e-Brochure

Logo
Separator

PG Diploma in IT Infrastructure, Systems and Security (PG-DITISS)

NSQF level: 8

C-CAT Candidate Login | Download Admission Booklet | FAQ

The theoretical and practical mix of the Post Graduate Diploma in IT Infrastructure Systems and Security  (PG-DITISS) programme has the following focus:

  • To explore the fundamental concepts of Cyber Security
  • To develop in-depth knowledge and understanding of the Intrusion Detection and Prevention domain.
  • To learn to analyze the threats detection techniques.
  • To understand the Concepts of Data Centre Management.
  • To learn & use various techniques for Ethical Hacking and Cyber Forensics.
  • To understand the applications security implementation.
  • To analyze and solve problems conceptually and practically from diverse industries, such as government manufacturing, retail, education, banking/ finance, healthcare and pharmaceutical.
  • To undertake industrial research projects for the development of future solutions in the domain of Information Security to make an impact in the technological advancement.
  • To use advanced tools/ decision-making tools/ techniques to analyze the complex problems and get ready to develop such new techniques for the future.
  • To learn cloud computing, accessing resources and services needed to perform functions with dynamically changing needs.
  • To understand the cloud privacy and security concepts to create secure cloud environment.
  • To learn the various cloud platforms to implement real time cloud applications.
  • Graduate in Engineering or equivalent (e.g. BE / BTech / 4-year BSc / AMIE / DoEACC B Level, etc.) in Electronics/ Computer Science/ IT or related areas,   OR
  • Post Graduate in Engineering Sciences (e.g. MSc in Computer Science, IT, Electronics, etc.),  OR
  • Post Graduate in Mathematics or allied areas,  OR
  • MCA
  • The candidates must have secured a minimum of 55% marks in their qualifying examination.


The total fees of the course is Rs. 80,000/- +Tax (14% service tax + 0.5% Swachh Bharat cess + 0.5% Krishi Kalyan cess  18% GST).

The course fees has to be paid in two installment as per the schedule.
  • First installment is Rs. 10,000/- +Tax  (14% service tax + 0.5% Swachh Bharat cess + 0.5% Krishi Kalyan cess     18% GST).
  • Second installment is Rs. 70,000/- + Tax  (14% service tax + 0.5% Swachh Bharat cess + 0.5% Krishi Kalyan cess 18% GST).
  

Introduction to communication system, issues in Computer Networking, Overview of Transmission Media, OSI Layers, TCP/IP Models, Overview of LAN (local area networks), VLAN (virtual local area network),Overview of VXLAN, Overview of STP,VARP, Overview of WAN (wide area networks), Discussion of Networking Protocols, Access List, IP Addressing (Fixed Length Subnet Masking, Variable Length Subnet Masking, Classless Inter Domain Routing), Static Routing and Dynamic Routing (RIP, RIPv2, EIGRP, OSPF), Introduction to NAT and PAT, TCP, UDP, IP, ICMP, Bridge, Network TAP, Hub, Switch, Router, Introduction to IPv6, Introduction Software Defined Network, Overview of SDN Controller

  

Concepts of OS                       

Architecture of Operating System, Process Management, Memory Management, File system Management, Network Operating System

Windows Operating System and Security Issue 

  Overview of windows operating system, Overview of Administrative Tasks and Tools

Installation of windows operating system, Windows 10/ server 2016 core, Deploying Windows with  WDS, Network Configuring, Implementation of infrastructure of windows networks, File system and disk management, Managing disks with Distributed File System (DFS), Securing file systems with EFS & Biometric configuration, DHCP & DNS server, System center configuration management

