ITEC :Indian Technical and Economic Cooperation

Home >  CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING NOIDA  ,  NOIDA

 

Centre for Development of Advanced Computing (C-DAC) is the premier R&D organization of the Ministry of Electronics and Information Technology (MeitY), Govt. of India for carrying out R&D in IT, Electronics and associated areas. Different areas of C-DAC, had originated at different times, many of which came out as a result of identification of opportunities. The setting up of C-DAC in 1988 itself was to built Supercomputers in context of denial of import of Supercomputers by USA. Since then C-DAC has been undertaking building of multiple generations of Supercomputer starting from PARAM with 1 GF in 1988. Almost at the same time, C-DAC started building Indian Language Computing Solutions with setting up of GIST group (Graphics and Intelligence based Script Technology). National Centre for Software Technology (NCST) set up in 1985 had also initiated work in Indian Language Computing around the same period. Electronic Research and Development Centre of India (ER and DCI) with various constituents starting as adjunct entities of various State Electronic Corporations, had been brought under the hold of Department of Electronics and Telecommunications (now MeitY) in around 1988. They were focusing on various aspects of applied electronics, technology and applications. With the passage of time as a result of creative echo system that got set up in C-DAC, more areas such as Health Informatics, etc., got created. while right from the beginning the focus of NCST was on Software Technologies. similarly C-DAC started its education and training activities in 1994 as a spin-off with the passage of time, it grew to a large efforts to meet the growing needs of Indian Industry for finishing schools. C-DAC has today emerged as a premier third party R&D organization in IT and E (Information Technologies and Electronics) in the country working on strengthening national technological capabilities in the context of global developments in the field and responding to change in the market need in selected foundation areas. In that process, C-DAC represents a unique facet working in close junction with MeitY to realize nations policy and pragmatic interventions and initiatives in Information Technology. As an institution for high-end Research and Development, C-DAC has been at the forefront of the Information Technology (IT) revolution, constantly building capacities in emerging/enabling technologies and innovating and leveraging its expertise, caliber, skill sets to develop and deploy IT products and solutions for different sectors of the economy, as per the mandate of its parent, the Ministry of Electronics and Information Technology, Government of India and other stakeholders including funding agencies, collaborators, users and the market-place.

Institute address: B-30, INSTITUTIONAL AREA, SECTOR-62, NOIDA, 201307


ITEC Coordinator Details:

NameEmail IdContact Detail
SHRI V.K. SHARMAvksharma[AT]cdac[DOT]in 9811900715 / 0120-2210854
SHRI NAVNEET JAINnavneetjain[AT]cdac[DOT]in 9811900728 / 0120-2210865
SMT PRIYANKA TIWARIpriyankamishra[AT]cdac[DOT]in 9560411488 / 0120-2210800


Courses available for Training Year : 2022-2023

You can browse the available courses on clicking the links below:

S.No. Name of Courses From To Open for Paricipants From Participant Profile SynopsisApply NowCourse Type
1SPECIALISED PROGRAMME ON BIG DATA TECHNOLOGIES AND MACHINE LEARNING27-Mar-202319-May-2023ALL COUNTRIESGOVERNMENT OFFICIALS WITH MINIMUM 5 YEARS EXPERIENCE PREFERABLY HAVING IT BACKGROUNDENABLES PARTICIPANTS TO ANALYZE, SYSTEMATICALLY EXTRACT INFORMATION FROM DATA SETS THAT ARE TOO LARGE OR COMPLEX TO BE DEALT BY TRADITIONAL DATA-PROCESSING APPLICATION SOFTWARE AND TO HANDLE BIG DATA CHALLENGES WHICH INCLUDE CAPTURING DATA, DATA STORAGE, DATA ANALYSIS AND VISUALIZATION
Details
COMPLETEDITEC
2SPECIALISED PROGRAMME ON INTERNETWORKING DESIGN AND LAN WAN ADMINISTRATION27-Mar-202319-May-2023ALL COUNTRIESSHOULD MEET THE ABOVE EDUCATIONAL QUALIFICATION REQUIREMENTS AND SHOULD KNOW ENGLISH LANGUAGEA. THE MAIN OBJECTIVE OF THE PROGRAMME IS TO BUILD CAPACITY OF THE PROFESSIONALS DRAWN FROM INDUSTRY, ACADEMIA AND GOVERNMENT UNDER ITEC PROGRAMME. B. THE PURPOSE OF THE PROGRAMME IS TO INTRODUCE TO THE PARTICIPANTS ABOUT SYSTEM ADMINISTRATION, ON SETTING UP OF SERVER, MANAGEMENT OF NETWORKS, TYPE OF NETWORKS AND COMMUNICATION CONCEPTS.
Details
COMPLETEDITEC
3SPECIALIZED PROGRAMME ON LINUX SERVER ADMINISTRATION13-Mar-202331-Mar-2023ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC AND SHOULD KNOW ENGLISH LANGUAGEThe aim of this course is to understand the Linux commands to manage files and file system. Create and execute BASH scripts & learningthe structure of the Linux operating system. At the end of the course, students will learn and develop understanding of the following: 1. Linux Essential commands 2. File System Browsing 3. User,Group& File Permissions 4. RPM & Yum Configuration 5. Iptables Configuration 6. Configuring Servers like: DNS,DHCP,NFS,Samba,WebServer,Squid Proxy Server etc. For individuals who are looking for a career change or building a career in cyber security then Linux is considered to be one of the best platforms to start with. Building cyber security applications is very easy on this platform.
Details
COMPLETEDe-ITEC
4WEB DESIGN06-Mar-202317-Mar-2023ANGOLA GOVT OFFICIALS,PROFESSIONALS,RESEARCH SCHOLARS,TEACHERS ETC AND SHOULD KNOW ENGLISH LANGUAGEAIM-THIS COURSE INTENDS TO PREPARE PARTICIPANTS TO BUILD WEB-BASED APPS UTILIZING WEB DEVELOPMENT LANGUAGES. THE COURSE CURRICULUM IS CREATED WITH THE AIM THAT PARTICIPANTS WILL BE ABLE TO CREATE WEBSITES FOR THE INTERNET USING THE INFORMATION, SKILLS, AND TALENTS THEY HAVE GAINED BY LEARNING FUNDAMENTAL PROGRAMMING TECHNIQUES.OBJECTIVE-THE MAIN OBJECTIVE OF THIS COURSE IS TO PROVIDE A COMPREHENSIVE UNDERSTANDING OF FRONT END WEB DEVELOPMENT LANGUAGES. TO COMPREHEND HTML. LEARNING THE CSS LANGUAGE, WHICH IS USED TO STYLE HTML DOCUMENTS TO LEARN JAVASCRIPT, THE MOST USED SCRIPTING LANGUAGE FOR CREATING WEBSITES AND CONDUCTING VALIDATIONS .TO UNDERSTAND JQUERY THAT SIMPLIFIES JAVA SCRIPT PROGRAMMING.
Details
COMPLETEDe-ITEC
