PGDCoursesBrochures

Logo
Separator

Diploma in IT Infrastructure, Systems and Security (e-DITISS)



e-DITISS is targeted towards grooming students in the arena of human-computer interaction and cyber and network security. The objective of this course is to enable the students to understand the concepts of network security and learn the techniques of detecting the attacks and securing a network from internal and external attacks. At the end of the course, the student will be able to recognise a variety of generic security threats and vulnerabilities, understand the principles and practices of cryptographic techniques, identify and analyze particular security problems for a given application and apply appropriate security techniques to solve the security issues.

·  Graduate in Engineering in IT, Computer Science, Electronics, Telecommunications, Electrical, Instrumentation, OR

·  Post Graduate Degree in Computer Science, IT, Electronics, Mathematics, Statistics OR

. MCA

The candidate must have minimum of 55% in qualifying degree.

The course fees of e-Diploma in IT Infrastructure Systems and Security (e-DITISS) course is Rs. 50,000 plus GST currently @ 18%.

The course fees is to be paid in the two installments. The first installment is Rs. 10,000/- plus GST currently @ 18% to be paid after the allocation of seats. The second installment is Rs. 40,000/- plus GST currently @ 18% to be paid before the commencement of course.
  

Introduction to communication system, Overview of Transmission Media, OSI Layers, TCP/IP Models, Router IOS & Security DeviceManager, Managing an Internetworking Router, Overview of LAN (local area networks), VLAN (virtual local area network), Configuration of switch, Overview of STP, Discussion of Networking Protocols, IP Addressing (Fixed Length Subnet Masking, Variable Length Subnet Masking, Classless Inter Domain Routing), Static Routing and Dynamic Routing (RIP, IGRP, EIGRP, OSPF), Introduction to NAT, Introduction to IPv6, Introduction of WAN, Infrastructure Security

  

Concepts of OS

Architecture of Operating System, Process Management, Memory Management, File system Management, Network Operating System

Windows Operating System and Security Issue

Overview of windows operating system, Overview of Administrative Tasks and Tools, Installation of windows operating system, Windows 10/ server 2016 core, Deploying Windows with  WDS, Network Configuring, Implementation of infrastructure of windows networks, File system and disk management, Registry settings, System Configuration Settings, Implementing and administering Active Directory, User accounts and groups in an Active Directory Domain, Maintenance and troubleshooting, Microsoft Windows os Licensing model, Power shell Scripting, Windows Administration using power shell, Background Jobs and Remote Administration.

Linux Operating System and Security Issue

Systems Concepts, Startup Files, Linux boot process, Installation of Linux, Basic linux commands, Configuring the GRUB boot loader, Disk partition, Controlling and managing  Services, Repository configuration, User administration of Linux, Network Configuring, Network Teaming/Load balancing, Define network route, Using SSH for network communications, Using VNC for remote management, Network Authentication, Patches & updates, System Configuration Files, Perform System Management, X configuration server, Package management, The Samba Server, Configuring a DHCP server, Configuring a DNS server, Configuring the Apache web server, Maintenance and troubleshooting, SE LINUX/ APParmor, Basic Service Security, Log Management and NTP, BIND and DNS Security, Network Authentication: RPC, NIS and Kerberos, Apache security(SSL), Bash Scripting, Introduction to BASH Command Line Interface (CLI) Error Handling Debugging & Redirection of scripts, Control Structure, Loop, Variable & String  Conditional Statement, Regular Expressions, Automate Task Using Bash Script, Security patches, Logging & Monitoring using script.

Security Concepts

160 Hours  
  

MySQL

Introduction to MYSQL, Installing and Configuring MYSQL, Creating and Dropping Database, Queries in MYSQL, Web Application Security Risks, Identifying the Application Security Risks, Threat Risk Modelling, Other HTTP fields, Data Extraction, Advanced Identification/Exploitation

Web Application Security

OWASP Top 10 –2017, Injection and Inclusion, Cross Site Scripting, Injection in stored procedures, Denial of Service, Buffer Overflows and Input Validation, Access Control, DevOps Security, API Security, OWASP top 10 Cloud security Risks, Secure CodeReview, SAST and DAST tools, Case Study On Web Application Framework, Use browser-jsguard Firefox add-on also to detect Malicious and Suspicious Webpages.

