SHIVAJI UNIVERSITY (M.S.)

CRITERIA-VI

EVIDENCE(S) AS PER SOP

METRIC NO. Average number of professional development / administrative training 6.3.3 programs organized by the Institution for teaching and non teaching staff during the last five years 1. List of professional development / administrative training programs organized by the institution 2. Brochures 3. Reports year-wise 4. List of participants of each programme 5. Photographs with date and caption.

NOTE – The evidences from page No.1 to 40 are uploaded on the NAAC portal and the remains pages of evidence are upload on university portal.

The link is provided in matrix no 6.3.3

AboutShivaji University: Objectives of the Training Shivaji University, established in 1962, is named after the · Train 2000 faculties 8. Matrices Preview Great Maratha Warrior and founder of the · Building networks of professional 9. Building Your First Matrix Chhatrapati Shivaji. It was inaugurated on 18th November, · Forming consortium of industries specialized in cyber security 10. Dictionaries in Python 1962 by Dr. Radhakrishnan, the then President of . One which will interface with Shivaji universityKolhapur 11. Matrix Operations of the major objectives behind foundation of this University · Sensitizing cyber security to masses at large for 12. Explore & Define a ML use case was to cater to the regional needs of South . The strengthening cashless transactions. 13. EDA and Feature Engineering jurisdiction of the University is spread over three districts viz. Eligibility: 14. Working on Machine learning using python Kolhapur, Sangli and Satara with strength of about 3,00,000 15. Importing data into Python students studying in 280 affiliated colleges and recognised Faculty Members from Science and Technology, Humanities, 16. Exploring your dataset institutes. For more details visit www.unishivaji.ac.in Social Sciences, Commerce and Management discipline from Universities, Colleges, N!Ts, IIITs, Engineering Colleges and 17. Filtering a Data Frame About Resource Centre In Cyb er Security& DataSciences other Institutions of Higher Education. 18. Renaming Columns of a Data-frame National Resource Centre In Cyber Security & Data As the number of participants is limited to 40, preference will 19. Exploratory Data Analysis Sciences is established under the guidance RUSA be given on First Come First Serve basis 20. Univariate Analysis Maharashtra from the grants received from the MHRD, Programme Schedule 21. Univariate Analysis 2 Government of India under the "Pandit Madan, Mohan (10· December 2018 To 16MDecember, 2018) 22. Simple & Multiple Linear Malviya National Mission on Teachers and Training 23. Regression (PMMMNMTT) scheme. Objective of this centre is capacity Day and Date Course Contents 24. Regression Demo building of human resource which is recognized as a critical Day 1: 25. Simple Network Servers element to strengthen not only the organization/ institutions Introduction to Python Monday,10/12/2018 26. Package Managers but even the people at grassroots level by spreading Day2: awareness Cyber security. There is a large gap between Machine learning using Python ""� demand and availability of trained human resource in Cyber Tuesday,11/12/2018 .:� ·:,,- _-:,- Security, who can beneficially utilize the available Day3: Registration: "' � �' information for cyber safety. Cyber security trained human Wednesday,1 2/12/2018 Data Analytics using Python Participants have to register through online web-portal only. �--::- � No need to send any printed documents to the Resource ;:::;-;---;::: resource is needed both as the provider and user of Day4: Technology. This is vital for sustainable development so that Hands-on session on Centre/Shivaji University. Registration link: Thursday,13/11/2018 Python informed decision making can be done at all levels. http://sangnaksuraksha.com/FacultyRegistration.aspx Days: About the Training Hands-on session on Machine Instructions for the Participants: Friday, 14/11/2018 Cyber security is need of the time, as estimated byNational Learning ❖ Attendance at all sessions is mandatory. Breakfast,Lunch Association of Software and Services Companies Day 6: Hands-on session on Data Analytics and Tea will be provided. (NASSCOM)'s Cyber security Task Force, there is need of 1 Saturday,15/12/2018 ❖ Outstation participants will be provided accommodation million trained cyber security professionals in India by 2025. Day7: Exam and Evaluation only on advance intimation. But, currently there are only 62,000, so to fill this gap there is Sunday 16/12/2018 Technical Requirements from participants: need to introduce cyber security courses at graduate and postgraduate levels. Our aim is to train teachers with practical The eligible candidates will be given confirmation is available ❖ Participants should carry their own laptop as well as - skills so that more and more cyber security experts can be on web-portal and it will also be informed through email. All debit cards, credit cards, payment wallets, netbanking, shaped every year. It is expected that the 'Train the Trainers' confirmed participants will have to submit a relieving letter UPI, mobile banking, paypal, aadhar, PAN card with them approach shall percolate to the students in colleges and make from their institution on the first day of the training. for sample demos them suitable to take up challenges in the domain of Cyber Laboratory assignments ❖ Participants should carry smartphone either android / Security which is the need of this decade and will thus 1. Introduction to Python . ios with them. improve their employability enhancing campus placement. In 2. Introduction to Machine Learning. ❖ Participant should focus on smartphone apps like addition, Cyber Security courses will help in start-ups and 3. Importing data using python for analysis Truecaller, PayTM, PhonePe, Google Pay, PayZApp, employment opportunities. The facultyshall be also trained 4. Exploring data sets for analysis Authenicator, Facebook, WhatsApp, lnstagram, Other specifically as knowledge creator with strong practical 'skills' 5. Working with loops, metrics, data submission financial or important apps. and theoretical details. 6. Building Data-Frames, merging data-frames and visualization with data-frames 7. Data analytics using python 8.

AboutShivaji University: Objectives of the Training 4. Collect the Owner's information using spyware. Shivaji University, established in 1962, is named after the · Train 2000 faculties 5. Steganography: Perform data hiding using covered Great Maratha Warrior and founder of the Maratha empire · Building networks of professional writing Chhatrapati Shivaji. It was inaugurated on 18th November, · Forming consortium of industries specialized in cyber security 6. Identification of virus infected file using virustotal.com 1962 by Dr. Radhakrishnan, the then President of India. One which will interface with Shivaji universityKolhapur 7. Understanding traceroute functionality using open of the major objectives behind foundation of this University · Sensitizing cyber security to masses at large for visual traceroute was to cater to the regional needs of South Maharashtra. The strengthening cashless transactions. 8. Vulnerability analysis in web application using Zed jurisdiction of the University is spread over three districts viz. Attack Proxy Kolhapur, Sangli and Satara with strength of about 3,00,000 Eligibility: Faculty Members from Science and Technology, Humanities, 9. Isolating WLAN Traffic using Separate Firewall for VPN students studying in 280 affiliated colleges and recognised Connection Social Sciences, Commerce and Management discipline from institutes. For more details visit www.unishivaji.ac.in 10. To Create a Virtual Private Network(VPN) over WAN Universities, Colleges, N!Ts, IIITs, Engineering Colleges and About Resource Centre In Cyb er Security& DataSciences 11. To evaluate application response time in the presence other Institutions of Higher Education. National Resource Centre In Cyber Security & Data and absence of a firewall. As the number of participants is limited to 40, preference will Sciences is established under the guidance RUSA 12. Managing Security in Small Business Network be given on First Come First Serve basis Maharashtra from the grants received from the MHRD, Programme Schedule 13. Security Group Policies Management Government of India under the "Pandit Madan, Mohan (01 January, 2019 To 7 January, 2019) 14. Group Policy management Malviya National Mission on Teachers and Training 15. ICMP Ping 16.Subnetting (PMMMNMTT) scheme. Objective of this centre is capacity Day and Date Course Contents 17. Firewalls 18.RIP building of human resource which is recognized as a critical Day 1: Introduction and 19. OSPF 20.VPN element to strengthen not only the organization/ institutions Tuesday, 01/01/2019 Computer Security- I 21. VLAN 22.Case study on IT Act 2000 but even the people at grassroots level by spreading 23. Case study on cyber attack / cyber crime awareness Cyber security. There is a large gap between Day2: Computer ""� demand and availability of trained human resource in Cyber Wednesday,02/01/2019 Security -I .:� ·:,,- _-:,- Security, who can beneficially utilize the available Day3: Network Registration: "' � �' information for cyber safety. Cyber security trained human Thursday, 03/01/2019 Security I Participants have to register through online web-portal only. ;:::;-;---;:::�--::- � resource is needed both as the provider and user of No need to send any printed documents to the Resource Day4: Network Security Technology. This is vital for sustainable development so that Friday,04/01/2019 II and Email Security, I Centre/Shivaji University. Registration link: informed decision making can be done at all levels. http://sangnaksuraksha.com/FacultyRegistration.aspx Days: Website About the Training Instructions for the Participants: Saturday, 05/01/2019 Security I Cyber security is need of the time, as estimated byNational ❖ Attendance at all sessions is mandatory. Breakfast,Lunch Association of Software and Services Companies Day 6: Website Security II and Tea will be provided. (NASSCOM)'s Cyber security Task Force, there is need of 1 Sunday, 06/01/2019 and Cyber Law, ❖ Outstation participants will be provided accommodation million trained cyber security professionals in India by 2025. Day7: Mobile Security only on advance intimation. But, currently there are only 62,000, so to fill this gap there is Monday, 07/01/2019 and Cloud Security Technical Requirements from participants: need to introduce cyber security courses at graduate and postgraduate levels. Our aim is to train teachers with practical The eligible candidates will be given confirmation is available ❖ Participants should carry their own laptop as well as - skills so that more and more cyber security experts can be on web-portal and it will also be informed through email. All debit cards, credit cards, payment wallets, netbanking, shaped every year. It is expected that the 'Train the Trainers' confirmed participants will have to submit a relieving letter UPI, mobile banking, paypal, aadhar, PAN card with them approach shall percolate to the students in colleges and make from their institution on the first day of the training. for sample demos them suitable to take up challenges in the domain of Cyber Laboratory assignments ❖ Participants should carry smartphone either android / Security which is the need of this decade and will thus 1. Installing, Configuring and Commissioning of Proxy ios with them. improve their employability enhancing campus placement. In Server using FOSS. Studying issues like Browser security, ❖ Participant should focus on smartphone apps like addition, Cyber Security courses will help in start-ups and email security, difference between http, https etc. Truecaller, PayTM, PhonePe, Google Pay, PayZApp, employment opportunities. The facultyshall be also trained 2. Perform port scanningusingNMAP(Network Mapper). Authenicator, Facebook, WhatsApp, lnstagram, Other specifically as knowledge creator with strong practical 'skills' 3. Analyse the network traffic using wireshark or any other financial or important apps. and theoretical details. network sniffer.