5SPECIALISED PROGRAMME ON REDUCING CYBER CRIME THROUGH KNOWLEDGE EXCHANGE AND CAPACITY BUILDING13-Feb-202324-Mar-2023ALL COUNTRIESGOVERNMENT OFFICIALS PREFERABLY HAVING IT BACKGROUNDPROVIDES UNDERSTANDING OF VARIOUS TYPES OF VULNERABILITIES AND ITS EXPLOITATION, PREVENTION OF ATTACKS AND OTHER THREATS IN A NETWORK OR INTERNETWORK AND APPLICATION OF VARIOUS COUNTERMEASURES, AND HOW TO INVESTIGATE VARIOUS TYPE OF CYBER CRIMES
Details
COMPLETEDITEC
6WINDOWS SERVER 201906-Feb-202317-Feb-2023ANGOLA GOVT OFFICIALS,PROFESSIONALS,RESEARCH SCHOLARS,TEACHERS ETS AND SHOULD KNOW ENGLISH LANGUAGEAIM - THE AIM OF THIS COURSE IS TO INTRODUCE TO THE PARTICIPANTS ABOUT USE OF ADMINISTRATIVE TECHNIQUES AND TOOLS IN WINDOWS SERVER . PARTICIPANTS WILL LEARN AND DEVELOP UNDERSTANDING OF THE FOLLOWING 1.CENTRAL ADMINISTRATION 2.VIRTUALIZATION 3.ADMINISTERING WINDOWS SERVER ROLE 4.BETTER PERFORMANCE & IMPROVED SECURITY OBJECTIVE- AFTER COMPLETION OF THIS COURSE, PARTICIPANTS WILL BE ABLE TO SETUP & MANAGE NETWORK INFRASTRUCTURE SERVICES, CONFIGURE FILE SERVERS AND STORAGE, IMPLEMENTING SECURITY POLICIES, DEPLOYING SERVERS & MONITORING EVENT LOGS FOR TROUBLESHOOTING.
Details
COMPLETEDe-ITEC
7SPECIALISED PROGRAMME ON ARTIFICIAL INTELLIGENCE30-Jan-202310-Mar-2023ALL COUNTRIESGOVERNMENT OFFICIALS, TEACHERS, PROFESSIONALS PREFERABLY HAVING IT BACKGROUNDIN THIS ERA OF MASSIVE DIGITAL TRANSFORMATION, AI HAS TRANSFORMED THE LIFE OF PEOPLE BOTH AT PERSONAL AND PROFESSIONAL FRONT GLOBALLY. ARTIFICIAL INTELLIGENCE (AI) AIMS TO FORMULATE COMPUTERS AND INFORMATION SYSTEMS IN MORE INTELLIGENT MANNER TO SOLVE COMPLEX PROBLEMS AND PROVIDE MORE NATURAL AND EFFECTIVE SERVICES TO HUMAN BEINGS. TO COMPETE WITH THE FAST CHANGING TECHNOLOGY ONE MUST BE FULLY EQUIPPED WITH THE KNOWHOW OF THE LATEST GAME CHANGER TECHNOLOGIES FOR THE BENEFIT OF THE BUSINESS FUNCTIONS IN VARIOUS SECTORS AND INDUSTRIES. EXTENSIVE HANDS ON APPROACH OF THE COURSE WILL GIVE AN IN-DEPTH PRACTICAL KNOWLEDGE OF BASIC PRINCIPLES OF AI FOR PROBLEM SOLVING, INFERENCE, PERCEPTION, LEARNING, KNOWLEDGE REPRESENTATION AND PYTHON PROGRAMMING USED FOR SOLVING AND ANALYSIS OF DIFFERENT AI TECHNIQUES. THE COURSE WILL AMPLIFY THE KNOWLEDGE OF THE PARTICIPANTS TO SOLVE THE AI BASED APPLICATIONS AND MAKE PROJECTS IN THIS DOMAIN
Details
COMPLETEDITEC
8CYBER SECURITY02-Jan-202320-Jan-2023ANGOLA GOVERNMENT OFFICIALS, UNIVERSITY TEACHERS, PROFESSIONALSTHE AIM OF THIS COURSE IS TO PREPARE PARTICIPANTS WITH THE TECHNICAL KNOWLEDGE AND SKILLS NEEDED TO PROTECT AND DEFEND COMPUTER SYSTEMS, NETWORKS AND SECURITY DEVICES. AT THE END OF THE COURSE, STUDENTS WILL LEARN AND DEVELOP UNDERSTANDING OF THE FOLLOWING - TO DETERMINE THE ASSETS THAT ARE IMPORTANT TO THE THAT NEEDS TO BE KEPT SECURE AT ALL TIMES, TO IDENTIFY THE SAFEGUARDS THAT SHOULD BE PUT INTO PLACE TO DEAL WITH THESE THREATS AND RISKS, TO UNDERSTAND THE CONCEPTS OFSECURITY, APPLICATIONS SECURITY IMPLEMENTATION AND USE VARIOUS TECHNIQUES FOR ETHICAL HACKING AND CYBER FORENSICS AND TO ANALYSE THE THREATS DETECTION TECHNIQUES, INTRUSION DETECTION AND PREVENTION MEASURES.
Details
COMPLETEDe-ITEC