Introduction to Systems Management & Service Delivery, System Center Configuration management, System Center  Endpoint Protection ,Implementation, planning and maintaining of active directory infrastructure, Configuration of IIS SQL server, web server and Exchange server, Implementing and administering Active Directory, User accounts and groups in an Active Directory Domain, Implementing WINS and Dynamic Host, Registry settings, System Configuration Settings, Introduction to Performance Tuning, Maintenance and troubleshooting, Introduction to Microsoft Windows 10/ server 2016 security, Security issues at the Active Directory level, Authenticating users and clients, Planning the administrative structure for security groups, Using smart cards for network authentication, Evaluating and analyzing workstation security, Securing network services: DNS, DHCP, RIS, SNMP and TS, Microsoft Azure Cloud Integration/Backup, Microsoft Windows os Licensing model, Power shell Scripting, Windows Power Shell Technology Background and Overview, Power shell Error Handling and Debugging

Windows Administration using power shell, Background Jobs and Remote Administration, Windows Power Shell Tips & Re-Using Scripts and Functions

Linux Operating System and Security Issue                   

Systems Concepts, Startup Files, Linux boot process, Installation of Linux, A hands-free method of installation, Understanding the boot procedure, Configuring the GRUB boot loader, Disk partition, Controlling and managing  Services, Repository configuration, User administration of Linux, Network Configuring, Network Teaming/Load balancing, Define network route, Using SSH for network communications, Using VNC for remote management, Network Authentication

Patches & updates, System Configuration Files, Perform System Management

X configuration server, Setting up an NFS server, Setting up an FTP server

The Samba Server: networking with Windows system, Configuring a DHCP server

Configuring a DNS server, Configuring the Apache web server, Configuring the Squid web proxy cache, Using send mail server, Dovecot: an IMAP and POP server, Performance Tuning and system hardening, Maintenance and troubleshooting, SE LINUX/ APParmor, Basic Service Security, Log Management and NTP, BIND and DNS Security, Network Authentication: RPC, NIS and Kerberos, Apache security(SSL), Overview of Linux versions/releases, KVM / xen

Bash Scripting,Introduction to BASH Command Line Interface (CLI) Error Handling

Debugging & Redirection of scripts, Control Structure, Loop, Variable & String

 Conditional Statement Regular Expressions, Automate Task Using Bash Script

Security patches, Logging & Monitoring using script

  

Procedures and security Polices, Risk assessment methodologies, Risk management, DRP/BCP- Business impact analysis, Asset classification, process level strategy, information classification organization, Crisis management plan, Resources recovery strategy, Framework, audits benchmarks, compliance, communications, Data protection for system designers, Evaluation criteria and security testing, International standards, Analysis and Logging, Recovery and data backs, Security policy development, Security Models, Frameworks, Standards, Security Certification ISO 17799/ ISO 27001, System Security Engineering Capacity Maturity Model, Laws and Legal Framework for Information Security, Case studies on eCommerece & Credit Card frauds, Recovery and risk analysis, Operating system and application specifies auditing, Understanding Copy Right in Information Technology, Understanding the technology of Software software-copyright vs Patent debate Authorship, Assignment issues Commissioned work, Work for hire Idea/Expression dichotomy, Copy right in internet, Legal Issues in internet and Software Copyright Jurisdiction Issues

Copyright Infringe Remedies of Infringement Multimedia, Copyright issues Software Piracy, Patents understanding, Cyber Crimes, Understanding Cyber Crimes in context of Internet, Indian Penal Law & Cyber Crimes Fraud Hacking Mischief, International law, Obscenity and Pornography Internet, Potential of Obscenity Indian Law On Obscenity & Pornography Technical

PKI

40 Hours  
  

Understand Basic Encryption Concepts, Attacks Against Encryption, Understand Private Key Encryption, Understand Public Key Encryption, Cryptography, Fundamentals, Cryptographic Algorithm and protocols, Symmetric Key Encryption Algorithms, Public Key Algorithms, Cryptographic issues, Strong Authentication, Digital Signatures, PKI Standards, PKI Fundamentals, Implementing Security, Cryptographic Attacks and Defenses, Understand Key Management, Understand Trust in the System, Secure E-Mail Implementation, File Encryption Solutions