AboutShivaji University: Objectives of the Training 4. Collect the Owner's information using spyware. Shivaji University, established in 1962, is named after the · Train 2000 faculties 5. Steganography: Perform data hiding using covered Great Maratha Warrior and founder of the Maratha empire · Building networks of professional writing Chhatrapati Shivaji. It was inaugurated on 18th November, · Forming consortium of industries specialized in cyber security 6. Identification of virus infected file using virustotal.com 1962 by Dr. Radhakrishnan, the then President of India. One which will interface with Shivaji universityKolhapur 7. Understanding traceroute functionality using open of the major objectives behind foundation of this University · Sensitizing cyber security to masses at large for visual traceroute was to cater to the regional needs of South Maharashtra. The strengthening cashless transactions. 8. Vulnerability analysis in web application using Zed jurisdiction of the University is spread over three districts viz. Eligibility: Attack Proxy Kolhapur, Sangli and Satara with strength of about 3,00,000 9. Isolating WLAN Traffic using Separate Firewall for VPN Faculty Members from Science and Technology, Humanities, students studying in 280 affiliated colleges and recognised Connection Social Sciences, Commerce and Management discipline from institutes. For more details visit www.unishivaji.ac.in 10. To Create a Virtual Private Network(VPN) over WAN Universities, Colleges, N!Ts, IIITs, Engineering Colleges and About Resource Centre In Cyb er Security& DataSciences 11. To evaluate application response time in the presence other Institutions of Higher Education. National Resource Centre In Cyber Security & Data and absence of a firewall. As the number of participants is limited to 40, preference will Sciences is established under the guidance RUSA 12. Managing Security in Small Business Network be given on First Come First Serve basis Maharashtra from the grants received from the MHRD, Programme Schedule 13. Security Group Policies Management Government of India under the "Pandit Madan, Mohan (16 January, 2019 To 22 January, 2019) 14. Group Policy management Malviya National Mission on Teachers and Training 15. ICMP Ping 16.Subnetting (PMMMNMTT) scheme. Objective of this centre is capacity Day and Date Course Contents 17. Firewalls 18.RIP building of human resource which is recognized as a critical Day 1: Introduction and 19. OSPF 20.VPN element to strengthen not only the organization/ institutions Wednesday, 16/01/2019 Computer Security- I 21. VLAN 22.Case study on IT Act 2000 but even the people at grassroots level by spreading 23. Case study on cyber attack / cyber crime awareness Cyber security. There is a large gap between Day2: Computer ""� demand and availability of trained human resource in Cyber Thursday,17/01/2019 Security -I .:� ·:,,- _-:,- Security, who can beneficially utilize the available Day3: Network Registration: "' � �' information for cyber safety. Cyber security trained human Friday,18 /01/2019 Security I Participants have to register through online web-portal only. ;:::;-;---;:::�--::- � resource is needed both as the provider and user of No need to send any printed documents to the Resource Day4: Network Security Technology. This is vital for sustainable development so that Saturday,19/01/2019 II and Email Security, I Centre/Shivaji University. Registration link: informed decision making can be done at all levels. http://sangnaksuraksha.com/FacultyRegistration.aspx Days: Website About the Training Instructions for the Participants: Sunday, 20/01/2019 Security I Cyber security is need of the time, as estimated byNational ❖ Attendance at all sessions is mandatory. Breakfast,Lunch Association of Software and Services Companies Day 6: Website Security II and Tea will be provided. Monday,21/01/2019 (NASSCOM)'s Cyber security Task Force, there is need of 1 and Cyber Law, ❖ Outstation participants will be provided accommodation million trained cyber security professionals in India by 2025. Day7: Mobile Security only on advance intimation. But, currently there are only 62,000, so to fill this gap there is Tuesday, 22/01/2019 and Cloud Security Technical Requirements from participants: need to introduce cyber security courses at graduate and postgraduate levels. Our aim is to train teachers with practical The eligible candidates will be given confirmation is available ❖ Participants should carry their own laptop as well as - skills so that more and more cyber security experts can be on web-portal and it will also be informed through email. All debit cards, credit cards, payment wallets, netbanking, shaped every year. It is expected that the 'Train the Trainers' confirmed participants will have to submit a relieving letter UPI, mobile banking, paypal, aadhar, PAN card with them approach shall percolate to the students in colleges and make from their institution on the first day of the training. for sample demos them suitable to take up challenges in the domain of Cyber Laboratory assignments ❖ Participants should carry smartphone either android / Security which is the need of this decade and will thus 1. Installing, Configuring and Commissioning of Proxy ios with them. improve their employability enhancing campus placement. In Server using FOSS. Studying issues like Browser security, ❖ Participant should focus on smartphone apps like addition, Cyber Security courses will help in start-ups and email security, difference between http, https etc. Truecaller, PayTM, PhonePe, Google Pay, PayZApp, employment opportunities. The facultyshall be also trained 2. Perform port scanningusingNMAP(Network Mapper). Authenicator, Facebook, WhatsApp, lnstagram, Other specifically as knowledge creator with strong practical 'skills' 3. Analyse the network traffic using wireshark or any other financial or important apps. and theoretical details. network sniffer. FACULTY DEVELOPMENT PROGRAMME ON RESEARCH METHODOLOGY AND DATA ANALYSIS USING SPSS FOR MANAGEMENT TEACHERS 5TH TO 9TH January 2016

‘A’ Re-accredited by NAAC (2014) with CGPA-3.16 Organised by MBA Unit Department of Commerce & Management Shivaji University, Kolhapur. Maharashtra. 416004 About University Shivaji University, established in 1962, is named after the Great Maratha warrior and founder of the Maratha EmpireChhatrapatiShivaji. It was inaugurated on 18th November, 1962 by Dr. Radhakrishan, the President of India. One of the major objectives behind foundation of this University was to cater to the regional needs of South Maharashtra. The jurisdiction of the University is spread over three districts viz, Kolhapur, Sangli, Satara with strength of about 3,00,000 students studying in 271 affiliated colleges and recognized institutes. The University imparts education in 10 major faculties of Arts, Social Science., Science, Commerce, Education, Fine Arts, Law, Medicine, Ayurvedic Medicine, Engineering and Technology. University has been ‘A’ Reaccredited by NAAC (2014) with CGPA 3.16.The University which was founded primarily to cater to the regional aspirations has now geared up to transcend this regional image and emerging as one of the premier institutes of higher education and research in India. About MBA Department The MBA Unit is established in 2004 under the edges of Department of Commerce and Management. The MBA course is approved by AICTE. The intake capacity of MBA is 60. The MBA course is of two years, divided in four semesters. Each semester is having eight subjects which includes on paper of project report & viva. The department offers dual specialization for MBA students. The department is following choice Based credit system.The department conducts various programmes for the students to enrich their knowledge and skills. About the FDP - Research is an important source of knowledge. In order to conduct a research in management, one is required to be thorough in various research approaches and techniques. The workshop is designed for the academicians to develop their knowledge and ability to undertake research in management and to provide expert knowledge on different research methods and data analysis in diversified areas of management. The programme will guide and equip the participants to design and conduct research projects, research papers and Ph. D. Objectives of the FDP – 1. To develop a deep understanding of the research methodology. 2. To equip the participants with the various data analysis techniques. 3. To develop the competence in the application of SPSS for research in management. Its importance and relevance – The complex business environment of today is marked by many challenges making managerial decision process more difficult. Research is an important tool for enhancing managerial decision making. Further management is an emerging area in academics. This FDP will equip the academicians with the research and data analysis techniques which will enhance the research approach in the area of management. FDP Schedule - Important Dates- Last Date of Registration 18th Dec. 2015 FDP Dates 5th to 9th Jan. 2016 ...... Registration Fees – Rs. 3500 per participant The seat available for the FDP is 30 on First Come First Serve Basis. Accommodation Facility – The outstation participants will be provided accommodation in the university guest house on twin sharing basis by paying the extra charges as per University rules. Mode of Payment – Registration fee can be paid by demand draft in favour of ‘Finance & Accounts Officer, Shivaji University, Kolhapur’ payable at Kolhapur. Send the DD along with registration form to Dr. H. M. Thakar, Director, MBA Unit, Department of Commerce & Management, Shivaji University, Kolhapur, Maharashtra. 416004. OR You can also pay through e-banking in the name of FAO, Shivaji University, Kolhapur. Our bank information is as follows: Name of the Bank Account Number IFSC Code Uco Bank, Kolhapur 02890200000001 UCBA 0000289

Please send scanned copy of bank payment receipt along with registration form through FDP e- mail ID failing which it will be difficult to confirm your registration Chief Patron Prof. (Dr.) D. B. Shinde, Hon’bleVice Chancellor, Shivaji University, Kolhapur...... - Conference Convenor - Dr. H. M. Thakar, Director, MBA Unit, Deptt. Of Commerce & Management ...... - Organising Committee - Dr. (Smt) D. R. Ingavale Ms. G. V. Kharge Ms. S. S. Kamble Mr. S. V. Ravan ...... Contact – Dr. H. M. Thakar Director, MBA Unit, Department of Commerce &Management , Shivaji University, Kolhapur. 0231- 2609375 E Mail - [email protected] Note: Attendance is compulsory for all sessions. REGISTRATION FORM

FACULTY DEVELOPMENT PROGRAMME ON RESEARCH METHODOLOGY AND DATA ANALYSIS USING SPSS FOR MANAGEMENT TEACHERS

5TH TO 9TH January 2016

Name of the Participant: ...... Designation: ...... Institute/ College/ University/Organization: ...... Mailing Address: ...... City: ...... Postal Code: ...... Telephone: (O) ...... (M) ...... Email: ...... Availing Accommodation Facility: Yes No Registration Fee Details: Amount - Rs. 3500 Mode of Payment- DD ...... E- banking - ...... D D No.:...... Dated: ...... Bank...... Through e- banking - Transferred to the bank account ...... on / /

Signature

‘Emerging Trends in Information Technology in University Management August 28-30, 2017 Hosted by Shivaji University, Kolhapur

A National Workshop on ‘Emerging Trends in Information Technology in University Management’ was organized by Association of Indian Universities (AIU), New Delhi in collaboration with Shivaji University, Kolhapur on August 28-30, 2017. The venue was Department Computer Science, Shivaji University. The event witnessed participation of total 38 university officials and IT administrative staff members from reputed universities and institutes across India. The participants were mostly serving as Controllers of Examinations, Deputy Registrars, IT Managers or Programmers in their respective universities.

The workshop was e-inaugurated by Prof. D T Shirke, Pro Vice Chancellor of Shivaji University. Prof. R R Mudholkar, Computer Science Department of Shivaji University and Coordinator of workshop welcomed and felicitated all the dignitaries on the stage. Dr Amarendra Pani, Deputy Director and In Charge, Research Division of AIU, Dr V D Nanavadekar, Registrar, Shivaji University, Kolhapur and Dr. Usha Rai Negi, Assistant Director, Research from AIU were amongst dignitaries present during the inaugural function.

Dr Amarendra Pani, Deputy Director and Incharge, Research Division, AIU unfolded the crux theme of the workshop. He explained that the technological revolution in the form of Information and Communication Technology (ICT) has brought revolutionary changes in the management of institutions of higher learning. Hence, a pressing need was felt to orient and sensitize the administrators about the recent developments in information technology and make them maximize the utilization of ICT for improving the quality and efficiency of university management and decision-making. Following the Inauguration the Technical sessions were started.

In the first Technical session Dr B M Hirdekar, Registrar, Sanjay Ghodhawat University, Kolhapur presented different perspectives of e-learning and record keeping of students. The session was chaired by Prof P S Patil, Dean of Science and Technology Faculty, Shivaji University, Kolhapur. Dr Deepak Shikarpur, IT Evangelist, Entrepreneur, Writer and Social Activist from Pune spoke in Session-II, emphasizing on innovative infrastructure for ICT implementation. This particular session was chaired by Prof (Mrs.) P S Patankar, Department of Education, Shivaji University, Kolhapur. Session- III & IV were designed thoughtfully to be interactive sessions encouraging participation from attendees and encompassed the software demonstration of Smart Interactive Digital board with inbuilt processor. The participants were invited to share their views and the practice and provision of digitization process and status of progress attained in their respective universities. These session via active participation of attendees turned out to be lively and resulted in transfer and sharing of best practices. Day-1 ended with local site seeing and visit to the fort Panhala.

On 29th August, Prof S P Pani, Utkal University, Bhuvneshwar provided a detailed account on chronology of technological transformation in IT and shared his views about difficulties faced in digitization of university sections. He highlighted many points and examples of practical implementation of digitization based on his own experiences. Session-II was chaired by Prof P N Vasambekar, Department of Electronics, Shivaji University, Kolhapur. Mr. Mahesh Kulkarni, Associate Director, C-DAC, Pune, spoke and discussed about ERP solutions available to University Management. This session turned out to very interactive session with ample queries from participants. Session-III and IV were dedicated to software demos on University Management developed by C-DAC, Pune. Issues faced during automation of university administration were discussed with participants cum IT Officers. Day-2 concluded with small summarization of days activities by Prof Mudholkar.

On 30th August, Dr Atul Wadegaonkar, General Manager, Digital University Business Development Program, Maharashtra Knowledge Corporation Limited (MKCL), Pune was the invited speaker in Session-I. He shared his ideas of university digitalization. Participants were encouraged to share their ideas during interactions. This session was chaired by Prof A M Gaurav, Head, Department of Commerce, Shivaji University, Kolhapur. Session-II was an online-session by Shri Rajesh Aggarwal, IAS, Joint Secretary, Ministry of Tribal Affairs, Government of India, New Delhi who conducted it through Skype and this particular session was chaired by Prof K D Sonawane, Head, Department of Microbiology, Shivaji University,Kolhapur. He elaborated on the online Pre and Post examination system. He advised the participants on how they can play their roles effectively in University digitization system.

