Introduction to XMLHttpRequest Object
  • Method and Properties of XMLHttpRequest
  • Implementation of Ajax techniques on webpages
4 Session-4
  • Introduction to PHP for Web Development & Web Applications
  • Installation of tools for working in PHP like XAMPP, WAMP, LAMP
  • Basic Syntax
  • User defined variables and built in variables
  • Super Global Variables
  • Declaring and Using constants
  • Control statement & loop
  • Use of HTML for web design purpose
  • HTML scripts and Forma€?s element
  • Embedding PHP in HTML
  • Interact with server using GUI
5 Session-5
  • Introduction of array
  • Types of array in PHP
  • Defining User functions
  • Passing parameter & return value
  • include & Require
6 Session-6
  • Opening a File
  • Creating and Writing to a file
  • Closing, Deleting a file
  • Reading from file
  • Uploading files
7 Session-7
  • Classes, objects and operations
  • Class attributes
  • Per-class constants
  • Class method invocation
  • Access Modifier
8 Session-8
  • Formatting string
  • Joining & Splitting string
  • Comparing string
  • Array conversion into String
  • Matching & replacing sub string with string function
9 Session-9
  • Using Session in web pages for user authentication
  • Understanding Basic Session functionality
  • What is a Cookie?
  • Setting Cookies with PHP
  • Using Cookies with Sessions
  • Deleting Cookies
  • Starting a Session
  • Registering Session Variables
  • Using Session Variables
  • Destroying the Session Variables and Session
10 Session-10
  • Relational Database Concept and technology
  • Web Database Design
  • Web Database Architecture
  • Creating MySQL Database
  • Creating Database Tables
  • Column Data Types
  • Different form of SQL-DDL,DML,DQL
  • Implementing Insert/Delete/Update and select Query with PHP
https://www.the-viewfinder.de/ http://www.dapinternational.co.uk/ http://www.expatcentrale.nl/ https://www.genuss-leipzig.de/ https://www.erfolgimweb.de/ https://www.bes-t-guides.de/ https://www.carsten-duebbers.de/ https://www.kanis-marketing.de/ https://www.autogaspro.de/ https://www.bult-gww.nl/ https://www.the-viewfinder.de/ https://www.orientpoint.de/ https://www.fedelespain.com/ https://www.erfolgimweb.de/ https://www.pestalozzinet.de/ http://www.ruehle-schreibwaren.de/ http://www.trendart.nl/ https://www.digitelmobile.nl/ https://www.bscmarzahn.de/ http://www.laadidas.com/ https://www.anton-heim.de/ https://www.theaterondersteboven.nl/ https://www.euro-logging.de/ https://www.sonjadrexl.de/ https://www.the-viewfinder.de/ http://www.topleftpixel.de/ https://www.bull-z.com/ https://www.philippjaehnel.de/ https://www.teuto-finanzen.de/ https://www.detektei-schrauwers.de/ https://www.tattoo-you.de/ http://www.z67.nl/ https://www.metallbau-gaertner.de/ http://www.podane.de/ http://www.jovoeg.de/ https://www.heike-habermann.de/ https://www.redlightindex.de/ https://www.apply-pictures.de/ https://www.campdragan.com/ https://www.rude-ruetten.de/ https://www.autobrons.nl/ https://www.carolath-collection.de/ https://www.bull-z.com/ https://www.esmoebel.de/ http://www.ibblaneck.de/ https://www.it4owl.de/ https://www.werners-index.de/ https://www.sport-roehrle.de/ https://www.nicolebeck.de/ https://www.aam-boyer.de/