+91 79 -6617 2266 / 2288 +91 99099 71792

WEEK - 1-3

Computer Fundamentals
  • Identification of Different parts of a Computer System
  • Turning a computer system on and off
Windows OS
  • Identifying different Desktop Icons, My Computer, My Documents
  • Changing Desktop Backgrounds, Mouse Pointer, Screen Saver
  • Notepad, Wordpad, MS paint
MS Word
  • Document formatting options
  • Tables, Bullets and Numbering
  • Font, Alignment, paragraph formating
  • Insert Picture, Clipart, Shapes, WordArt
  • Header & Footer, Text Box
  • Page Layout, Mail Merge
  • Spelling & Grammar
MS Excel
  • Cell Formatting Options
  • Formulas and Functions
  • Charts
  • Sort, Filter, What if Analysis, Grouping
MS Power Point
  • Creating Slide Show by using Animation Technique.
  • Slide Master.
  • Clip Art. Picture Editing

WEEK - 4-8

Internet Concepts
  • Opening website and browsing. Writing, reading and sending emails, Connecting to Internet.
  • Browsing popular sites and using search engines.
Introduction to HTML
  • Using HTML editor, crating simple HTML documents, containing heading, body text and comments
  • creating web pages with all the features and effects.
  • converting MS Office documents to HTML.
  • Creation of web pages containing tables of different formats.
  • Practice on modification of tables. Creating Lists using Bullets and Numbers.
  • Using HTML for creating web pages with links to other pages different points of a page and link to tables and list.
  • Creating webpages containing images,
  • Animation graphics using GIF animator or some other software.
  • Inserting Images, Video & Sound effects. Marquees of Scrolling text.
  • Setting and releasing different types of Frames.
  • Using HTML to design diffrent types of forms, incorporating different type of boxes, buttons, menus and fields.
  • Processing the form.
  • Designing web pages with taught elements along with style elements for different characteristics.
  • Practice cascading style sheets.
  • Creating animation in the web pages using layers.
Introduction to Web
  • Overview of Internet and WWW. Web pages, home pages, Web browsers, search Engines, web sites and servers.
Introduction to HTML
  • HTML features and uses, structure of an HTML document, adding body text and comments.
  • Using all the features, colours and other effects of HTML. Converting MS Office documents to HTML.
  • Tables & Lists in HTML documents.
  • Links: Creating links to local range, other pages, specific part of page, electronic mail.
  • Images: Including icon and picture in HTML document. Creation of animated GIF. Sizing the pictures.
Multimedia Objects
  • Adding external Images, Video, and sound file including device independent {DVI} files. Add marquees of scrolling text.
  • Setting and releasing frames. Using one frame to index another. Creating floating frames, borderless frames and frames with borders.
  • Creating basic, forms. Adding text box, check box, radio buttons, pull-down menus, single-line text field and password field. Processing the forms.
Style sheets
  • Creating style sheets to other HTML element, altering different characteristics and features.
  • cascading HTML style sheets.
  • Creating layers using style sheet syntax. Create animation.
  • Theory related to practical

WEEK - 9-13

Computer Graphics
  • Know the difference between Vector Graphics and Raster Graphics. Know the difference between Screen Graphics. Understand the following formats :- .pdf, .eps, .svg, .svgz, .psd, mp, .gif. .jpg, .pcx, .pct, .png, .raw, .sct, .tga, .tiff, .vst.
Design Principles & Color Harmony
  • ooooooo. Introduction to colors
  • ppppppp. Primary and Secondary in both RGB & CMYK schemes/modes.
  • qqqqqqq. Importance of each primary and secondary color.
  • rrrrrrr. Proper Application of colors.
  • sssssss. Analyze colors applied in different print media.
  • ttttttt. Visualize look and feel of a print or a web to apply colors
Web Design Basics
  • Open web pages using URL and domain name. save web pages. Store web pages as favorites. Use search engines to find sites offering free Email services. Create Email account. Send Email. Copy received Email. Copy/Print received mail. Send Email with attachment. Open/ Download attachments. Set-up for Chat. Practice chatting. Practice chatting with Video. Join News group.
  • Study different fonts and typo issues with Web design Use of multi-lingual Software
Computer Graphics

8. understanding how images are formed, image file formats and their properties

Design Principles & Color Harmony

9. Understanding Design principles and color theory
10. Knowledge of Internet, Web design techniques and study of designs as per content
11. GIGW, OWSP, GCIG Concepts
12. Understanding the use of various fonts and type issues with Web design
13. Understanding design issue in Web medium and visualizing intuiting web designs