Session-III after lunch was dedicated to software demo of software’s developed by MKCL, Pune. Start- to-End digitization of student registrations till he/she passes out from University was also demonstrated. It also included computerization of unabridged examination system. In final Session-IV Prof. D T Shirke focused on creation of central database of all teachers in all Universities and affiliated Colleges of India. He further discussed about the issues involved in updating the database. This session was chaired by Prof. D M Kashid, Head Department of Statistics, Shivaji University, Kolhapur.

The third day of the workshop was concluded with Valedictory Function with Mr. Mahesh Kakade, Director, Examination and Evaluation, Shivaji University, Kolhapur as the Chief-Guest. Prof. Mudholkar welcomed the chief guest and participants to the valedictory function. Dr Amarendra Pani presented the overall proceedings of workshop. He expressed happiness over the overall conduction of workshop. Participants in their feedback expressed the satisfaction and suggested for frequent holding of such workshops. They were satisfied with workshop contents as well as hospitality rendered during the workshop. Dr. VS Kumbhar introduced the Chief Guest. The Chief Guest highlighted the progress in digitization of Shivaji University Examination and SRPD system. The Function concluded with vote of thanks proposed by Mr. Kabir Kharade. Participants dispersed after group photo session and certificate distribution. Dr. (Smt.) U. R. Pol, Dr. (Smt) K. S. Oza, Mr. P. T. Goyal, Mr. P. S. Vadar, Mr. Parasuram, Mr . P. S. Karmarkar who were the faculty members and Mr. Korvi and office staff of Department of Computer Science, Shivaji University, Kolhapur contributed towards hosting the workshop successfully. The Department of Computer Science, Shivaji University, Kolhapur expressed thanks to AIU for assigning the workshop in particular to Dr Amarendra Pani, Dr. Usha Rai Negi and Prof. Devanand Shinde, Hon’ble Vice- Chancellor, Shivaji University, Kolhapur and other authorities for extending the motivation and support in successful hosting the workshop.

MBA Unit, Department of Commerce and Management, Shivaji University, Kolhapur. CASE WRITING WORKSHOP 30th to 31st Oct. 2018

Workshop Report

Case writing workshop was conducted by the department in association with S. P. Jain Institute of Management and Research. On the first day Dr. A. B. Kulkarni guided participants regarding case analysis and case writing. Dr. Rajiv Agarwal dealt with identification of the area for case writing and the contents of the case. Groups of the participants were prepared and they were asked to develop the synopsis for the case. On the second day discussion was done on the case synopsis prepared by the participants in the group and revisions were made in the case. The workshop was activity based in which participant learned to write case studies for effective teaching. A Report of Two Day’s Workshop cum Training Programme on Empowering Teaching by Development of e-Content (29 th and 30 th March, 2019)

Venue: Centre for Distance Education (CDE), Shivaji University, Kolhapur Organized By: Centre for Distance Education and Barr. Balasaheb Khardekar Knowledge Resource Centre (BBKKRC), Shivaji University, Kolhapur

The Indian education system is passing through revolutionary stage due to the advent of new and innovative concept like e-learning. Hence to improve the capability of teachers in development of e-content; CDE in collaboration with BBKKRC, Shivaji University, Kolhapur organized two days workshop cum training programme on ‘Empowering Teaching By Development of e- Content.’

DAY 1:

Inaugural Function:

For this workshop cum training programme’s Inaugural Function; Hon’ble Pro-Vice Chancellor, Prof. (Dr.) D. T. Shirke was present as the chief guest. For giving the message ‘Save Trees, Save Planet’; the inauguration took place by offering water to the plant by all the dignitaries present for this session. Prof. (Dr.) M. A. Anuse, Director, CDE, Shivaji University, Kolhapur; has delivered introductory speech giving information about the objectives behind the organization of this workshop. Then Dr. Namita Khot, Director, BBKKRC, Shivaji University Kolhapur, has given orientation speech by giving useful information about guidelines by Govt. of India regarding online learning. Then Dr. N. J. Bansode, Deputy Registrar, CDE, Shivaji University, Kolhapur, introduced the chief guest mentioning their contribution to the area of e- content and its implementation. The chief guest; Hon’ble Pro-Vice Chancellor; in his inaugural speech; described the difference between external education system and today’s CDE education system by giving focus upon access to new technology regarding e-learning. He has given new vision regarding e-content development in regional languages to help distance learners for breaking the barrier of language. Then Dr. (Smt.) R. U. Sankpal, Co-ordinator of this Workshop has proposed the vote of thanks to all and concluded the inaugural session.

1

Workshop Sessions

First session was dedicated to ‘e-Content Development Stages’. This session was conducted by Shri. Shrikant Thakkar from EMMRC, Pune as a resource person. He focused upon general stages that are required for e-content development. He explained basic steps which are essential for development of e-content.

Next session is also conducted by Shri. Shrikant Thakkar from EMMRC, Pune and he emphasized upon ‘Developing the Transcript’. He explained the difference between e-content transcript and academic transcript along with the discussion about nature of transcript during development stages.

After that Shri. Vinod Kalagi, resource person from EMMRC, Pune conducted session on ‘Various Formats of Presentations’. He discussed important components which are considered during development of e-content.

Second-Last session of day 1 was dedicated to the topic namely ‘Use of Graphics / Animation’ during development of e-content and this session was conducted by Shri. Vinod Kalagi. He introduced various tools and techniques related to utilization of graphics using background sound/ voice. Along with it, he has given information about various websites giving full idea about free data repository / Open resourses useful for e-content development.

Last session of day 1 was organized at Recording Room of Department of Music and Drama of Shivaji University, Kolhapur. In this session, participants got exposure regarding scenario of actual recording.

DAY 2:

Workshop Sessions:

First session conducted by Shri. Shrikant Thakkar and he focused upon ‘Examples of e- Content’. During this interesting session, he prevented various live examples of e-contents, transcripts etc. to the participants.

The theme of next session was ‘Use of Power-Point’ for development of e-content. This session conducted by Shri. Vinod Kalagi. He has been given important information about use of linkages and visuals within the power-point slides.

Later, the live session has conducted to get hands on practice regarding ‘Recording Vidoe as per Transcript’. Sample recording has been done with the help of transcript prepared by one of the participant. General guidelines were given by both the resource persons to all participants regarding precautions that should be taken into consideration during transcript recording.

2

Last session was interactive session. All the doubts of participants have been cleared by both the resource persons. Resource Persons encouraged all participants for better e-content development.

Valedictory Function:

Chief guest for this function was Prof. (Dr.) V. D. Nandavadekar, Registrar of Shivaji University, Kolhapur. He shared his experiences related to online learning as well as e-content development during his previous work duties and Ph.D. research. He encouraged participants to take active part in 21 st Century’s advanced learning movement. After his speech he also appreciated the feedback received from participants of this workshop. Almost 94 % participants were given ‘good or above good’ feedback which can be treated as receipt from them for organizing such innovative, revolutionary workshop on e-content development. On the diace all the participants honored with participation certificate by the auspicious hands of all dignitaries present for this session. For this session, Prof.(Dr.) M. A. Anuse, Director, CDE,; Dr. Namita Khot, Director, BBKKRC; Dr. N. J. Bansode, Dy. Registrar, CDE, Dr. (Smt.) R. U. Sankpal along with the Resource persons from EMMRC, Pune i.e. Shri. Thakkar and Shri. Kalagi were present. Both of them expressed their views about conduction of this workshop and addressed the participants to work seriously for e-content development.

Thus, this workshop completed successfully by achieving the desired objectives which are decided while organizing such value-adding event.

*****

3

PMMMNMTT Faculty Development Centre in Cyber Security & Data Sciences Faculty Development Program on Cyber Security during 26th November to 2nd December 2018 Hosted by Department of Computer Science, Shivaji University, Kolhapur Report

Cyber security is need of the time, as estimated by NASSCOM‟s Cyber security Task Force, there is need of 1 million trained cyber security professionals in India by 2025. Butcurrently there are only 62,000, so to fill this gap there is need to introduce cyber security courses at graduate and postgraduate levels. Our aim is to train teachers with practical skills so that more and more cyber security experts can be shaped every year. It is expected that the „Train the Trainers‟ approach shall percolate to the students in colleges and make them suitable to take up challenges in the domain of Cyber Security which is the need of this decade and will thus improve their employability enhancing campus placement. First FDP on cyber security was conducted from 26th November 2018 to 2nd December 2018 at Department of Computer Science, Shivaji University, Kolhapur. Day - 1: 26 November 2018 Day 1 started by extending warm welcome to the participants and briefing them about cyber security domain by Dr.R.K.Kamat, Chief Investigator of the Project as well Coordinator of the FDP.

Each day is divided into four sessions with theory and practical‟s. Session 1- NASSCOM Resource Person- Mr. Dinesh Panigrahi

NASSCOM is established in 1989 under the Chamber of Commerce for IT field. Mr. Dinesh Panigrahi shared the information regarding policies of NASSCOM and its functions. He also cleared the certain terms like IT, ITesnad QP (Qualification Pack). During his session he covered points like job skills required for IT person. Session 2-Statistical analysis of cyber crimes Resource person- Mr. Yashodhan Vaidya (Digital Task Force)

Mr. Yashodhan Vaidya stated that malware and ransomware are the major threats for the devices. Malware is the cyber attack that misplaces the files, personal information from the laptop while ransomware can be considered as a data kidnapping that locks down the laptop and asks for the bribe in the form of bit coins to recover all the data. The percentage of cyber attacks are 36% which can be increased to 56% by 2019. The statistical analysis of cyber crimes were explained by the resource person. The data covered was in the year of 2014-2016. Mr. Yashodhan Vaidya informed that highest cyber crimes were registered in Maharashtra (1879) in 2014 year which is followed by UP (1737) and Karnataka (1020) while in 2016,UP was having highest cyber crimes (2639) followed by Maharashtra (2380) and Karnataka (1101). It was said that Jamadara district in UP is having highest cases of cyber crimes. Cyber crimes can be done for following purposes,  Cyber terrorism (48%)  Disruption (53%)  Financial gain (93%)  Defamation (57%)  Fun (32%)  Fraudulent activity (68%) Cyber crimes can be done in following ways,  ATM hacks (73%)  Phishing (47%)  Data theft (40%)  Electronic forgery (33%)  Malware/ spyware (33%)  Ransomware (27%)

Session 3- Cyber Security Resource person- Mr. Rohan Nyayadhish (Expert Security Advisor- DTF)

Mr. Rohan Nyayadhish explained the term hacking that it is intentionally or non- intentionally taking, altering, destroying, deleting data. He explained the loop holes in the system that can harm the device. Weak password, stupidity of individual can put his/her device and ultimately life in danger. He explained cyber crimes by giving some examples like bank frauds, attack of 26/11, blackmailing, destroying someone‟s personal integrity.

Session 4- Google application Resource person- Mr. Amar Thakare (Cyber Forensics Investigator, MH police)

Google applications like Google photos, location history, and IP address were seen in the session. Practical sessions were carried out on howsecureismypassword.net, pic2map.com and OSINT techniques. Mr. Thakare also explained the ways to secure ATM and mails by strong password. Day - 2: 27 November 2018 Session Coverage :All the sessions of 2nd day of this astonishing FDP are covered by Mr. Ali, Mr.Abhijit and Mr.AmarThakare. Session-I: Session is started by Mr.Ali ,Cyber Security Analyst, Digital Task Force.He spoke about mobile security, various android versions with there permissions also guided all the participants how to stay secure with our facebook and whatsapp account with two step verification.Hon. Vice Chancellor Dr.DevanandShindeSir appreciated and encouraged participants.

Session-II: Mr.Abhijit gave demonstration of mobile hacking by metasploit framework, how the victim‟s mobile can be hacked unknowingly and hacker can get access of all the data like contact details, sms, photos etc.; he can also get control on camera and various mobile settings. He showed demonstration with the mobile two of the participants

Session-III: This session is followed by Panel discussion on Syllabus framing in the treasured presence of Panel Members: Dr.R.K.Kamat, HOD, Computer Science Department, Shivaji University, Kolhapur. Mr. Amar Thakare, Cyber Forensics Investigator, MH-Police (Empanelled CID, EOW) Mr. Rohan Nayadhish, Digital Task Force. Mr.Yashodhan Vaidya, Digital Task Force, Research & Cyber Crime Analysis, Education Head. Mr.ShaileshBandekar, Proprietor Infoways Solutions. Mr.Omkar Deshpande, Expert IT Association. Dr.Kavita Oza Assistant Prof. Computer Science Department, Shivaji University, Kollapur. ------

Dr.R.K.Kamat welcomes the panel members, participants and declared the panel discussion is open. He expressed that the discussion would contribute to create awareness of cybercrime and how to design ideal curriculum to bridge gap between syllabus and industrial needs.