Mobile Security

Introduction to Android Architecture, Android File Structure, Android Build Process, Android App fundamentals, Android Security Model, Device Rooting, Android Debug bridge, Penetration Testing Tools, OWASP Top 10 Mobile App vulnerabilities, Attacks on Android Apps, Web based attacks on Android devices, Networks based attacks, Social Engineering attacks, Overview of Mobile Malware, Android App Analysis

Python

Introduction to Python, Python basics, Data Types and variables Operators, Looping & Control Structure List, Modules Dictionaries, string Regular Expressions, Functions and Functional Programming, Object Oriented Linux Scripting Environment, Classes, Objects and OOPS concepts, File and Directory Access Permissions and Controls Socket, Libraries and Functionality Programming, Servers and Clients Web Servers and Client scripting, Exploit Development techniques. Writing plugins in Python, Exploit analysis Automation Process, Debugging basics, Task Automation with Python

Ethical Hacking        

Introduction to Ethical Hacking, Understanding Ethical Hacking Terminology, Identifying Different Types of Hacking Technologies, Understanding the Different Phase Involved in Ethical Hacking, Types of Hacker Classes, Ethical Hackers and Crackers, Goals of Attackers, Security, Functionality and Ease of Use Triangle, Ethical Hacking procedure, Creating a Security Evaluation Plan, Foot-printing and Social Engineering, Tracerouting, Port Scanning, Network Scanning and Vulnerability Scanning, SYN, Stealth, XMAS, NULL, IDLE and FIN Scans, TCP Communication Flag Types, Banner Grabbing and OS Finger printing Techniques, Using Proxy servers in launching an Attack, Http tunneling Techniques, IP Spoofing Techniques, Enumeration, Password-cracking Techniques, Cracking Windows Passwords, Redirecting the SMB Logon to the attackers, SMB Redirection, SMB Relay MITM Attacks and Countermeasures, NetBIOS DOS Attacks, DDos Attack, Password-Cracking Countermeasures, Active/Passive online Attacks, Offline Attacks, Keyloggers and other Spyware Technologies, Trojans and Backdoors, Overt and Covert Channels, Types of Trojans, Reverse-connecting Trojans, Netcat Trojan, Indications of a Trojan Attacks, Wrapping, Trojan Construction Kit and Trojan Makers, The countermeasure Techniques in Preventing Trojans, Trojan Evading techniques, System File Verification, Virus and a Worm, Antivirus Evasion Techniques, Virus Detection Methods, Protocols Susceptible to Sniffing, Active and Passive Sniffing, ARP Poisoning, Ethereal Capture and Display Filters, MAC  Flooding, DNS Spoofing Techniques, Sniffing Countermeasures, Types of DOS Attacks, Smurf Attacks, SYN Flooding, Spoofing vs Hijacking, Types of Session Hijacking, Steps to perform session Hijacking, Prevention of session Hijacking, Hacking WebServers, Web Application Vulnerabilities, Web-Based Password Cracking Techniques, Wireless Hacking, WEP, WPA Authentication Mechanisms and Cracking Techniques, Wireless Sniffers and Locating SSIDS, Wireless hacking Techniques, Methods used to secure Wireless Networks, IDSs, Honeypots and Firewalls.

  

Security Fundamentals, Firewalls, Types of Firewalls, Overview of NextGen Firewall, Limitations of firewall, Intrusion Detection And Prevention, Intrusion risks, Security policy, Monitoring  and reporting of  traffics, Traffic shaping, Investigating and verifying detected intrusions, Recovering from, reporting and documenting intrusions, Define the Types of intrusion Prevention Systems, Intrusion prevention system basics, Limitations of  Intrusion Prevention System, Spoofing Detection &Prevention, DDos & Dos mitigation techniques, Qos Policy, Introduction of Web Application Firewall, Packet Signature and Analysis, Virtual Private Networks, Deploy and managing  VPN, VPN Performance tuning and error handling, DMZ and  virtual host, Introduction of Reverse proxy and policies   

  

Understand Basic Encryption Concepts, File Encryption, Encryption Folders (Graphical/ using cipher), Cryptographic Fundamentals, Cryptographic Ciphers (Symmetric and Asymmetric), Protocols (History, Usage, Key generation, Ciphering message), Symmetric Key Encryption (DES, AES, RC5), Asymmetric Key Encryption (RSA, ECC), Diffie-Hellman Key Exchange, Attacks against encryption, Cryptographic issues, Secure Hashing Methods, SHA Secure Hash algorithm, HMAC, PKI Fundamentals, Digital Signature, Digital Certificate, CA, Trust Model, Certificate Issuance Process, Certificate Revocation (CRL, OCSP), Types and Classes of Certificate, Introduction to Aadhaar and e-Sign, Time stamping Services, Public Key Cryptography Standards, PKCS, FIPS 140-2, Strong Authentication, Single Factor and Multi-factor authentication, Single Sign-on Solutions, Open-ID and OAUTH, Graphical Passwords, Authentication Protocols, FIDO Authentication, Zero Trust Architecture, Securing Websites and Emails, SSL, TLS, PGP and S/MIME

  

Data Center Management: Introduction to DCM, Data Center design, Data Center Security Procedure, Server Security, Storage area network, Virtualization, Docker, kubernets, Introduction of Virtual Private Cloud (VPC), Private Cloud Setup, Automation Using Cloud API, Server Orchestration, Cloud Logging and monitoring, DevOps.