WEEK - 14-18

Digital Imaging Working with Image in Photoshop.
  • Working with Palettes, i.e., layers palette, navigator palette, info palette, Styles palette, History palette, Actions Palette, Tool preset palette, Channels palette and Path palette. Working with layers. Photo editing.
  • Image sdjustment options-lables, Auto lables, Auto contrasts, Curves, Color balance, Brightness / Contrast, Posterize, Variations.
  • Preparing the file and Work area. Creating different shapes.
  • Creating three Dimensional effects using Layers. Working with the magic wand tool and lasso tool. Creating images using Symbol Sprayer Tool. Edit the images using options of Warp Tool. Using Dodge tool, Burn tool, Sponge Tool and Clone Stamp Tool.
  • Editing Selections. Creating images and giving special effects using Filters. Using layer Styles. Produce an image by mixing two or more different images using layer Masking & Vector Masking.
Web Publishing using Dreamweaver
  • Design Professional web Layouts, Author and Publish websites on the internet using Dreamweaver

27. Introduction to various versions, concepts and applications of Photoshop
28. Understanding the Print Industry, printing technology and uses
29. Understanding Designs principles and color theory
30. Understanding the use of various fonts and typo issues with Web design
31. Understanding Designing standards, print layout Design and creative visualization for intuitive layouts

Understanding and using the computer and Operating System

WEEK - 19-23

  • Creating scripts for Web for Dynamic websites
  • Validation on Forms
VB Script
  • Creating scripts for Web for Dynamic websites
  • Validation on Forms
  • Using PHP & MySQL to create dynamic web pages enabled with forms and database usage
  • ODBC Concepts for Connection with Database with PHP.
  • Difference between Server Side & Client Side Script.
  • Hosting & Deploying Website.
Web Design Basics
  • Getting connected using FTP. Down loading software.
  • Upgrading Browser versions.
  • Using Telnet to get connected to remote computer.
Web Design in Flash with scripting
  • About Flash and General overview – Stage and Work area of Flash, using guides, grid & rulers.
  • Using frames and key frames, Working with timeline. Using layers, Using Guide layers. Drawing in Flash, to use a gradient fill.
  • Importing Artwork, Video and Audio. Different file formats in Video & Audio. Flash Compatible Audio & Video file formats Create interactive animations for learning medium
  • Programming simple interactive applications using Action Scripting
  • Creating Banners, Logo Animation, simple 2D animation content used in Web and E-learning medium
Web Layout Design Standards
  • Study design issues in Web medium and visualizing intuiting web designs
Cyber Security