Mr. Rohan Nayadhish discussed about hardware, software network resources needed for providing training to the students on cyber security. He has suggested implementation of different Digital Forensic Toolkit (FTK), Dr.Fone, Universal Forensic Extraction Device' (UFED) for providing training on mobile phone security. He also discussed jurisdiction and authority problem of open source software. He was suggested to include IT Act 2000 in curriculum to create IT awareness among students. It helps to develop computer security professionals. He also talked about importance of hash value in cyber security.

Dr.Kamat sir raised question regarding how to delete data from google drive when our data is locked by unauthorized user. Mr. Rohan Nayadhish provided solution to this problem; he said you can communicate with ISP about problem so they can request to Nodal officer of Google to unlock our data within 36 Hrs by providing valid authentication proof to protect misuse of authorized persons data.

Mr.Omkar Deshpande highlighted that the students domain knowledge about networking, hardware devices, proxy, firewall will be needed to be considered while designing curriculum. He also suggested including some prominent cases on current scenario happened in cyber crime to create awareness among students. He emphasized that it‟s a good practice to read carefully software declaration and authentication details before installing any software. He pointed that Google is a search engine so every time you can‟t trust on it, but you can take help of authenticate sites which gives us correct data.

Mr. Rohan Nayadhish asked questions to the participants about difference between sleep and hibernate mode of according to security points of view. Participants involved in discussion with their opinion. Mr. Ali guided participants about pros and cons of these modes. He recommended Microsoft Computer Online Forensic Evidence Extractor (COFEE) tool to gather evidence from windows system and FtkImager, DumpIt tools for volatile memory recovery.

Dr.KavitaOza suggested that step wise flow of curriculum is important that should starts with basics of networking, hardware devices, risk assessment, IS/Audit. She also highlighted that curriculum should be useful for deciding career path of students.

Mr.ShaileshBandekar added that in order to make cyber security education step by step and effective, there is a need to be a clear link between domain and advanced concepts as per industrial requirements. He said students should learn IT Act because it is very important to follow while working in cyber security domain. He also discussed one of the case college students about how they were misused their cyber crime knowledge. Mr. Amar Thakare mentioned the importance of IPR, Patents, Copyright in cyber crime curriculum and also highlighted importance of IT ACT 2000. Participants asked about authenticity of software which can be downloading from internet. Mr. Rohan Nayadhishelaborates example of Torrent Software for downloading movie and how it sending payload data back to client machine from remote server. There is specific intention behind free software to trap users directly or indirectly. He was encouraging participants to download only licensed software to protect our device/machine from cyber criminals‟ trap. Mr. Amar Thakare conducted web based FAQ on cyber security on Kahoot.it. All participants actively participated in Quiz. Dr. R.K.Kamat extended his gratitude to the participants of panel discussion. He suggested participants to communicate with experts via email and share further ideas and findings. In his concluding word, Dr.R.K.Kamat expressed full satisfaction with the result of discussion. He said all inputs from experts and participants will be considered for designing curriculum of cyber security. While designing curriculum we will try to include basics of hardware devices, network functionalities IT ACT and essential tools for cyber security like FTK, Digital forensic tools, mobile security, net banking security as well as current case studies on cyber crime to create awareness among the students. Curriculum will be design according into basic, intermediate and advance level. Hands on experiments will be included in the curriculum to develop computer security professionals. He said purpose of this FDP is to train teachers of various discipline in order to create awareness among students to protect from cyber-crime traps. He said that the relation between academic and industrial experts in cyber security with Shivaji University, Kolhapur will be even more strengthened in framing curriculum of cyber security in future. Session-IV: After that Mr. Amar Thakare gave guidance for using various tools to extract forensic data from computer, to uncover hidden data.All participants demonstrated various things like: • IP grabbing • Using of Proxy server • Creating Fake Airline Ticket • Image Tracking • Use of OSINT Search tool for Reverse Engineering (To trace social sites, Email, Image, Video, Domain etc.) All participants practically carried out the all the things taught in a day. Hackers are becoming more organized and cyber-crimes are going on magnifying. So we have to make sure that our Cyber Security must be rigid, for this we must know about the possible risks and the various faces of cyber-attacks also. As we are suffering from these sever cyber-attacks, just any security organization should not be responsible for the cyber security but everyone should be aware of this. Day - 3: 28 November 2018 Name of Resource Person - Mr. Dinesh DayanandKudache , Cyber Security Expert , Sangli

Mr. Dinesh Kudache conducted session on Web Security.He briefed about his work in cyber security area., Web site security threats , Key logger software's,He explained with hands on experience on vulnerabilities detection of web sites, Analyzing web sites, Tracking various activities on web sites.He gave demonstration of Google Analytics - Web pages searched, Puting scripts on web sites .He also explained about Google Web Master tools for tracking unauthorized access , Google boat software's, Searching and visiting each page of web sites ,Web Spiders,Affiliated marketing with various real life example and hands on experience on google analytics. Bit Coin threats Antivirus security limitations Google extensions Page ranks Computing history museum Do and Dont Tips for Cyber-security Copyright registrations Over all Session was very informative, interactive and knowledgeable.

Day - 6: 29 November 2018 In recent years, headlines about cyber security were increasing. Therefore, today, it is a need to educate you about cyber security. Because the more you know & understand about the subject better you have chance of staying protected.

The cyber security faculty development workshop gave the great opportunity to all faculty members to get deep knowledge about cyber security. But when we learn cyber security it is necessary to have the knowledge about cyber law because cyber security can't be completed without cyber law. Taking into account this need, on the day 29th Nov 2018, a special resource person Mr.PrashantJhala was invited to cover a subject area of cyber law. Mr.PrashantJhala is a law graduate from govt. college of Mumbai with over 25 years of work experience. He is expert in the field of cyber law and cyber crime investigation. He is also a member of Mumbai Police Public Committee.

Session 1:

Mr.PrashantJhala started his session from the scratch of cyber law. He gave brief knowledge about cyber law, importance of cyber law and IT act 2000.After that he delivered the information about cyber attacks such as Email Spoofing, Money Mules, SMS Spoofing.

Session 2 :

In the next session, he focused on subject like Cat Fishing, Email Frauds, Cyber Defamation, Financial Frauds/Crimes/Scans, and Multilayer Marketing with example.

Session 3:

During the 3rd sessions , he shared his experiences, live case studies about the cyber crimes. Also he gave the knowledge about most popular cyber attack like Phishing, Vishing, Smishing, Social Engineering, Juice Jacking, Steganography and Computer Contaminants such as Worms, Virus, Trojans, Malware, Spyware, Keyloggers, Skimmers, Zero Day Attack.

Session 4: In the last session Mr.PrashantJhala covered the IT act 2000 in brief. He told us the various rules and regulations of sections like section 65, section - 66A, section - 66B, section 43(a)-(j) section - 66C, section - 66D, section - 66E, section - 67, section - 67A, section - 67B and section 80.

Day - 5: 30th November 2018

Speakers: Mr.Amar Thakare, Mr.GanesanRamani and Mr. G C S Sarma

Session I started at morning 10:00 am by Mr. Amar Thakare. As he has explained about OSINT Tools. With reference to it the task was given to the participants in group. The task was to handle four cases. Case 1 use of Image Reverse Tool, Case 2 Video Reverse Search Tools, Case 3 Domain Search Tool and Case 4 Social Media Search Tool. The task was performed by the participant and they discussed about it with the other groups. At the same time Mr. Amar Thakare received Phone call mentioning the email hack. Mr Thakare put the call on speaker so that we can understand how the live case is registered told with the investigator. The case was fake mail was created for demanding money and the company has already issued two cheques of Rs 20,000/- in response to the fake mail. When it has came to know the company owner called for help. With this we understood how the scams take place.

Mr Thakare has given us another task of getting signed in our mail and checking the originality of the received mail by using email tracer and getting IP address with traced path. When IP address have found, we can easily find location of IP using IP locater in OSINT. Session 2– Mr.GanesanRamaniIT advisor from NASSCOM. GanesanRamani has stated the importance of information security. Now-a-days Cyber Security in academics is the need of an hour. He started his session on Cyber Security Task Force. In their training skill programming focuses on whatever topics relevant to industry have been covered. Their biggest advantage is to make “India a global hub for Cyber Security products and services”. They say “scan the technology and bring it in academy”.

He further throws light on Cyber Security role map in which various career opportunities for students in the era of Cyber Security. Now-a-days companies are placing job for Cyber Security as Cyber Security Analyst etc. according to him today the three major working sectors in IT are Cyber Security, Data Science and Artificial Intelligence. There is National Skills Qualifications Framework in which skill level are placed against which skill domain. The framework can also use the existing employees who want to improve their job level. Cyber Security is very highly paid industry today.

Session 3 Network Security by GanesanRamani, in this session speaker has highlighted information security principle required for Network Security. He has given example for each principle for confidentiality of information, integrity, availability of information along with the information security services like Authentication, non-repudiation, access control etc. he has discussed following in this session. Network Management, Security Attacks, Network Security Problems, Security Management, process flow of vulnerability assessment and penetration testing. After this there was time for questions. Some questions were raised by the participants and the session was interactive.

Mr. G. Ramanialso talked about Log Generation & SIEM.He has highlighted these key points in his session started basic of log management, logging sources, basics of SIEM i.e. Security information and Event Management, Architecture of SIEM and finally explained SIEM implementation models respectively. The session was interactive and questions were asked by the participants and answers were given with simple examples.

Session 4 Effective Communication by Mr. GCS Sarma.

The speaker has more than 30 years of experience in audits for banks and for Cyber Security as introduced by Dr. R. K. Kamat he was very rich in his academic qualification. Mr.Sarma has briefly elaborated the concept of effective communication and the need for today‟s scenario. He performed a communication game with the participants to describe the thorough importance of communication and how does it transfers from one person to another.

The effective communication leads to right decisions he said. In this session he focused on the following key points: keys to active listening, improving the personal effect, Barriers for communication, the different senders and receiver‟s responsibility towards having effective communication.

After Tea break Mr.Sarma continued the session with ISO i.e. Information Security Management System. He exactly given definition of ransomware as “Data kidnapping‟. Also he started basics of Data, information and Information security. He has focused in detail the following points Information Security management system which is based on business risks, Information Security Policy, measures to protect the Information, Information Security spectrum including Data security, Network security, cyber security and Information Security. He stated with example benefits of Information Security to each company. Also stressed fundamentals ISO 27001. The various management controls also were discussed. Different Information Security incident handlings with data life cycle model at last.

He concluded that “A Cyber attack at your company is no longer a question of if, but when. Start planning for it today”

Day - 6: 01 December 2018

This Workshop in cyber security awareness training lead to sustained security practices that reduce the risks faced by individuals and businesses using internet-connected devices for private or business use. All the resource persons engage participants in meaningful, relevant scenarios that clarify many of the complexities involved in cyber security. All Workshop attendees have acquired a deeper understanding of the need to conduct a thorough cyber security risk assessment, and got the knowledge about various tools to do so. Through discussions, simulations, and demonstrations, workshop offered attendees an opportunity to ask questions, as well to share ideas and information on the latest and best network security solutions and services available, and how they can be used to mitigate the risks. Session Coverage First two sessions of 6th day of this workshop are covered by Mr.GanesanRamani, Mr. G. C. S. Sharma and last two sessions are covered by Mr. Amar Thakare.