9DEEP LEARNING SPECIALIZATION19-Dec-202223-Dec-2022MOROCCO GOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC AND SHOULD KNOW ENGLISH LANGUAGE. KNOWLEDGE OF ANY PROGRAMMING LANGUAGE IS DESIRABLE.THE AIM OF THIS COURSE IS TO UNDERSTAND DEEP NEURAL NETWORKS, IMPLEMENT VECTORIZED NEURAL NETWORKS, IDENTIFY ARCHITECTURE PARAMETERS AND APPLY DL TO APPLICATIONS. AT THE END OF THE COURSE, STUDENTS WILL LEARN AND DEVELOP UNDERSTANDING OF THE FOLLOWING: 1. USE BEST PRACTICES TO TRAIN AND DEVELOP TEST SETS AND ANALYZE BIAS/VARIANCE FOR BUILDING DL APPLICATIONS, USE STANDARD NN TECHNIQUES, APPLY OPTIMIZATION ALGORITHMS, AND IMPLEMENT A NEURAL NETWORK IN TENSORFLOW. 2. USE STRATEGIES FOR REDUCING ERRORS IN ML SYSTEMS, UNDERSTAND COMPLEX ML SETTINGS, AND APPLY END-TO-END, TRANSFER, AND MULTI-TASK LEARNING. 3. BUILD A CONVOLUTIONAL NEURAL NETWORK, APPLY IT TO VISUAL DETECTION AND RECOGNITION TASKS, USE NEURAL STYLE TRANSFER TO GENERATE ART, AND APPLY THESE ALGORITHMS TO IMAGE, VIDEO, AND OTHER 2D/3D DATA.
Details
COMPLETEDe-ITEC
10SPECIALISED PROGRAMME ON DESIGN, DEVELOPMENT & IMPLEMENTATION OF E-LEARNING COURSES12-Dec-202203-Feb-2023ALL COUNTRIESGOVERNMENT OFFICIALS/TEACHERS WITH IT BACKGROUNDAT THE END OF THE COURSE, STUDENTS WILL BE ABLE TO: A. UNDERSTAND ABOUT E-LEARNING, IT USAGES AND ITS IMPLEMENTATION B. LEARN INNOVATIVE PRACTICES IN THE DESIGN & DEVELOPMENT OF E-LEARNING C. DEVELOP EFFECTIVE AND STANDARD COMPLIANT E-LEARNING CONTENT D. APPLY THEORETICAL PRINCIPLES FOR DESIGNING E-LEARNING COURSES E. CHOOSE AND APPLY DIFFERENT DEPLOYMENT MODELS OF E-LEARNING F. BECOME TRAINED E-LEARNING PROFESSIONALS
Details
COMPLETEDITEC
11NETWORK MANAGEMENT28-Nov-202216-Dec-2022ANGOLA GOVERNMENT OFFICIALS, UNIVERSITY TEACHERS, PROFESSIONALSTHE AIM OF THIS COURSE IS TO INTRODUCE TO THE PARTICIPANTS ABOUT MANAGEMENT OF NETWORKS, NETWORK DEVICES AND COMMUNICATION CONCEPTS.PARTICIPANTS WILL LEARN AND DEVELOP UNDERSTANDING OF THE FOLLOWING: 1. RESOURCE SHARING, HIGH RELIABILITY 2. NETWORK DEVICES (ROUTER, SWITCHES ETC.) 3. DESIGN OF LAN(IP ADDRESSING, NAT, VPN ETC.) AND NETWORK SECURITY 4. ONLINE COLLABORATION AFTER COMPLETION OF THIS COURSE, PARTICIPANTS WILL BE ABLE TO SETUP A NETWORK INFRASTRUCTURE, DO IP ALLOCATION FOR THEIR NETWORK DEVICES, TROUBLESHOOTING OF THEIR OWN PREMISES NETWORK AND CREATE A SECURE ENVIRONMENT TO SEND OFFICIAL DATA.
Details
COMPLETEDe-ITEC
12DATABASE AND SYSTEM ANALYIS31-Oct-202211-Nov-2022ANGOLA GOVERNMENT OFFICIALS, UNIVERSITY TEACHERS, PROFESSIONALSTHE AIM OF THIS COURSE IS TO UNDERSTAND COMMON SAD METHODOLOGIES, FEASIBILITY STUDIES AND COLLECTING DATA, MODELLING PROCESSES, INTERPRETATION OF DATA AND REQUIREMENTS SPECIFICATIONS. AT THE END OF THE COURSE, STUDENTS WILL LEARN AND DEVELOP UNDERSTANDING OF THE FOLLOWING: 1.ANALYSIS AND DESIGN OF SAD METHODOLOGIES 2.BECOME FAMILIAR WITH SEVERAL FILE AND DATABASE FORMATS 3.DESCRIBE SEVERAL GOALS OF DATA STORAGE 4.TO REVISE A LOGICAL ERD INTO A PHYSICAL ERD 5.TO OPTIMIZE A RELATIONAL DATABASE FOR DATA STORAGE AND DATA ACCESS 6.TO DESIGN, IMPLEMENT AND MAINTAIN INFORMATION SYSTEMS/DATABASES
Details
COMPLETEDe-ITEC