Cyber Forensics

30 Hours  
  

Introduction to Cyber Crime and Cyber Forensics, Basic Forensic Principles

Network Forensics, Mobile Device Forensics, Memory Forensics, General Computing Principles, Search and Seizure of Computers, Forensic Imaging & Verification, Data Recovery and Analysis, Investigative Techniques

  

Security Fundamentals, Firewalls, Types of Firewalls, Overview of NextGen Firewall, Limitations of firewall, Intrusion Detection And Prevention, Intrusion risks, Security policy, Monitoring  and reporting of  traffics, Traffic shaping

Investigating and verifying detected intrusions, Recovering from, reporting and documenting intrusions, Define the Types of intrusion Prevention Systems

Intrusion prevention system basics, Limitations of  Intrusion Prevention System

Spoofing Detection &Prevention, DDos & Dos mitigation techniques, Qos Policy

Introduction of Web Application Firewall, Packet Signature and Analysis,

Virtual Private Networks, Deploy and managing  VPN, VPN Performance tuning and error handling, DMZ and  virtual host, Introduction of Reverse proxy and policies  

  

Introduction to ITIL            

Service Strategy, Service Design, Service Transition, Service Operation, Continual Service Improvement

Data Center Management   

Introduction to DCM, Data Center design, Data Center Security Procedure, Server Security, Storage area network, Virtualization, LXC Docker Vagrant kvm Hyper v,kubernets, Introduction of Vmware Vsphere cluster, Introduction of Virtual Private Cloud (VPC), Private Cloud Setup, Automation Using Cloud API

Server Orchestration, Cloud Logging and monitoring 

  

Introduction to Java, Java Overview, Data types, Arrays, Decision statements, Loops, Classes, Package, java.lang, java.util, Java Interfaces, Exception Handling, Networking with Java, JSP & Servlets

Cryptography

Java Cryptography Architecture, Java Cryptography Extension, SSL and TLS protocols, A Basic of SSL client and Server, Client side Authentication, Managing SSL Session Information, Dealing with HTTPS

Secure Coding with Java

Fundamentals, denial of service, injection and inclusion, buffer overflows and input validation, access control, security standards.

Security Concepts

140 Hours  
  

Application Security         

MySQL    

Introduction to MySQL, Installing and Configuring MySQL, Queries in MySQL Database Security Principles, Authentication Bypass, Data Extraction, Advanced Identification/Exploitation, Order by/group by, Encoding/decoding Injection in Insert/Update, Other HTTP fields, Injection in stored procedures

Web Application Security  

Web application Security Risks, Identifying the Application Security Risks,Threat Risk Modeling, OWASP Top 10 Concepts

Python 

Introduction to Python, Python basics, Data Types and variables Operators, Looping & Control Structure List, Modules Dictionaries, string Regular Expressions, Functions and Functional Programming, Object Oriented Linux Scripting Environment, Classes, Objects and OOPS concepts, File and Directory Access Permissions and Controls Socket, Libraries and Functionality  Programming, Servers and Clients Web Servers and Client scripting, Exploit Development techniques, Writing plugins in Python, Exploit analysis Automation Process, Debugging basics,Task Automation with Python

Ethical Hacking         

Basics of Information System, Classification of Threads and attacks, Protecting Information System Security, Security in mobile and Wireless Computing, Security Policies and Measures in Hand Held Devices, Security Policy, Standards, Social engineering, Information Security risk analysis, Data Privacy Fundamentals, Penetration Testing fundamentals, Foot printing and scanning, Enumeration and Step-by-Step vulnerability finding, Linux and Automated Security Assessment Tools, Trojans and Backdoors, Viruses and worms, Sniffers, session Hijacking and Denial of Service, System Hacking, Web Server Hacking, Web application Vulnerabilities, Honey pots, Google dorks, Phishing 