Session-I: Session is started by Mr.GanesanRamani, Master trainer from NASCOM with Information secirity with his views and remarks in incident response and digital forensic capabilities. He gave definition of incident management and incident response also explained some of the threaths like Ransomeware, Brute force attach and so on. He suggested some personnel with their position roll and responsibilities. He spoke about digital forensic capabilities then he explained traces in digital media. At last, he discussed life cycle of digital forensic, tools and scenarios can be applied. Session-II: Mr. Sharma gave presentation on business continuity management process on desaster recovery porcess (BCP and DRP). Later he explained difference between them. In BCP section he explained thrates to availabilities and conclude with need of BCP. In DCP section he suggested some goals and scopes for business and moreover audit of DR and BR. Session-III: In the post lunch sesstion on Mr. Amar Thakare, demonstrated the use softwares Rufus and YUMI. Rufus is a simple software to make USB dirves bootable on single OS. YUMI is an advanced software to make USB drives a multiboot media. He also covered in the same session the use trinity rescue kit. Participants had hands on experienced with these softwares and queries were cleared by Mr. Amar Thakare. Session-IV: In this session Mr. Amar Thakare gave demonstrated how to install Kali Linux and various tools available for Cyber Forensics. Also OWASP was covered in detail to demonstrate website hacking. Later on all teams of 6 participants each were formed and given one assignment related to Cyber Seciruty. Day - 7: 02 December 2018 On the day 7th, of FDP on Cyber Security, 1st session was inaugurated with the warm welcome and offering a Memento to the keynote speakers Prof.GourishNaik.

The 1st session was conducted by Prof.GourishNaik on topic „Physical Security‟. He started the session with the basic communication process. He explained the various communication channels, there advantages, disadvantages with us such as twisted paired, optical fiber etc. It was an interactive session and various topics were taken for the discussion such as various communication technologies how it works, how secure it is, various security solutions etc. Finally the session 1st ended up with some queries and there clarifications.

Next, session 2nd was the “Evaluation”. We used Kahoot.it online examination portal for that examination and it was made available to us by Mr. Amar Thakare. There were 25 questions and questions were based on the various topics in cyber security such as IT Act; various Cyber Attacks, types of malicious codes and viruses, Case studies related to Cyber Security etc. We ware enjoyed that online test. There were 36 participants, among them first five participants were selected as a winner.

After having delicious lunch the 3rd session started off. We had Prof.Dr. Vilas Nandavadekar (MCA, MCP, MBA, MPM, MDP (DSS), and Gold Member of ISACA) Registrar of Shivaji University, Kolhapur as a key note speaker.

He started out with the intellectual talk on the topic Cyber Security. He began that session with an overview of the FDP and the need and importance of awareness about cyber security. He shared some real life experiences happened with him regarding cyber security issues. He also explored the unexplored aspects of this topic for example; what are the career opportunities available, various global certifications, and various standards in global industry etc. He talked about the various ways to keep data safe and secure. He also shared some important links of websites, information, certification courses regarding cyber security.

Finally the 4th session started out with the valedictory function. We had Prof.Dr. Vilas Nandavadekar Registrar of Shivaji University, Kolhapur as a Chief Guest, Mr. Amar Thakare. as a Resource person, Prof.Dr. R. K. Kamat (HOD), Dr. K. S. Oza. Dr. K. S. Oza welcomed all the dignitaries and participants. Prof.Dr. R. K. Kamat shared their views and experience about overall FDP. After that some participants were shared their views and experiences about the FDP. Finally the valedictory function was ended up with vote of thanks, expressed by Dr. K. S. Oza.

This FDP in cyber security awareness training lead to sustained security practices that reduce the risks faced by individuals and businesses using internet-connected devices for private or business use. All the resource persons engage participants in meaningful, relevant scenarios that clarify many of the complexities involved in cyber security. All FDP attendees have acquired a deeper understanding of the need to conduct a thorough cyber security risk assessment, and got the knowledge about various tools to do so. Through discussions, simulations, and demonstrations, FDP offered attendees an opportunity to ask questions, as well to share ideas and information on the latest and best network security solutions and services available, and how they can be used to mitigate the risks.

PMMMNMTT Faculty Development Centre in Cyber Security & Data Sciences Faculty Development Program on Cyber Security during 1st Jan, 2019 to 7th Jan, 2019 Hosted by Department of Computer Science, Shivaji University, Kolhapur Report

Introduction: Protection of internet connected systems including hardware, software and data is the main task of cyber security. The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. However, it's necessary in order to protect information and other assets from cyber threats, which take many forms. The third FDP on Cyber Security focused on many different aspects of cyber threats.

Mrs. Pradnya Kulkarni delivering the session

 Day-wise Description: a. Day 1: Sessions were delivered by Mrs. Pradnya Kulkarni Pophalikar focused on web application security. Session I focused on web application threats like Sql Injection, broken authentication, sensitive data leakage, Parameter tampering, Information leakage, cross site scripting etc. Some websites were suggested for reference.Second session of the day dealt with Web application security assessment tools like accutex, owasp zap etc., and also focused on Phishingattacks. Websites suggested to visit were http://testphp.vulnweb.com/, http://demo.testfire.net/Some attacks like get based attacks - error based, post based attacks – blind sql injection attacks, Phishing attacks: Fake website which looks original were discussed and demonstrated. Host (online, offline), Linux based os, Creating links, Username and passwords hacking. Blind phishing – mails/links to all, Spear phishing – targeted attack, Pre text- targeted drafted mail/ info, Tools to do it : setoolkit- social engineering toolkit by DaveKennedy Post lunch sessions were dedicated to kali Linux installation and practical on the same. b. Day 2 :Resource person was Mr Aniket Badami , a penetration tester. In first Session he explained what is Cryptography, Encryption and Decryption.He also explained what is Key, Hash in Data Security. He demonstrated some Tools used for Data security like TrueCrypt, GNUPG (PGP), Vera Crypt, He explained how to use these tools very well.

Mr. Aniket Badami delivering talk on Cyrptography In second session Key files were explained. How to create Multiple Key File and how to share as well as use these key files to decrypt encrypted file. Third session was on Crypt tool. He explained Vera Crypt tool with example.After Vera Crypt he explained Malware and its type very well.It was followed by explanation to check file or data is infected or not using Cloud service. For that purpose www.virustotal.com website is used.

Practical Sessions in Lab

Last session of the day was focused on Bots. He explained Botnet / Bots. Browser security was explained in detail along with how to use Add-ons in Browser. c. Day 3:FDP was chaired by Mr Amar Thakare. Nesus, Netsparker, Cyber Auditing, Trinity Rescue tool, Google Temp Mail, NetCut tool and WebEval were covered in first session with hands on in the Lab.

Mr. Amar Thakare delivering talk on Forensic Security

Second session stared with basic NW scanning and then checking the security level of the passwords. It also covered number of topics viz. Breach Alarm, Forensic Security (Live, Dead), Domain Problems,Selfie problems. Email Verification, Information Gathering -Tools.

Third session talked about information gathering tools like Grabify IP Logger. It also covered Open-source intelligence (OSINT), where data is collected from publicly available sources to be used in an intelligence context. He also talked about personal social media exposure like photographs or videos by just one click using Intel Techniques. Intel Techniques is a website created by “small group of online investigations enthusiasts with a strong interest in privacy and digital security. Intel Techniques mission is to train both government and private sectors with the skills to prevent exposure.

The fourth session of the day covered different aspects of Data like Hosting Data, who is Registration Data, Exposed Data, Archived Data, Analytics Data, Shodan.io, PendriveLinus.com, PIC2Map. Kahoot it platform was also exposed by conducting an online quiz on it. Session ended with Email tracer, Spyware, Tinyurl.com/yc68tan9 and Android lost(suggested). d. Day 4 :Charged by inputs from Mr. Sankalp Mate. First session started with File hiding and un-hiding demonstration. He also talked about steganography and Mac address. Even demonstrated getting and changing Mac address by TMac Technitium MAC Address Changer (TMAC). He talked about Lullar tool: - Identifying personal InformTION, Tor browser. He also discussed about how India gets IPaddress, world wide org INIA which is US base which allot IP address. INIA: - Give IP address zone wise. Continent wise IP address.

Mr. Sankalp Mate addressing participants on Mac addresses

In the second session hee described the techniques of finding frauds. , Sleeper chain for example A person get packet: - Delivered by layman - Trace net calling: - IPTR International calling and remove the packet. A case study was discussed. Malicious software’s like Malware, Virus, worm, Trojan Horse, malicious BOT an automated operation via machine is called BOT. Keyloger:- Key stroke recorded along with its tools was explained. Spyware introduction was given with resources used for spyware like Microphone, camera key etc. He also talked about Addware and SQL injections. Third session was about types of Hacker  Black Hacker :- Unethical Hackers ,  White Hacker :-Ethical Hackers(Permission)  Gray :- Secure and misuse of authority.(not given permission but they hack like for research purpose). Research discussion panel on you tube channel were show as listed viz. Defcon, Hack5, Blackhats, Nullcon, Redhats, Exploid-db, Thehackernews- Facebook news page, Thehackerssamachar. He also explained Zero Day, Cracker: - Destroy only, Hacker: - Defense and offense. A case study: - Girl hypnotize while she is chatting.(Phising Problem) was shared.Hack active directory was explained.

The last session of the day started with Denial of Service attack. Basic concepts of DoS were presented along with Denylock Services, how one can secure from DoS attack. HSTS: - Http Strict Transport Security: - Framework different policy, rules Cloud has different standards policy strategy.Ransomware Wannacry & Peteia Honey pot: Similar looking like real machine. Hackers create trap where attackers come and attack but it not real attack.

Next session covered the Nmap tool in detail. Nmap is a free and open- source security scanner, originally written by Gordon Lyon, used to discover hosts and services on a computer network, thus building a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.Nmap tool installation and some commands were carried out in the lab. USB Disable was demonstrated: Registry editor -> system-> currentcontrolset->Services->UASPStar- >Start. Session ended with Audit tool, Forensic Tool, Advance IPscanner, Zenmap. e. Day 5 : Concentrated on Domains, email attacks, mobile Hacking credit card fraud and cyber laws in details. It started with life cycle of a typical gTLD Domain Name. Domain name is the internet address or the network address of your website. It is how the internet users can visit your website. Getting the right domain name is, therefore, a stepping stone to the success of your online enterprise. Due care should, therefore, be taken while choosing a name for your website.Simply put TLD is an acronym that stands for Top Level Domain. In any URL or web address, it is the part which appears after the final period or dot. For example, if the web address is https://www.seomator.com then its TLD is “.com”.Basic Classification of TLD was described. Generic Top Level Domains (gTLDs) are those TLDs that do not refer to any particular country but are completely generic in nature. Theoretically, gTLDs can be used on the internet by anyone and anywhere in the world. Some examples of gTLDs are .com, .org, .net, .biz, .info etc. Understanding Domain Name Lifecycle is also important. A very common belief is that a domain name can be purchased. This is absolutely not true. You can only lease a domain name. The lifecycle of all domain names starts when they are available for registry and end at its deletion. Usually one can lease a domain name for anywhere between 1 to 10 years. Post this if the domain name is not renewed then it lapses and becomes eligible for deletion.

A typical gTLD domain name life cycle follows a very set path. This path can be broken down into 5 stages. Viz. Available Domain, Registration or Leasing, Expiration and Renewal, Redemption and Pending Deletion. These stages explained in detail.

In the virtual world getting the right domain name at the right time will go a long way in making you and your venture successful. Smartness is in ensuring that from your side you take all the necessary steps that will guarantee the same. The domain name might seem like a very small thing once you have built your reputation in your niche. Yet all good comes undone when somebody else cash’s on your available domain name and lures away your customers. A small mistake like letting your domain name expire will then lead to big consequences. Hence the most important thing to bear in mind is to renew your website address or domain name well in time. ICANN (Internet Corporation for Assigned Names and Numbers) was discussed. The Internet Corporation for Assigned Names and Numbers is a non-profit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation. ICANN performs the actual technical maintenance work of the Central Internet Address pools and DNS root zone registries pursuant to the Internet Assigned Numbers Authority (IANA) function contract. Much of its work has concerned the Internet's global Domain Name System (DNS), including policy development for internationalization of the DNS system, introduction of new generic top-level domains (TLDs), and the operation of root name servers. The numbering facilities ICANN manages include the Internet Protocol address spaces for IPv4 and IPv6, and assignment of address blocks to regional Internet registries. ICANN also maintains registries of Internet Protocol identifiers. Email spoofing refers to the process of sending an email message from one source, but making it appear as though the email was sent from a different source. For example, an email originates from [email protected] but it appears to be from [email protected]. Another method of spoofing is to make the message appear to come from an unknown user within your domain name. For example, the message appears to be from [email protected]. This does not mean that your email account was compromised. It means that the sender has fooled the mail client into believing the email originated from a different address. This is usually done for malicious reasons, either to distribute unsolicited email or to distribute email viruses. Unfortunately, there is no real way to prevent spoofing from occurring. If you receive an email that has questionable content, it is recommended to delete the email message or use an antivirus program to scan the message before opening it. Steps to send fake or anonymous emails was explained. Various topics like Mail Bomb, Mx Lookup, Password Tracking, Dictionary attack Brute force attack, Rainbow table attack, Phishing, Social engineering, Malware Offline cracking, Shoulder surfing, Spidering, Guess etc.

