The theoretical and practical mix of the Post Graduate Diploma in IT Infrastructure, Systems and Security (PG-DITISS) programme has the following focus:
- To understand the Concepts of Data Centre Management, applications security implementation and use various techniques for Ethical Hacking and Cyber Forensics
- To analyze the Threats Detection Techniques, Intrusion Detection and Prevention measures
- To use advanced tools/ decision-making tools/ techniques to analyze the complex problems and get ready to develop such new techniques for the future
- To learn cloud computing, accessing resources and services needed to perform functions with dynamically changing needs thereby implementing cloud privacy and security concepts on cloud platforms to create secure cloud environment
- To analyze and solve problems conceptually and practically from diverse industries, such as government manufacturing, retail, education, banking/ finance, healthcare and pharmaceutical
- To undertake industrial research projects for the development of future solutions in the domain of Information Security to make an impact in the technological advancement
PG-DITISS is targeted towards grooming students in the arena of human-computer interaction and cyber and network security. The objective of this course is to enable the students to understand the concepts of network security and learn the techniques of detecting the attacks and securing a network from internal and external attacks. At the end of the course, the student will be able to recognise a variety of generic security threats and vulnerabilities, understand the principles and practices of cryptographic techniques, identify and analyze particular security problems for a given application and apply appropriate security techniques to solve the security issues.
The educational eligibility criteria for PG-DITISS course is
- Graduate in Engineering or Technology (10+2+4 or 10+3+3 years) in IT / Computer Science / Electronics / Telecommunications / Electrical / Instrumentation, OR
- MSc/MS (10+2+3+2 years) in Computer Science, IT, Electronics OR
- Post Graduate in Mathematics / Statistics, OR
- MCA
- The candidates must have secured a minimum of 55% marks in their qualifying examination.
PG-DITISS course will be delivered in fully PHYSICAL mode. The total course fee and payment details are as detailed herein below:
The total course fee is INR. 90,000/- plus Goods and Service Tax (GST) as applicable by Government of India (GOI).
The course fee for PG-DITISS has to be paid in two installments as per the schedule.
- First installment is INR. 10,000/- plus Goods and Service Tax (GST) as applicable by GOI.
- Second installment is INR. 80,000/- plus Goods and Service Tax (GST) as applicable by GOI.
The course fee includes expenses towards delivering classes, conducting examinations, final mark-list and certificate, and placement assistance provided.
The first installment course fee of Rs 10,000/- + GST on it as applicable at the time of payment is to be paid online as per the schedule. It can be paid using credit/debit cards through the payment gateway. The first installment of the course fees is to be paid after seat is allocated during counseling rounds.
The second installment of the course fees is to be paid before the course commencement through NEFT.
NOTE: Candidates may take note that no Demand Draft (DD) or cheque or cash will be accepted at any C-DAC training centre towards payment of any installment of course fees.
Introduction to communication
system, Overview of Transmission Media, OSI Layers, TCP/IP Models, Router IOS
& Security Device Manager, Managing an Internetworking Router, Overview of LAN
(local area networks), VLAN (virtual local area network), Configuration of
switch, Overview of STP, Discussion of Networking Protocols, IP Addressing
(Fixed Length Subnet Masking, Variable Length Subnet Masking, Classless Inter Domain
Routing), Static Routing and Dynamic Routing (RIP, IGRP, EIGRP, OSPF), Introduction
to NAT, Introduction to IPv6, Introduction of WAN, Infrastructure Security,
Software defined network
i. Windows Operating System and Security Issue (80 Hrs)
Overview of windows operating
system, Installation of windows
operating system, Windows 11/ server 2022 or above, , Overview of Administrative
Tasks and Tools, Windows Server Backup (WSB), Network Configuring, Implementation of infrastructure
of windows networks, Active Directory Domain Services (ADDS), DNS, DHCP and
IPAM, Local Policies, Group Policies, Configuration of IIS web server,
Deploying Windows with WDS, Hyper-V & Storage Solutions, File Server
Resource Manager (FSRM), Network Policy Server (NPS),Network Load Balancing (NLB),
Exchange server, Maintenance and troubleshooting, Power shell Scripting,
Windows Administration using power shell, Background Jobs and Remote
Administration.
ii. Linux Operating System and Security Issue (100 Hrs)
Systems Concepts, Startup
Files, Linux boot process, Installation of Linux(Ubuntu 22 or above / server
cent OS 8 / Debian 12), Basic linux commands, Configuring the GRUB boot loader,
Disk partition, Controlling and managing Services, Repository configuration,
User administration of Linux, Network Configuring, Network Teaming/Load
balancing, Define network route, Using SSH for network communications, Using VNC
for remote management, Network Authentication, Patches & updates, System
Configuration Files, Perform System Management, X configuration server, Package
management, The Samba Server, Configuring a DHCP server, Configuring a DNS
server, Configuring the Apache web server, Maintenance and troubleshooting, SE
LINUX/ APParmor, Basic Service Security, Log Management and NTP, BIND and DNS Security,
Network Authentication: RPC, NIS and Kerberos, Apache security(SSL), Bash
Scripting, Introduction to BASH Command Line Interface (CLI) Error Handling
Debugging & Redirection of scripts, Control Structure, Loop, Variable &
String Conditional Statement, Regular Expressions, Automate Task Using Bash
Script, Security patches, Logging & Monitoring using script.