   .

Project

60 Hours  
   .

Topic

Reference Book

No. of Questions

English

Any High School Grammar Book (e.g. Wren & Martin)

35

Quantitative Aptitude & Reasoning

Quantitative Aptitude Fully Solved (R. S. Aggrawal)

Quantitative Aptitude (M Tyara)

Barron’s New GRE 2016

Computer Fundamentals

Foundations of Computing (Pradeep Sinha & Priti Sinha)

40

Operating Systems

Operating System Principles (Silberschatz, Galvin, Gagne)

C Programming

C Programming Language (Kernighan & Ritchie)

Let Us C (Yashavant Kanetkar)

Data Structures

Data Structures Through C in Depth (S. K. Srivastava)

OOP Concepts

Test Your C ++ Skills (Yashavant Kanetkar)

C-DACs - Advanced Computing Training School
Address
:
No. 68, 4th Cross, Electronic City Phase 1, Hosur Road, Opp.BSNL Telephone Exchange Bengaluru
Karnataka 560100
Telephone
:
+91-80-28523300
Contact Person
:
Ms Reshma (Admission), Mr Mohamed Ashfaqu(Hostel)
Fax
:
+91-80-28522590
e-Mail
:
course_blrec[at]cdac[dot]in(Admission), mohammad[at]cdac[dot]in(Hostel)
Courses
:
PG-DAC, PG-DITISS, e-DAC, e-DITISS
C-DACs - Advanced Computing Training School
Address
:
Plot No. 6 & 7, Hardware Park, Sy No. 1/1, Srisailam Highway, Pahadi Shareef Via Keshavagiri (Post), Hyderabad
Andhra Pradesh 500016
Telephone
:
040-2373 7127
Contact Person
:
Mr. Sharanabasappa , Senior Technical Officer
Fax
:
040-2374 3382
e-Mail
:
cdachyd[at]cdac[dot]in
Courses
:
PG-DAC, PG-DVLSI, PG-DESD, PG-DSSD, e-DASSD, PG-DASSD, e-DESD, e-DAC, e-DITISS
C-DACs - Advanced Computing Training School
Address
:
Plot No. 6 & 7, Hardware Park, Sy No. 1/1, Srisailam Highway, Pahadi Shareef Via Keshavagiri (Post), Hyderabad
Telangana 500005
Telephone
:
040-23737127
Contact Person
:
Mr.Sharanabasappa, Senior Technical Officer
Fax
:
040-2374 3382
e-Mail
:
cdachyd@cdac.in
Courses
:
PG-DITISS
C-DACs - Advanced Computing Training School
Address
:
B-30, Sector 62, Institutional Area, Noida
Uttar Pradesh 201307
Telephone
:
0120-3063371-73
Contact Person
:
Mr. V.K. Sharma
Fax
:
0120-3063374
e-Mail
:
cdacacts-noida[at]cdac[dot]in
Courses
:
PG-DAC, PG-DVLSI, PG-DGi, PG-DESD, PG-DMC, PG-DITISS, PG-DAI, e-DESD, PG-DBDA, PG-DIoT, e-DAC, e-DBDA, e-DAI, e-DITISS
C-DAC's Advanced Computing Training School
Address
:
C-DAC Innovation Park Sr. No. 34/B/1 Panchvati, Pashan Pune
Maharashtra 411008
Telephone
:
18008430222
Contact Person
:
Mr. Parimal Wagh
Fax
:
NA
e-Mail
:
acts[at]cdac[dot]in
Courses
:
PG-DAC, PG-DVLSI, PG-DESD, PG-DITISS, PG-DAI, e-DESD, PG-DBDA, PG-DIoT, e-DAC, e-DBDA, e-DAI, e-DITISS, PG-DHPCSA
Institute for Advanced Computing and Software Development
Address
:
Dr. D.Y. Patil Educational Complex, Sector 29, Near Akurdi Railway Station, Pradhikaran, Nigdi Pune
Maharashtra 411044
Telephone
:
020 – 27659509, 27652794
Contact Person
:
Wg. Cdr. P.V.C. Patil (Retd)
Fax
:
020 –27650229
e-Mail
:
ittrg[at]iacsd[dot]com
Courses
:
PG-DAC, PreDAC, PG-DITISS, DASDM, PG-DBDA, e-DAC, e-DBDA, e-DITISS
C-DACs - Advanced Computing Training School
Address
:
Knowledge Resource Centre (KRC) C-DAC, Technopark Campus, Kariyavattom P O Thiruvananthapuram
Kerala 695581
Telephone
:
0471-2781500, 8547882754
Contact Person
:
Mr.Balan C, Head(Training), KRC
Fax
:
e-Mail
:
krct[at]cdac[dot]in
Courses
:
PG-DESD, PG-DITISS, e-DESD, e-DAC, e-DITISS