Cyber Law and Consulting was the next topic of discussion. Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy. Generically, cyber law has been referred to as the Law of the Internet.

Just like any law, a cyber-law is created to help protect people and organizations on the Internet from malicious people on the Internet and help maintain order. If someone breaks a cyber-law or rule, it allows another person or organization to take action against that person or have them sentenced to a punishment.There are different forms of punishment depending on the type of cyber law you broke, who you offended, where you broke the law, and where you live. In many situations breaking the rules on a website will result in your account becoming suspended or banned and your IP addressed blocked. To determine the consequences of your action for minor offenses, we recommend reviewing the company’s terms of service or rules.If you've committed a more serious offense such as hacking, attacking another person or website, or causing another person or company distress, additional action may be taken against you.

Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. Cybercrime may also be referred to as computer crime. Common types of cybercrime include online bank information theft, identity theft, online predatory crimes and unauthorized computer access. More serious crimes like cyber terrorism are also of significant concern.

Next session was dedicated to Cyber Law of India. In Simple way we can say that cybercrime is unlawful acts wherein the computer is either a tool or a target or both. Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as, access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.

Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. By hacking web server taking control on another person’s website called as web hijacking.

IPR Violations was discussed in detail. These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations etc. f. Day 6 : First & second sessions were guided by Mr. Amar Thakare which were mainly software sharing. Installation of following software’s was done by the participants viz. Nessus Installation, Netsparker Installation, OSF Installation, and Netcut tool in lab. After lunch there was visit to Shivaji University Space research Laboratory at Panhala fort. Mr. Gaikwad – PhD. Scholar of Physics Department had given information about Cosmic Rays Effect , Reo Meter, Weather Monitoring Station, study and calibration of experiment on ionosphere region.

Visit to Shivaji University Space Research Laboratory, Panhala

Followed by visit to historical fort of Panhala.

g. Day 7 : Mr. Rohan Nyayadish was the resource person for last day i.e. day seven of FDP. He spoke on email Security, Concept of hacking, Case Studies, Phishing /Nigerian Scams and Steganography concept. Types of phishing:- Lottery Scam, Foreign job offer scam, Vishing:-Voice+phishing Second session focused on Wi-fi security tips, Online banking frauds, Online Banking safety tips, Privacy Law is not , How to maintain security, Mobile Crime:- Anonymous Calls and sms, Carrying obscene material, MMS Scandals, , Bulk SMS, Mobile Hacking, Denial of service, Smishing :- Phishing+SMS, Uninvited SMS.

Third session after lunch was dedicated to AADHAAR Privacy Act, Sound.pk,mGoogle map Pokémon-game were debated. Paul‘s Theorem:- Paul’s cyber space iceberg theorem was explained. Actual depth of the cyberspace problem.Black whole Concept.26/11 incident discussion, Technology responsibilities in this incident were the topics of debate

Mr Rohan Nyayadhish giving away momento to participant who stood first in the test

Last session of the FDP was evaluation where test was conducted on Cyber security awareness on Kahoot Platform and rankers were presented with the memento.

Participants with resource persons Mr Sankalp Mate and Mr Amar Thakare

PMMMNMTT Faculty Development Centre in Cyber Security & Data Sciences Faculty Development Program on Data Science during 10th December to 16th December 2018 Hosted by Department of Computer Science, Shivaji University, Kolhapur Report

Introduction: Data Science training program has been scheduled with a goal of training the trainers to account for the dearth of experts in the field of data science. The main aim of FDP is to reduce demand supply gap existing in the fields of cyber security and data science. In this context, the rationale behind conducting FDP on Cyber Security and Data Science was highlighted by the coordinator of the FDP and Head of Department of Computer Studied, Dr.R.K.Kamat who in his introductory speech emphasized on exciting career in cyber security and the skill sets required for availing employability opportunities in these fields. He enlightened the participants with the curriculum design in cyber security/data science for various undergraduate courses from basic to advanced level and setting up of the forensic lab in par with IIT, Kanpur and IIIT, Allahabad. He stressed on the quote “Data Science Jobs Luxury Today Necessity Tomorrow”.

Dr.R.K. Kamat, Co-ordinator of FDP guiding participants

 Day-wise Description: a. Day 1: Beganwith introduction to Data Science and Basic Python by Mr. Pritesh Tiwari Data science is an interdisciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured, semi-structured and unstructured data. It employs the techniques and theories drawn from many fields such as mathematics, statistics, information science and computer science. Data science is a blend of different disciplines. It is a concept to unify statistics, data analysis and machine learning. Turing award winner Jim Gray imagined data science as a fourth paradigm of science, the first three being, empirical, theoretical &computational, and now data driven.

Pritesh Tiwari delivering talk

Business analytics, business intelligence, predictive modelling and statistics all fall under the umbrella of data science. Machine learning applications learn from data. Steps in application of Data Science were discussed as,Data Collection, Data Cleaning, Exploratory Data Analysis (EDA), Data Modelling, Data Visualization. It may be required to iteratively update the model due to the changing conditions and the role of domain expert in model building was emphasized. In the more realistic model the following points may be considered: ● Independent variables with low probability having less significance can be discarded. ● Different weights may be required to be assigned to different variables based on their degree of importance. For modelling continuous data regression model is used while for modelling discrete data. Classification and clustering is employed. Difference between Supervised and Unsupervised Learning. Supervised learning is the learning model which defines an algorithm to map an input variable to output variable. If x and y represent input and output variable, respectively, then, the mapping function f is such that y = f(x). Mapping function will predict the output for a new input value. In supervised learning, there is a labelled data. In contrast to this in unsupervised learning, there is no labelleddata and the classification is based on the characteristics of data. Clustering and association are techniques of unsupervised learning. Some applications of Supervised Learning are were described viz. Issuing credit card, Sanctioning Loan. Class assignment on identifying attributes for finding MCA aspirants among computer students of various undergraduate courses. The following attributes were finalized collectively by the participants:

Table 1 : Attributes for MCA aspirants for classification

Name of the Contact No No. of Siblings Family Income Student

Interest in Maths Interest in Interest in Career Objectives Computer Management Programming

Participation in Academic Academic Reason for joining Inter college Performance in Performance in the course competition Computer Management

Influenced by Problem solving Coding interest Father’s occupation whom to join the and logical skills course

Criterion for Ergonomic Close relatives in IT Part time job selecting institute Problems job if yes job type Lab facilities in ICT in teaching and Academic your institution learning curriculum

Plans after if desires to pursue whether maths was Friends influence graduation PG what type of one of the subjects course at 12th or graduation The new era in machine learning is Robotic Process Automation (RPA) which deals with the process of observing the person and mimicking the person thereby automating majority of daily tasks by bots. RPA can automate any process that humans can do which then can work without any human intervention. RPA has resulted in the reduction of data entry operators. Another major advantage offered by RPA no integration of software with backend such SQL server is required so that data is not at risk. Mr. Pritesh also gave introduction to Anaconda and took practical session on its installation. He demonstrated working with anaconda. Setting, activating, deleting, importing and exporting environment in Anaconda. This was followed by introduction to Python data types, Lists, functions and loops.

b. Day 2: Second day of the FDP was delivered by Mr. Shivam Thakkar with focus on topics like Python basics - hands on, Introduction to Data Science, Data Science Libraries, Data analysis and data manipulation using “pandas” and hands on, scientific computing using “numpy” and hands onData Visualization using “matplotlib”.

Session by Mr. Shivam Thakkar

First session of second day dealt with Python basics with practical exercises like Create a list and perform indexing, From the above list generate another list that contains element within the index range, Given string check if it is username and print 'valid' or print 'enter correct user name', Create a dictionary to keep record of ages of three persons. , Create a list of given animal names and print all the names while iterating through the list, Consider above list. Iterate until deer is found and print the index, Make a function that takes two numbers and returns multiplication result, Change the above function so that it takes 3 numbers and returns multiplication of all the three numbers, Given a string, check if it ends with 'ing' if not add 'ing' to it, Create a list of animal names,Adding list elements were carried out. Second session of the day dealt with Data analysis and data pre- processing using pandas. Loading a file for pre-processing was shown with hands on to read data from .csv file, data manipulation, categorical to numeric, one hot encoding, min max scaler.

Third session was based on scientific computing using numpy. Session covered scientific computing with numpy library with topics like general and broadcasting, others, ones, eyes, reshape, matrix operation, slicing. Session also covered data visualization using Matplotlib with graphical packages for scatter plot, bar chart, and pie chart Fourth session concentrated on constructing Machine Learning models using sklearn. The machine learning models constructed using sklearn using steps like drop unnecessary columns, one hot encode, required columns, rescale to normalize, train test split, Decision Tree, SVM modelling, Random Forest. Overview of Deep learning with Kearas was provided c. Day 3 : The Third Day of the FDP started with felicitation of the resource persons of day Mr. Kuldeep Singh and Mr. Sharukh by Dr. R. K. Kamat. The third day focussed on Big data & Hadoop .

Felicitation of Resource Person Mr Kuldeep Singh and Mr Shahrukh by Co-ordinator of FDP Dr. R. K Kamat

Session started with VMWare and introduction to Ubuntu. VMware is a virtualization product that makes it possible to partition a single physical server into multiple virtual machines. VMware works with Windows, Solaris, Linux and Netware, any or all of which can be used concurrently on the same hardware. Ubuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things. Steps to install VMWare were demonstrated followed by hands on installation of Hadoop.

Session two dealt with Big Data Hadoop Ecosystem.Hadoop ecosystem components like HDFS and HDFS components, MapReduce, YARN, Hive, Apache Pig, Apache HBase and HBase components, HCatalog, Avro, Thrift, Drill, Apache mahout, Sqoop, Apache Flume, Ambari, Zookeeper and Apache OOzie to deep dive into Big Data Hadoop and to acquire master level knowledge of the Hadoop Ecosystem. It was a technical discussion on Hadoop configuration settings with Settings the environment variables user profiles. Introduction to Map Reduce was done. MapReduce is a framework using which we can write applications to process huge amounts of data, in parallel, on large clusters of commodity hardware in a reliable manner.MapReduce is a processing technique and a program model for distributed computing based on java. The MapReduce algorithm contains two important tasks, namely Map and Reduce. Map takes a set of data and converts it into another set of data, where individual elements are broken down into tuples (key/value pairs). Secondly, reduce task, which takes the output from a map as an input and combines those data tuples into a smaller set of tuples. As the sequence of the name MapReduce implies, the reduce task is always performed after the map job.The major advantage of MapReduce is that it is easy to scale data processing over multiple computing nodes. Under the MapReduce model, the data processing primitives are called mappers and reducers. Working of Map Reduce was demonstrated.

Mr. Kuldeep Singh Delivering the talk

Hadoop File System was developed using distributed file system design (HDFS). HDFS holds very large amount of data and provides easier access. To store such huge data, the files are stored across multiple machines. These files are stored in redundant fashion to rescue the system from possible data losses in case of failure. HDFS also makes applications available to parallel processing. Third session was dedicated to Pig. It’s a high level scripting language that is used with Apache Hadoop. Pig enables data workers to write complex data transformations without knowing Java. Pig’s simple SQL- like scripting language is called Pig Latin, and appeals to developers already familiar with scripting languages and SQL.