13MOBILE APP DEVELOPMENT10-Oct-202202-Dec-2022ALL COUNTRIESGOVERNMENT OFFICIALS, TEACHERS, PROFESSIONALS PREFERABLY HAVING IT BACKGROUND AND KNOWLEDGE OF ANY PROGRAMMING LANGUAGETHE AIM OF THIS COURSE IS TO DEVELOP THE SKILLS REQUIRED TO CREATE AND DEPLOY MULTIPLATFORM MOBILE APPLICATIONS UNDER ANDROID AND HYBRID APP DEVELOPMENT.AT THE END OF THE COURSE, STUDENTS WILL LEARN AND DEVELOP UNDERSTANDING OF THE FOLLOWING TO IMPLEMENT MOBILE APPLICATIONS USING THE CORDOVA HYBRID FRAMEWORK DEVELOPMENT FOR MULTIPLE MOBILE PLATFORMS WITH A SINGLE CODEBASE, HOW TO CREATE AND DEPLOY MOBILE APPLICATIONS UNDER ANDROID PLATFORM , TO EXPLORE WIRELESS CONNECTIVITY UNDER MOBILE COMPUTING PARADIGM.
Details
COMPLETEDe-ITEC
14CLOUD COMPUTING05-Sep-202216-Sep-2022ALL COUNTRIESGOVERNMENT OFFICIALS, TEACHERS, PROFESSIONALS PREFERABLY HAVING IT BACKGROUNDTHE AIM OF THE COURSE IS TO DEVELOP SKILLED MANPOWER IN CLOUD COMPUTING, BY PROVIDING DEEP INSIGHT INTO CLOUD COMPUTING FUNDAMENTALS AND LEVERAGING THE DESIGN AND IMPLEMENTATION OF SECURE CLOUD BASED IT SERVICES. AT THE END OF THE COURSE, STUDENTS WILL LEARN AND DEVELOP UNDERSTANDING OF THE FOLLOWING FUNDAMENTALS OF CLOUD COMPUTING , CLOUD COLLABORATION TOOLS, IMPLEMENTATION ASPECTS OF PUBLIC AND PRIVATE CLOUD PLATFORMS, CLOUD COMPUTING SECURITY AND ITS CHALLENGES, SECURING PRIVATE CLOUD, PUBLIC/PRIVATE CLOUD CASE STUDIES
Details
COMPLETEDe-ITEC
15DEVELOPMENT OF SOFTWARE01-Aug-202221-Sep-2022ANGOLA GOVERNMENT OFFICIALS, UNIVERSITY TEACHERS, PROFESSIONALSTHE AIM OF THIS COURSE IS TO ENABLE THE PARTICIPANTS TO UNDERSTAND THE FUNDAMENTALS AND ADVANCE CONCEPTS OF JAVA ALONG WITH CORRESPONDING FRAMEWORKS. AT THE END OF THE COURSE, PARTICIPANT WILL BE ABLE TO DESIGN A SECURE WEB APPLICATION USING JAVA.
Details
COMPLETEDe-ITEC
16SPECIALISED PROGRAMME ON MACHINE LEARNING04-Jul-202212-Aug-2022ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETCMACHINE LEARNING IS A TECHNIQUE BEHIND INNOVATIONS SUCH AS FACIAL RECOGNITION, SELF-DRIVING CARS, PREDICTIVE RESULTS IN SEARCH, PREDICTIVE TEXT ETC. THE OBJECTIVE OF THIS TRAINING PROGRAM IS TO UNDERSTAND HOW MACHINES CAN LEARN FROM ITS PAST EXPERIENCE WHICH IS CONSIDERED AS THE CORE OF AI. THE FOCUS IS ON CREATING STRONG FUNDAMENTAL KNOWLEDGE SETS ON BUILDING ALGORITHMS BY MASTERING THE PRINCIPLES OF STATISTICAL ANALYSIS, MACHINE LEARNING AND DEEP LEARNING. DURING THE COURSE STUDENTS WILL BE ABLE TO: 1. GAIN AN IN-DEPTH UNDERSTANDING OF DATA STRUCTURE AND DATA MANIPULATION IN PYTHON PROGRAMMING 2. GAIN EXPERTISE IN MATHEMATICAL COMPUTING USING THE NUMPY AND SCIKIT-LEARN AND HANDLING DATA USING PANDAS 3. COMPREHEND THE PRINCIPLES, ALGORITHMS, AND APPLICATIONS OF MACHINE LEARNING 4. LEARN THE APPLICATIONS OF MACHINE LEARNING ACROSS VARIOUS USE CASES LIKE CUSTOMER SERVICE, FINANCIAL SERVICES, HEALTHCARE AND MORE 5. UNDERSTAND SUPERVISED AND UNSUPERVISED LEARNING MODELS INCLUDING LINEAR REGRESSION, LOGISTIC REGRESSION, CLUSTERING, CLASSIFICATION, K-NN 6. MASTER THE CONCEPTS OF RECOMMENDATION ENGINE AND TIME SERIES MODELING, SEARCH ALGORITHMS, NEURAL NETWORKS, AND NLP
Details
COMPLETEDITEC
Courses available for Training Year : 2024-2025