Practical Related to Theory
  • Creating scripts for Web for Dynamic websites using java Script
  • Creating scripts for Web for Dynamic websites using VB Script
  • Using ASP to create dynamic web pages enabled with forms and database usage
  • Create interactive animations and applications for web using Flash
  • Theory related to Practical
Cyber Security
Module 1 Overview of information Security
  • Understanding Information Security
  • Need of the Information security
  • Basics of IS (CIA)
  • History and evolution of IS
  • Dimensions of Information Security
  • Information Security and Cyber Security relationship
  • Why Care About Security?
  • Challenges to Information Security
  • Benefits of Information of Security
  • Understanding techniques to enforce IS in an organization
  • Identifying tools to enforce Information Security
  • Identifying frameworks to enforce Information Security
Module 2 Overview of Security threats
  • Overview of Information Security Threats
  • Types of threats – DdoS, Malicious codes, Espionage, etc
  • Identification of Threats
  • Probing of threats
  • Scanning of threats
  • Modus Operandi
  • Sources of Threats
  • External threats
  • Internal threats
  • Best Practices or Guidelines used to Identify Threats
  • Conduct regular education and awarness trainings for employees and third parties
  • Best Practices or Guidelines used in mitigation of threats
  • Deploying up to date technology
  • Maintaining Systems and Procedures
  • Educating Users
  • Conducting regular education and awarness training for employees and third parties
  • Collaborate with peers and experts through different forums to understand contemporary issues and solutions
Module 3 Information Security Vulnerabilities
  • Why do Information Security Vulnerabilities exists
  • Types of Technical Vulnerabilities
  • Types of Native Vulnerabilities
  • Understanding Security Vulnerabilities
  • Flaws in software or protocol Designs
  • Weaknesses in How protocols and software Are Implemented
  • Weaknesses in System and Network Configurations
  • Weaknesses in Web or cloud applications
  • Weaknesses in online e-transactions
  • Browser Security and role of cookies and pop-ups
  • Security holes in Browser, Web Applications, OS, and Smartphones
  • Identifying role of Social sites and media in cyber security and vulnerability
  • Understanding Vulnerability Assessment Tools and Techniques
  • Techniques to Exploit Vulnerabilities
  • Techniques to Fix the Vulnerabilities
  • Identify security vulnerabilities on a regular basis using requisite tools and processes.
  • How to fix the security gaps and holes
  • Identifying Liabilities of service providers, software vendors, Software authors, system owners, and third parties
  • Best Practices and Guidelines to mitigate security Vulnerabilities
Module 4 Risk Management
  • What a Risk?
  • Relationship between Threat, Vulnerability, and Risk
  • What Is the Value of an Asset?
  • What Is a Threat Source/Agent?
  • Example of some Vulnerabilities that Are Not Always Obvious
  • What a Control?
  • What Is Risk Likelihood and consequences?
  • What Is Impact?
  • Control Effectiveness
  • Risk Management
  • Purpose of Risk Management
  • Risk Assessment(Phases)
  • Why Is Risk Assesment Difficult?
  • Types of Risk Assesment
  • Different Approaches to Risk Analysis
  • Best Practices and Guidelines in Assessing and Calculating Risks
  • Develop and implement policies and procedures to mitigate risks arising from ICT supply chain and outsourcing.
  • Best Practices and Guidelines in Mitigating Risks
Module 5 Software Development Security
  • How Did We Get Here?
    • Device vs. Software security
    • Why Are We Not Improving at a Higher Rate?
    • Usual Trend of Dealing with Development Level Security
    • Where to Implement Software Development Security
  • Issues in application security ( SQL injection, cross scripting, etc.)
  • Security in SDLC
    • Development Methodologies
    • Maturity Models
    • Security Issues
    • OWASP Top Ten (2011)
  • Modularity of Objects and Security
    • Object-Oriented Programming Characteristics
    • Module Characteristics
    • Linking Through COM
    • Mobile Code with Active Content
    • World Wide Web OLE
    • ActiveX Security
    • Java and Applets
    • API
  • Security of Embedded Systems
  • Common Gateway Interface
    • How CGI Scripts Work
    • Cookies
    • PCI Requirements
  • Virtualization
    • Type 1 and Software Security
    • Type 2 and Software Security
Module 6 Legal Framework
  • Need for legal Framework and its enforcement
  • Types of Law
    • Foundation Concepts of Law
    • Common Laws – Criminal
    • Common Laws – Civil
    • Common Laws – Administrative
    • Intellectual Property Laws
    • More Intellectual property Laws
    • Software Licensing
  • Historic Examples of Computer Crimes
    • Who Perpetrates These Crimes?
  • IT(Amendment) Act 2008
    • Cyber crimes
    • Authorities
    • Enforcement and Penalties
    • Security measures and Privacy protection
    • Digital Signature legal ecosystem
    • Intermediary Guidelines
  • National Cyber Security Policy Identification Protection & Prosecution
    • Computer Crime and its Barries
    • Countries working Together
    • Security Principles for International Use
    • Determine if a Crime Has Indeed Been Committed
    • When Should Law Enforcement Investigation
    • Investigation of Any Crime
  • Role of Evidence in a Trial
    • General Rules for Evidence
    • Evidence Requirements
    • Evidence Collection Topics
    • Chain of Custody
    • How Is Evidence Processed?
    • Evidence Types
    • Hearsay Rule Exception
  • Privacy of Sensitive Data
    • Privacy Issues
    • Section 43A, 72 of IT (Amendement) Act, Justice A.P Shah Report
    • European Union Principles on Privacy
    • US Laws on Privacy
    • Routing Data Through Different Countries
    • Employee Privacy Issues
  • Sets of Ethics
    • Ethics – Mile2
    • Ethics – Computer Ethics Institute
    • Ethics – Internet Architecture Board
  • GAISP – Generally Accepted Information Security Principles
Module7: Privacy Protection
  • Understanding Privacy as a Domain
  • Relationship between security and privacy
  • Revitalizing security program to enable Privacy Protection
  • Assess privacy implications of security technologies
  • Privacy impact assessment
  • Develop and implement privacy protection measures within the organization
Module8: Audit and Testing
  • What is information Security Audit?
  • Importance of Information Security Audit
  • Identifying the Information Security Audit Objectives
  • Audit Planing and preparations
  • Performing Security Audits and Reviews
  • Vulnerability assessment and Penetration testing
  • Code reviews
  • Audit Controls
  • Logical security audit
  • Ethics and codes of conduct for Auditors
  • Security Policies and procedure Audits and Comliance Audits
  • Conduct and Close internal audits
  • Information Security audit tools
  • Reporting to senior management on defined Parameters

WEEK - 24-25

Project Work / Industrial Visits

WEEK - 26



257-258, Titanium City Center Mall, Nr. Sachin Tower,
Prahlad Nagar Road, Satellite, Ahmedabad-380015