Fourth session talked about Hive and Sqoop. Hive is a data warehouse infrastructure tool to process structured data in Hadoop. It resides on top of Hadoop to summarize Big Data, and makes querying and analysing easy.Hive because of its SQL like query language is often used as the interface to an Apache Hadoop based data warehouse. Hive is considered friendlier and more familiar to users who are used to using SQL for querying data. Hive installation was demonstrated. Apache Sqoop is a tool designed for efficiently transferring bulk data between Apache Hadoop and external data stores such as relational databases, enterprise data warehouses.Sqoop is used to import data from external data stores into Hadoop Distributed File System or related Hadoop eco-systems like Hive and HBase. Similarly, Sqoop can also be used to extract data from Hadoop or its eco-systems and export it to external data stores such as relational databases, enterprise data warehouses. Session ended with Sqoop Installation. d. Day 4: Resource person, Mr Sanjay Pandey. Topics discussed were Introduction to Machine Learning, Logistic Regression with Python (SVM with PYTHOS).

Felicitation of Resource Person Mr Sanjay Pandey by Co-ordinator of FDP Dr. R.K.Kamat Making machine to learn by using Supervised Learning was the topic for first session. Supervised learning does have a target variable is defined. It is mostly used for classification purpose. Machine learning techniques like Logistic Regression,Support Vector Machine, Decision Tree, Random Forest were discussed. Session two was technical discussion on Logistic Regression and Probabilities covering Theory of logistic, Application of logistics, Under fitting and Over fitting, Trade-off, Training and testing. Few examples were demonstrated. Support Vector Machine (SVM) was the topic for third session of the day. It covered Introduction to SVM, Types of SVM (Support Vector Classification and Support Vector Regression), Radial Basis Function (RBF), Confusion Matrix, Grid Search function, Application of SVM. Examples are demonstrated using Colab. e. Day 5 : First session commenced with the discussions on Machine Learning subtopic “Decision Tree”, where all the participants practically worked on the various methods used in data Science for taking business decisions within a short period of time by analysing a tera byte of information which are generated from various sources like WhatsApp, twitter, face book and IOT, which enhance the data security.

In the afternoon session, the discussion was on “Random Forest”, the resource person have taken the Bank loan case study i.e. the dataset provided by the bank is freely available on “LendingClub.com” has downloaded from website and executed the different commands associated with decision tree and Random forest. The young data scientist influenced on participant for his practical approach.The fifth day emphases was on practical approach for acquiring and assimilating new scientific knowledge and concepts, rather than treating participants as a passive recipient of lecture driven classes

Day 6: Mr. Pritesh Tiwari started session with theory regarding unsupervised learning. After explaining difference between classification and clustering, he continued with hands on session on clustering. Unsupervised learning was the focus. Unsupervised learning is a type of machine learning algorithm used to draw inferences from datasets consisting of input data without labelled responses. The most common unsupervised learning method is cluster analysis, which is used for exploratory data analysis to find hidden patterns or grouping in data.“Clustering” is the process of grouping similar entities together. The goal of this unsupervised machine learning technique is to find similarities in the data point and group similar data points together.

The Elbow method is a method of interpretation and validation of consistency within cluster analysis designed to help finding the dataset. The concepts relevant to unsupervised learning and clustering were explained with example and all participants were directed to perform practical’s to solve the problem using k-means clustering algorithm.

Mr. Pritesh Tiwari Delivering the session In post lunch sessions, each participant was given a problem statement and a necessary data set. Each participant was given a separate problem to analyse and a detailed report is expected as a part of evaluation for hands on skills. The participants have to define the problem statement and expected conclusion for that problem after exploratory data analysis of the given dataset.

FDP Co-ordinator Dr. R.K.Kamat with Participants f. Day 7 : Session was dedicated to guiding participants in carrying out the assignment. Mr. Pritesh Tiwari and Mr. Shivam Thakkar motivated and guided the participants wherever necessary.Most of the participants successfully completed the exploratory data analysis part andwere able to define problem statements. Some participants completed the experimental work also. Some participants were able to furnish reports of their problem statements.

PMMMNMTT Faculty Development Centre in Cyber Security & Data Sciences Faculty Development Program on Cyber Security during 16th Jan, 2019 to 22nd Jan, 2019 Hosted by Department of Computer Science, Shivaji University, Kolhapur Report

Day 1: This FDP started with Cyber laws and case studies by Adv. Prashant Jhala. In the first session with emphasis on Section 201 in the Indian Penal Code, causing disappearance of evidence of offence, or giving false information to screen offender. It was followed by detail information about Section 201 in the Indian Penal Code, the Section 377 of the Indian Penal Code (IPC) and United Nations Commission on International Trade Law (UNCITRAL)

Adv. Jhala delivering the Session With Participants Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper. Business entities conducting business electronically are called trading partners.

E-COMMERCE The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. Second session of the day focused mainly on key terms of cyber security. Session started with Metadata,data that describes other data. Meta is a prefix that in most information technology usages means "an underlying definition or description”. Metadata summarizes basic information about data, which can make finding and working with particular instances of data easier. It was followed by types of Hacking, Spoofing, Trojan, Phishing, Smashing, Juice Jacking, Cat phishing. He talked about Social Engineering, VIRUS Total and Steganography. Third session of the FDP dealt with cyber stalking and internet jurisdiction. Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations. This crime come under IPC 354 not under IT act of cybercrime. Cyber bullying, Tralling, Setortion, Sextexting, Blind phishing and Spear Phishing were discussed. Internet Jurisdictions was also focused. Cyberspace has no geo- graphic boundaries because "the cost and speed of message transmission on .... up companies proposed technology but law has bounded by jurisdiction. Technology is global but laws are local. SECTION 378 was explained. Theft.—Whoever, intending to take dishonestly any moveable property out of the possession of any person without that person's consent, moves that property in. Last session of the Day covered overall IPC acts for following with general examples. Financial frauds including ATM Frauds, Email frauds, Phishing Mail frauds, Data theft cases, Intellectual Property theft crimes, Net-bankingfrauds were discussed.

Day 2: Chaired by Mr. Aniket Badami a NASSCOM certified trainer

Session by Aniket Badami With Participants

He focused mainly on: Introduction to cyber security, Phishing and Ant- phishing, Data security, Browser Security and Smartphone security. Session one commenced with introduction to cyber security and Cyber Attacks with their types like Unpredictable, Unprecedented, and Unsympathetic. A link was shared to check the live internet users:http://www.internetlivestats.com/. Spoofing and Phishing was described. Second session showed use of Setoolkitfor social engineering. Session ended with installations of VMWARE and Kali Linux by participants. Demonstration of How to create a fake page for social engineering usign Setoolkit on kali linux was given. Third session was dedicated to Cryptography and data security using True Crypt toolkit Session covered the basic definition of Cryptography, Encryption, Decryption, Key, Hash. Also gave briefing of types of Cryptography, Symmetric : Single key for encryption and decryption, Asymmetric: two keys , - Public Key and Private key and Hash: one way stringgeneral and broadcasting. Last session of the day was creating encrypted partition using True Crypt and Browser Security. The encrypted volume is created using True Crypt to store confidential data Browser Security: The Trackers Programs, Adware, Add blockers, Ublock origin, Privacy Badger and HTTPS Everywhere towards Browser security are covered a. Day 3: Handled by Mr. Aniket Badami. He covered Malware Security in first session followed by Smartphone Securityin second and Wi Fi Security & System Security in third and fourth sessions respectively.

Mr. Aniket Badami delivering session on Malware Session started with Malware,Types of Malware viz. Virus, Worms, Trojan, Spyware, Key Loggers, Ransomware, RootKit were explained in detail. How these malware effect on the functioning of the system were discussed with various cases and examples. Security measures to prevent these malware attacks were illustrated. Various types of Anti-Virus like Signature based detection, Heuristic model, Cloud based model, Ransomware detector were explained and how they protect computer from malware attacks were discussed with demonstrations. How to use Virus Total (Cloud based detector) to detect the malware links were demonstrated. Ransomware protection techniques were illustrated. Second session was based on Smartphone Security. Development of Android platform and its technical aspects were covered. Development of iOS platform for Apple devices was also illustrated. Security measures for android phone were discussed in detail. Simple security measures like enabling encryption, VPN, disabling unknown source, installing Anti Virus to protect smart phone were explained. Use and installation of Brave Browser to prevent malware attack on smart phone was discussed. The case study of Apple 5C smart phone was discussed to illustrate security measures taken by Apple to protect smart phones. Session three was dedicated to Wi Fi Security. Introduction and development of Wi Fi was explained in detail. Reasons for hacking Wi Fi network were discussed. Security measures given by IEEE like enabling WPA2 was illustrated. Various terminologies like Probe Request Attacks, Evil Twin Attacks, War Driving, and Wi Fi Cracking were explained by illustrating different cases. Use of WPA2 and MAC filtering was also discussed. Last session of the day was System Security. Hacking and its types like Black Hat Hackers, White Hat Hackers, Gray Hat Hackers, Script Kidee, Suicide Hackers, and Whistle Blowers were explained. Windows 7 and 10 security measures like installation of Anti-Virus, enabling firewall, encryption, VPN were discussed. Case studies were given to the participants for further study. b. Day 4: Chaired by Mr Amar Thakare Sir in a very interactive and practical way. The contents delivered in the sessions were very informative. In the first session he has shared his experiences about cyber-crimes and he had also explained that how the cyber scams, crimes, data breaches are going in World but still majority of us are not aware about it. He also shared his experience about how cyber-crimes are also solved with the help of police. He is rendering wonderful expertise to this field. In first he showed the demonstration of yumisetup through we can know easily know about virus, worms and malwares.

Mr. Amar Thakare guiding participants on Lab assignments in Lab

The second session talked about biggest data breaches of the 21st century these are World 7, SEM Board, AV-admin etc.Through BreachAlarm, we can check how our password is secure. Go through google and put BreachAlaram: How Safe is your password and it checks how many times our password is weak and it will be hacked or not hacked. It shows that strong password should be always the combinations of one capital letter, small letter, numbers and it should be nearly 8 to 20 characteristics. In this session he also gives information and demo of GRABIIP LOGGER through we know about the IP address. Through this we know the device, location which are much helpful crime investigation.

Session three was dedicated to self-digital security. All of us are very much fond about the SELFI but we should know it is danger for us. Our Selfi can be used to access our location through Picmap website. He also gives drawbacks of use of GPRS through which we can find the location and our phone also gives details of locations. He gave detail about smart phone security and what’s app security. In case of the, what’s app security we should know the two step verification pin security which will prevent us from hacking.

The last session of the day talked about Intel techniques. Through Intel techniques we should know the email, video and websites. Through this we can know the fake emails, videos, websites and device through IP address. We can know URL video and link about the URL video. Through Khooh.it.com we can conduct the online examinations and quiz also. This session focuses more on Website check and he has given detail through practical and we also know how our website is weak and it is prone to hack.His entire sessions deal with password, email, IP address, GPRS services, SElfi, find my device, and check online video and websites. c. Day 5 : Was also handled by Mr. Amar Thakare. Day was dedicated to OSINT, OS Forensics, Nessus web tool, Man in the middle attack, Qualys Guard etc.

Mr. Amar Thakare tea time discussions with participants First session of the day started with OSINT. Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources. It is data collected from publicly available sources to be used in an intelligence context. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts. OSINT is defined by both the U.S. Director of National Intelligence and the U.S. Department of Defense (DoD). Second session was dealing with OSForensics. It allows you to identify suspicious files and activity with hash matching, drive signature comparisons, e-mails, memory and binary data. It lets you extract forensic evidence from computers quickly with advanced file searching and indexing and enables this data to be managed effectively. OSForensics - Digital investigation for a new era by PassMark Software Digital forensics known as digital forensic science is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.OSForensics from PassMark Software is a digital computer forensic application which extract and analyse digital data evidence efficiently and with ease. It discovers, identifies and manages that is uncovers everything hidden inside your computer systems and digital storage devices. OSForensics is a self-capable and standalone toolkit which has all the digital forensics capabilities including Data acquisition , extraction, analysis, email analysis, data imaging, image restoration and much more. In the third session Nessus web tool was discussed. Nessus is a vulnerability developed by Tenable Network Security. By nessus web tool we can access remote devices like installation of any software on your college machines, etc. Nessus Home is available for personal use in a home environment only. It is not for use by any commercial organization. Netsparker:- is automated web application security scanner that uses the advanced Proof-Based Scanning technology to identify SQL Injection, Cross-site Scripting (XSS) and thousands of other vulnerabilities in web applications. Nmap :- nmap is a free, open-source tool for vulnerability scanning and network discovery. Nmap is used by Network administrators to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks. Nmap can be used to monitor single hosts as well as vast networks. QualysGuard :- Qualys Guard is now called the Qualys Cloud Platform.Qualys Cloud Platform consists of integrated apps to help organizations simplify security operations. It consist of lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for all your IT assets – on premises, in clouds and on mobile endpoints. Qualys Cloud Platform is the first platform that provides you security and compliance, allowing you to monitor, detect and protect your global network with instant. Session four talked about A man-in-the-middle attack. The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e- commerce sites and other websites where logging in is required.It is a type of cyber-attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. d. Day 6: Charged with inputs from Mr. Dinesh Kudche. The first session of day six started with the introduction of the resource person. He stressed on the need of a proper elaborate explanation on the articles in media related to cyber technologies. The session started with the story of how Facebook evolved, features of Facebook and the intention of Facebook behind having those features. Some of the Facebook features covered were login form of Facebook, #tag, did you know questions etc. Then he also explained the use of Facebook Ads feature by business organizations for digital marketing. The session ended with the discussion on twitter trends and auto debit option in PayTM/e-wallets.