  
Official & General Conversation, Official Letter Writing, Official Emailing, Essay Writing, Event Reporting, Formal Speaking (Telephone, Face-to-Face, Public Speaking), Oral & Digital Presentation Skills, Listening Skills, Cross-Cultural Communication, Technology-enabled Communication, Confidence Building, Formal Etiquettes, Body Language, Developing Positive Attitude, Personal Goal Setting & Career Planning, Job Search Process, Resumes & Applications / Cover Letters, Handling Interviews, Group Discussions, Audio Synthesis, Mock Interviews

     Aptitude:

Analogy, Series Completion (Number, Alphabet, Letter Series), CodingDecoding for Number, alphabet and Letter, Blood Relations, Puzzle Test, Classification Type questions, Alphabet test, Order of words, Letter words problems, Logical sequence of words, Number, Ranking and time Sequence Test, Mathematical operations, Arithmetic reasoning, Logical reasoning, Statement-Arguments, Statement-Assumptions,Statementcourses of Action, StatementConclusions, Deriving conclusion from passages, HCF and LCM, Fraction, Number system, Permutation & combination, Ratio & Preparation, Partnership, Average, Percentage, Clock, Probability, Pipes and cisterns, Problem on streams, Time and work, Work and Wages, Problem on Trains, Problem on Speed and Velocity, Problem on Ages, Profit and loss, Simple Interest, Compound Interest

 General English:

 The Sentence, Subject and Predicate, Phrase and Clause, Parts of Speech, The Noun: Kinds of Nouns, The Adjective, Articles, The Verb, Mood, The Adverb, Comparison Of Adverbs, Formation Of Adverbs, Position Of Adverbs, The Preposition, Words Followed By Prepositions, The Conjunction, Some Conjunctions And Their Uses, The Interjection, The Same Word Used As Different Parts Of Speech, Composition, Analysis, Transformation and Synthesis, Analysis of Simple Sentences, Phrases, Clauses, Sentences: Simple, Compound and Complex, More about Noun Clauses, More about Adjective Clauses, More about Adverb Clauses, Analysis of Complex Sentences, Analysis of Compound Sentences, Transformation of Sentences, Transformation of Sentences, Synthesis of Sentences, Synthesis of Sentences, Synthesis of Sentences, The Sequence of Tenses, Direct and Indirect Speech, Agreement of The Verb With The Subject, Nouns and Pronouns, Adjectives, Verbs, Adverbs, Preposition, Conjunctions, Order of Words, Synonyms & Antonyms, Punctuation, Spelling Rules, The Formation of Words, Figures of Speech Exercise, Verb Patterns, Question Tags, Words of Idioms & phrases, Sentence Construction, Fill up the blanks

Project

100 Hours  
     

After doing this course students can work as:

  • System Administrator
  • Network Security Professional
  •  Web Security Tester
  • Information Security Analysts
C-DACs - Advanced Computing Training School
Address
:
No. 68, 4th Cross, Electronic City Phase 1, Hosur Road, Opp.BSNL Telephone Exchange Bengaluru
Karnataka 560100
Telephone
:
+91-80-28523300
Contact Person
:
Ms Reshma (Admission), Mr Mohamed Ashfaqu(Hostel)
Fax
:
+91-80-28522590
e-Mail
:
course_blrec[at]cdac[dot]in(Admission), mohammad[at]cdac[dot]in(Hostel)
Courses
:
PG-DAC, PG-DITISS
C-DACs - Advanced Computing Training School
Address
:
No.1, Shiv Bagh, Satyam Theatre Road, Ameerpet, Hyderabad
Andhra Pradesh 500016
Telephone
:
040-2373 7127
Contact Person
:
Mr. Sharanabasappa , Senior Technical Officer
Fax
:
040-2374 3382
e-Mail
:
cdachyd[at]cdac[dot]in
Courses
:
PG-DAC, PG-DESD, PG-DSSD
C-DACs - Advanced Computing Training School
Address
:
Plot No. 6 & 7, Hardware Park, Sy No. 1/1, Srisailam Highway, Pahadi Shareef Via Keshavagiri (Post), Hyderabad
Telangana 500005
Telephone
:
040-23737127
Contact Person
:
Mr.Sharanabasappa, Senior Technical Officer
Fax
:
040-2374 3382
e-Mail
:
cdachyd@cdac.in
Courses
:
PG-DITISS
Centre for Development of Advanced Computing
Address
:
Gulmohar Cross Road No. 9, Juhu Mumbai
Maharashtra 400049
Telephone
:
022 26201606/574/488
Contact Person
:
Ms. Sudha Iyer
Ms. Varsha Karkare
Fax
:
e-Mail
:
entrance-mumbai[at]cdac[dot]in
Courses
:
PG-DMC, PG-DITISS
C-DACs - Advanced Computing Training School
Address
:
B-30, Sector 62, Institutional Area, Noida
Uttar Pradesh 201307
Telephone
:
0120-3063371-73
Contact Person
:
Mr. V.K. Sharma
Fax
:
0120-3063374
e-Mail
:
cdacacts-noida[at]cdac[dot]in
Courses
:
PG-DAC, PG-DVLSI, PG-DGi, PG-DESD, PG-DMC, PG-DITISS, PG-DBDA
C-DAC Advanced Computing Training School
Address
:
C-DAC ACTS, 5th Floor, Innovation Park, Sr. No. 34/B/1, Panchvati, Pashan, Pune
Maharashtra 411008
Telephone
:
18008430222
Contact Person
:
Mr. Parimal Wagh
Fax
:
NA
e-Mail
:
acts[at]cdac[dot]in
Courses
:
PG-DAC, PG-DVLSI, PG-DESD, PG-DMC, PG-DITISS, PG-DBDA, PG-DIoT, PG-DHPCSA

Q:What is the Eligibility for PG-DITISS?  

A:The eligibility criteria for PG-DITISS design is candidate holding any one of the following degrees: 

  • Graduate in Engineering or equivalent (e.g. BE / BTech / 4-year BSc / AMIE / DoEACC B Level, etc.) in Electronics/ Computer Science/ IT or related areas, OR
  • Post Graduate in Engineering Sciences (e.g. MSc in Computer Science, IT, Electronics, etc.), OR
  • Post Graduate in Mathematics or allied areas, OR
  • MCA
  • The candidates must have secured a minimum of 55% marks in their qualifying examination.
Q. What is the selection criterion?  

A:The selection process consists of a C-DAC Common Admission Test (C-CAT).


Q. What is Fee of course? 

A. The fees for the PG-DITISS course is Rs. 80,000/- (Rupees Eighty Thousand only) plus 18% GST. 


Q. When the course does commence?  

A. Twice in a year in the month of August and February. Admission Process will start in month of May and November every year.


Q. Duration of the course?  

A. 24 weeks full-time course.


Q. Infrastructure Facilities available?  

A. Fully equipped classrooms capacity to accommodate students and state-of-art labs to explore you computing skills.


Q. Hostel & Canteen facility available?  

A. Accommodation for out station candidates is facilitated by some of centres. Please refer Admission Booklet.


Q. Bank loan assistance for the other centres?  

A. Facility of educational loans is provided for the selected candidates, which is available at all nationalized banks.


Q. Revision of the course contents, is it every six months?  

A. The course contents are revised according to the real world needs and when found relevant to the market demands.


Q. Do you have centralized placement cell?  

A. Yes we do have a centralized placement programme where the respective centers actively coordinate the task of organizing the campus interviews for all the students.


Q. What is the value of the course in the international market?  

A. The course has been a trend-setting course due to its unique curriculum and the opportunities that it generates; hence it gives the edge over above for the students and gives a international edge.