Introduction to MYSQL, Installing and Configuring MYSQL, Creating and Dropping Database, Queries in MYSQL
ii. Python (50 Hrs)
Introduction to Python,
Python basics, Data Types and variables Operators, Looping & Control
Structure List, Modules Dictionaries, string Regular Expressions, Functions and
Functional Programming, Object Oriented Linux Scripting Environment, Classes,
Objects and OOPS concepts, File and Directory Access Permissions, Libraries and
Functionality Programming, Servers and Clients Web Servers and Client
scripting, Exploit Development techniques. Writing plugins in Python, Exploit
analysis Automation Process, Debugging basics, Task Automation with Python
i. Web Application Security (24 Hrs)
OWASP Top 10 –2021, Injection
and Inclusion, Cross Site Scripting, Injection in stored procedures, Denial of
Service, Buffer Overflows and Input Validation, Access Control, DevOps Security,
API Security, OWASP top 10 Cloud security Risks, Secure CodeReview, SAST and DAST
tools, Case Study on Web Application Framework, use browser-jsguard Firefox
add-on also to detect Malicious and Suspicious Webpages. Web Application
Security Risks, Identifying the Application Security Risks, Threat Risk
Modelling, Other HTTP fields, Data Extraction, Advanced
Identification/Exploitation
ii. Mobile Security (20 Hrs)
Introduction to Android
Architecture, Android File Structure, Android Build Process, Android App
fundamentals, Android Security Model, Device Rooting, Android Debug bridge,
Penetration Testing Tools, OWASP Top 10 Mobile App vulnerabilities, Attacks on Android
Apps, Web based attacks on Android devices, Networks based attacks, Social Engineering
attacks, Overview of Mobile Malware, Android App Analysis
iii. Ethical Hacking (66 Hrs)
Introduction to Ethical Hacking, Identifying Different Types of Hacking Technologies, Understanding the Different Phase Involved in Ethical Hacking, Types of Hacker Classes, Goals of Attackers, Functionality and Ease of Use Triangle, Ethical Hacking procedure, Creating a Security Evaluation Plan, Foot-printing and Social Engineering, Tracerouting, Network Scanning and Vulnerability Scanning, SYN, Stealth, XMAS, NULL, IDLE and FIN Scans, TCP Communication Flag Types, Banner Grabbing and OS Finger printing Techniques, Using Proxy servers in launching an Attack, Http tunneling Techniques, IP Spoofing Techniques, Enumeration, Password-cracking Techniques, Redirecting the SMB Logon to the attackers, SMB Redirection, SMB Relay MITM Attacks and Countermeasures, NetBIOS DOS Attacks, DDos Attack, Password-Cracking Countermeasures, Active/Passive online Attacks, Offline Attacks, Keyloggers and other Spyware Technologies, Trojans and Backdoors, Overt and Covert Channels, Reverse-connecting Trojans, Netcat Trojan, Indications of a Trojan Attacks, Wrapping, Trojan Construction Kit and Trojan Makers, The countermeasure Techniques in Preventing Trojans, Trojan Evading techniques, System File Verification, Virus and a Worm, Antivirus Evasion Techniques, Virus Detection Methods, Protocols Susceptible to Sniffing, Active and Passive Sniffing, ARP Poisoning, Ethereal Capture and Display Filters, MAC Flooding, DNS Hacking, DNS Spoofing Techniques, Sniffing Countermeasures, Types of DOS Attacks, Smurf Attacks, SYN Flooding, Spoofing vs Hijacking, Types of Session Hijacking, Steps to perform session Hijacking, Prevention of session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web- Based Password Cracking Techniques, Wireless Hacking, WEP, WPA Authentication Mechanisms and Cracking Techniques, Wireless Sniffers and Locating SSIDS, Wireless hacking Techniques, Methods used to secure Wireless Networks, IDSs, Honeypots and Firewalls.
Cybersecurity
Challenges in Organizations, Compliance and Regulations for Cybersecurity
,Compliance Basics, Compliance Frameworks and Industry Standards, National
Institute of Standards and Technology (NIST) , General Data Protection
Regulation (GDPR), International Organization for Standardization (ISO) 2700x,
SOC Reports, SOC Reports - Auditor Process Overview, Health Insurance
Portability and Accountability Act (HIPAA), Payment Card Industry Data Security
Standard (PCI DSS),COBIT Framework, Center for Internet Security (CIS) Critical
Security Controls, ITAA 2008, Digital Personal Data Protection Act 2023
Security Fundamentals,
Firewalls, Types of Firewalls, Linux firewall-Iptables, Overview of NextGen
Firewall, Limitations of firewall, Intrusion Detection and Prevention, Intrusion
risks, Security policy, Monitoring and reporting of traffics, Traffic shaping,
Investigating and verifying detected intrusions, recovering from, reporting and
documenting intrusions, Define the Types of intrusion Prevention Systems,
Intrusion prevention system basics, Limitations of Intrusion Prevention System,
Spoofing Detection & Prevention, DDos & Dos mitigation techniques, Qos Policy,
Introduction of Web Application Firewall, Packet Signature and Analysis,
Virtual Private Networks, Deploy and managing VPN, VPN Performance tuning and error
handling, DMZ and virtual host, Unified Threat Management, Threat Hunting
Model, Introduction of Reverse proxy and policies.