You can browse the available courses on clicking the links below:

S.No. Name of Courses From To Open for Paricipants From Participant Profile SynopsisApply NowCourse Type
1SPECIALISED PROGRAMME ON CYBER SECURITY & FORENSICS01-May-202414-May-2024ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC. PARTICIPANTS SHOULD HAVE BASIC KNOWLEDGE OF NETWORKING , WINDOWS & LINUX OPERATING SYSTEM.AIM-TO PREPARE THE PROFESSIONALS TO CREATE AWARENESS ABOUT THREATS,ATTACKS AND VULNERABILITIES AND HELP IN MITIGATION AND IDENTIFICATION OF THE FOOTPRINTS OF THE VARIOUS CYBER ATTACKS.TO INSTILL THE MINDSET OF UNDERSTANDING THE CONTINUOUS EVOLVING CYBER THREATS AND ATTACKS.OBJECTIVE-IDENTIFY AND COMPREHEND THE VARIOUS TYPES OF CYBER THREATS LIKE MALWARE, PHISHING AND OTHER ATTACK VECTORS.HELP UNDERSTAND THE ENCRYPTION,NETWORK SECURITY BASICS.GAIN THE HANDS ON EXPERIENCE ON ETHICAL HACKING TOOLS AND TECHNIQUES.IMPLEMENT AND MANAGE SECURITY MEASURES TO PROTECT NETWORK INFRASTRUCTURE USING FIREWALLS,IDPS ,UTM.ACQUIRE KNOWLEDGE OF CYBER FORENSICS TOOLS AND METHODOLOGIES FOR THE INVESTIGATING CYBER CRIMES.EXPLAIN THE IMPORTANCE OF STAYING UPDATED ON THE LATEST CYBER SECURITY TRENDS AND TECHNOLOGIES.
Details
ITEC