Introduction to Cyber
Crime and Cyber Forensics, Basic Forensic Principles, Computer Forensics, Types
of Cyber Forensics Techniques, Cyber Forensics Procedures, Detecting Incidents,
Handling Evidence, Encoding and Encryption, Cyber Forensics Tools: Sysinternals
Suite, FTK Forensics Tool kit, FTK Imager, OSF, Hex, Cyber check Suite, Live system
forensics, Linux Forensics, An introduction to Mobile forensics.
Understand Basic
Encryption Concepts, File Encryption, Encryption Folders (Graphical/ using
cipher), Cryptographic Fundamentals, Cryptographic Ciphers (Symmetric and
Asymmetric), Protocols (History, Usage, Key generation, Ciphering message),
Symmetric Key Encryption (DES, AES, RC5), Asymmetric Key Encryption (RSA, ECC),
Diffie-Hellman Key Exchange, Attacks against encryption, Cryptographic issues,
Secure Hashing Methods, SHA Secure Hash algorithm, HMAC, PKI Fundamentals,
Digital Signature, Digital Certificate, CA, Trust Model, Certificate Issuance
Process, Certificate Revocation (CRL, OCSP), Types and Classes of Certificate,
Introduction to Aadhaar and e-Sign, Time stamping Services, Public Key
Cryptography Standards, PKCS, FIPS 140-2, Strong Authentication, Single Factor
and Multi-factor authentication, Single Sign-on Solutions, Open-ID and OAUTH,
Graphical Passwords, Authentication Protocols, FIDO Authentication, Zero Trust
Architecture, Securing Websites and Emails, SSL, TLS, PGP and S/MIME.
ii. DevOps (74 Hrs)
Storage area network, Virtualization, Docker, kubernetes, Introduction of Virtual Private Cloud (VPC), Private Cloud Setup, Automation Using Cloud API, Server Orchestration, Cloud Logging and monitoring, Introduction to DevOps, Docker, kubernetes, Dockerswam, Container, CI/CD Pipelines, Version Control system, containerization with Docker, GitHub, AWS, Micro Service Deployment, Terraform, Ansible.
After doing this
course students can work as:
- System
Administrator
- Network
Security Professional
- Web Security Tester
- Information
Security Analyst
Karnataka 560100
Andhra Pradesh 500016
Maharashtra 411008
Maharashtra 411044
Maharashtra 411057
Q. What is the Eligibility for PG-DITISS?
A. The eligibility criteria for PG-DITISS design is candidate holding any one of the following degrees:
- Graduate in Engineering or Technology (10+2+4 or 10+3+3 years) in IT / Computer Science / Electronics / Telecommunications / Electrical / Instrumentation. OR
- MSc/MS (10+2+3+2 years) in Computer Science, IT, Electronics. OR
- Post Graduate in Mathematics or allied areas, OR
- MCA
- The candidates must have secured a minimum of 55% marks in their qualifying examination.
A. The selection process consists of a C-DAC Common Admission Test (C-CAT).
Q. What is Fee of course?
A. The fees for the PG-DITISS course is Rs. 90,000/- (Rupees Ninety Thousand only) plus GST as applicable by GoI.
Q. When the course does commence?
A. Twice in a year in the month of August and March. Admission Process will start in month of May and December every year.
Q. Duration of the course?
A. The course duration is 24 weeks approximately full-time course with 900 hours Theory +Practical+ Project Work.
Q. Infrastructure Facilities available?
A. Fully equipped classrooms capacity to accommodate students and state-of-art labs to explore you computing skills.
Q. Hostel & Canteen facility available?
A. Accommodation for out station candidates is facilitated by some of centres. Please refer Admission Booklet.
Q. Bank loan assistance for the other centers?
A. Facility of educational loans is provided for the selected candidates, which is available at all nationalized banks.
Q. What is the medium of instruction for PG Diploma Courses?
A. The medium of instruction for the PG Diploma Courses is English.
Q. Revision of the course contents, is it every six months?
A. The course contents are revised according to the real world needs and when found relevant to the market demands.
Q. Do you have centralized placement cell?
A. Yes we do have a centralized placement programme where the respective centers actively coordinate the task of organizing the campus interviews for all the students.
Q. What is the value of the course in the international market?
A. The course has been a trend-setting course due to its unique curriculum and the opportunities that it generates; hence it gives the edge over above for the students and gives a international edge.