Mr. Dinesh Kudche guiding participants Second session started with the information of apps like zomato, swiggy, book my show. Concept of infographic was explained. UBER was compared with OLA and he explained why UBER is better than OLA. Detailed working of UBER was explained along with demonstrations of how infographics are created. The Uber Line graph that is used to receive graphs and charts was demonstrated.Case Study (Data Report) of “This is how India welcomed 2019” on OLA cabs was discussed. This report contained very interesting statistics. He discussed the concept of reward points, working of Google Pay along with its strategies on market segmentation.The session came to an end with very interesting discussion on the business model of Reliance Jio which led to the closure of various telecom companies.

Felicitation of Mr. Dinesh Kudche

Third session started with the introduction of Google search engine with respect to paid ads search results and free ads search results. Then the concept of search engine optimization was explained. Google analyses the search results through web crawling software. Concepts of landing page, page rank, browse rate, average time on site was introduced. A detailed discussion on the case study of Amul – Google case was done. This case was related to a fake domain of Amul site that was created to financially exploit the users.Google amp. Google Ads, Google Analytics were demonstrated. To explain domain hijacking, fake and genuine site of Sachin Tendulkar was shown.rewardz.sbi was shown to explain the reward points of SBI.My SMS Mantra was shown to explain how frauds like fake SMS can be created through this site.

Fourth session started with the discussion on restricted domain names.whois.domaintools.com/ was shown to convey how details of a website can be obtained. Google My Business tool was explained. Mobile Banking was discussed with respect to its do’s and don’ts along with apps like PayTM, PayZapp etc. Virtual credit cards concept was discussed. The various SE tools like domain tools, hubspot, woopra.com, alexa.com, Google analytics, Google web master tools, xml- sitemaps.com was mentioned. The working of xml-sitemaps.com was demonstrated. Overall, the sessions was extremely informative and interesting.

Last day of the FDP was dedicated to web security and discussions on some case studies. FDP ended with online evaluation of participants on Kahoot platform.

MBA Unit, Department of Commerce and Management, Shivaji University, Kolhapur Faculty Development Programme On Learner Centric Approach 24th to 28th February 2019

FDP Report

Faculty Development Programme on Learner Centric Approach was conducted by the department in association with S. P. Jain Institute of Management and Research. On the first day Dr. A. B. Kulkarni and Dr. Ranjan Banerjee guided participants regarding Learning Goals, Learning Outcomes and assessment. Participants developed Learning Goals and Learning Outcomes for the subjects they teach in the class as an activity. On the second day Dr. Ranjan Banerjee covered use of Videos, Visual Aids for effective teaching He also guided regarding Voice Modulation, Body Language, and Technology. Dr. Vasant Sivaraman dealt with Simulation and the use of simulation in teaching. On the third day of FDP Online Simulation activity was conducted by the participants where the Harvard module of Simulation was used and then discussion was done on the simulation conducted by the participants. On the fourth day, Dr. Ruppal Wallia Sharma and Dr. Preeta George covered teaching with case study. On the last day of FDP participants gave presentations on their area of teaching by using the innovative teaching methods. The FDP was activity based in which participant learned various techniques to make teaching effective and learner centric. Faculty Development Programme

On

Research Methodology and Data Analysis using SPSS for

Management Teachers

5TH TO 9TH January 2016

Programme Report

Faculty Development Programme was designed for the academicians to develop their knowledge and ability to undertake research in management and to provide expert knowledge on different research methods and data analysis in diversified areas of management. The programme helped the participants to design and conduct research projects, research papers and Ph. D. Participants from various management institutes from Maharashtra and Karnataka attended the FDP. Schedule of the FDP was so designed to cover all relevant aspects about research methodology and the analysis using SPSS. On the first day Dr. P. M. Charantimath dealt with the research process and Prof. Dr. S. S. Mahajan covered measurement scales and development of scales. On the second day Dr. S. S. Mundhe covered the analysis using Excel and Dr. Babu Zachariah covered data preparation and descriptive analysis. On third day of FDP Dr. S. S. Mundhe dealt with use of SPSS for univariate and bivariate analysis and Prof. Dr. D. T. Shirke covered data normalization and data presentation. On fourth day Dr. Babu Zachariah covered hypothesis testing and Dr. S. S. Bhola dealt Factor analysis, Cluster analysis. On the last day Prof. Dr. A. M. Gurav guided regarding research proposal preparation and report writing.

Right to Information Act, 2005

A One-day workshop held on

September 21st 2019

Report

Date: Sep. 21. 2019

Purpose:

1. To explore and impart the knowledge of RTI act, 2005 2. To learn the procedure of obtaining information under RTI 3. To understand the rights and responsibilities of information officers

Profile of the participants:

The majority of the participants were appellate and public information officers of Shivaji University Kolhapur

Number of participants: 40

Place and Venue: MBA Unit, Dept. of Commerce and Management, Shivaji University Kolhapur

Resource persons:

1. Mr. Vikram Chougule, Pune 2. Dr. Duresh Valvi, Assistant Professor, CISBER, Kolhapur

Flow (organization) of the workshop:

A one-day workshop on “Right to Information Act, 2005” was organized jointly by AAA & MBA Unit, for appellate and public information officers of Shivaji University. Participants were exposed to various aspects of RTI Act, 2005. They were also made to understand the procedure of obtaining information under this act. Certificate of participation was given to all the participants.

The conclusion of the workshop took place with vote of thanks by the director of MBA Unit- Dr. H. M. Thakar, at around 05:30 pm in the evening on the day first.

Writing and Communication Skills

A One-day workshop held on

January 1st 2020

Report

Date: Jan. 1. 2020

Purpose:

I. To explore the ways of writing annotations and writing communication skills II. To learn verbal communication skills

Profile of the participants:

The majority of the participants were working at the clerical and supervisory level across various administrative units of Shivaji University Kolhapur. Faculties and staff of MBA were present among the other participants.

Number of participants: 38

Place and Venue: MBA Unit, Dept. of Commerce and Management, Shivaji University Kolhapur

Resource persons:

I. Dr. V. N. Shinde (Deputy Registrar, Shivaji University, Kolhapur) II. Dr. Rachana Shikhare (Academician & Business Consultant)

Flow (organization) of the workshop:

A one day workshop on “Writing and Communication Skills” was organized jointly by AAA & MBA Unit, for clerical and supervisory level staff of Shivaji University. Participants were exposed to various aspects of written and verbal communication skills by the experts. Certificate of participation was given to all the participants. Participants learned following skills in particular.

I. Relevance of note making in formal writing II. Writing annotations III. Basics of verbal communication IV. Communication process V. Significance of body language in communication

The conclusion of the workshop took place with vote of thanks by the director of MBA Unit- Dr. H. M. Thakar, at around 05:30 pm in the evening on the day first.

Writing and Communication Skills

A One-day workshop held on

January 3rd 2020

Report

Date: Jan. 3. 2020

Purpose:

I. To explore the ways of writing annotations and writing communication skills II. To learn verbal communication skills

Profile of the participants:

The majority of the participants were working at the clerical and supervisory level across various administrative units of Shivaji University Kolhapur. Faculties and staff of MBA were present among the other participants.

Number of participants: 38

Place and Venue: MBA Unit, Dept. of Commerce and Management, Shivaji University Kolhapur

Resource persons:

I. Dr. V. N. Shinde (Deputy Registrar, Shivaji University, Kolhapur) II. Dr. V.S. Soyam (Deputy Registrar-Affiliation, Shivaji University, Kolhapur)

Flow (organization) of the workshop:

A one day workshop on “Writing and Communication Skills” was organized jointly by AAA & MBA Unit, for clerical and supervisory level staff of Shivaji University. Participants were exposed to various aspects of written and verbal communication skills by the experts. Certificate of participation was given to all the participants. Participants learned following skills in particular.

I. Relevance of note making in formal writing II. Writing annotations III. Basics of verbal communication IV. Significance of body language in communication V. Seven Cs of communication and barriers to communication

The conclusion of the workshop took place with vote of thanks by the director of MBA Unit- Dr. H. M. Thakar, at around 05:30 pm in the evening on the day first.

Department of Technology Shivaji University, Kolhapur

Name of Program conducted: Four weeks Orientation Program

Date/Duration: 2nd Dec. 2016 to 29th Dec. 2016

Program Coordinator: P. D. Patil

No. of Participants: 50

Sponsored by TEQIP Phase-II

Details of Program:-

Four weeks Orientation Program was organized by the UGC-Human Resource Development Centre, Savitribai Phule Pune University at Department of Technology, Shivaji University Kolhapur on self finance basis during 2nd Dec. 2016 to 29th Dec. 2016. 50 Participants has successfully completed this Orientation Program.

Encl.: 1. List of Participants

2. Program schedule

3. Letter of Appreciation

Department of Technology Shivaji University, Kolhapur

Name of Program conducted:- Two Week ISTE-IITB Workshop on ‘Control System’

Date/Duration:- 2nd Dec. 2014 to 12th Dec. 2014

Program Coordinator:- Rc Coordinator: P. C. Bhaskar.

Workshop Coordinator: Nayan Kotmire

No. of Participants:- 16

Details of Program:-

A two Two Week ISTE-IITB Workshop on ‘Control System’ was organized at Department of Technology, Shivaji University Kolhapur for Engineering and Technology Faculty during 10th July to 20th July, 2014. The program was conducted by IIT, Bombay under the National Mission on Education through ICT (MHRD, Govt. of India). 16 Participants has successfully completed workshop.

Encl.: 1. List of Workshop Staff

2. Attendance Sheet

3. Program schedule

Workshop Staff For Two Week ISTE-IITB Workshop on Control System 2nd Dec. 2014 to 12th Dec. 2014 Under the National Mission on Education through ICT (MHRD, Govt. of India) 1115 - Shivaji University, Kolhapur Sr No Designation Name 1 Rc Coordinator P.C.Bhaskar. 2 Workshop Coordinator Nayan Kotmire V.B.Galphade. 3 Teaching Assistant *

4 System Administrator Mr. Anil M. Kasture

Mr. Atul B. Jagdale 5 A-View & Network Coordinator

Right to Information Act, 2005

A One-day workshop held on

September 20th 2019

Report

Date: Sep. 20. 2019

Purpose:

I. To explore and impart the knowledge of RTI act, 2005 II. To learn the procedure of obtaining information under RTI

Profile of the participants:

The majority of the participants were appellate and public information officers of Shivaji University Kolhapur

Number of participants: 40

Place and Venue: MBA Unit, Dept. of Commerce and Management, Shivaji University Kolhapur

Resource persons:

I. Dr. Deepa Sadekar, Director, YASHDA Pune II. Dr. Duresh Valvi, Assistant Professor, CISBER, Kolhapur

Flow (organization) of the workshop:

A one-day workshop on “Right to Information Act, 2005” was organized jointly by AAA & MBA Unit, for appellate and public information officers of Shivaji University. Participants were exposed to various aspects of RTI Act, 2005. They were also made to understand the procedure of obtaining information under this act. Certificate of participation was given to all the participants. The program was inaugurated with the formal welcome of chief guests and participants by director of MBA Unit, Dr. H. M. Thakar.

The conclusion of the workshop took place with vote of thanks by the director of MBA Unit- Dr. H. M. Thakar, at around 05:30 pm in the evening on the day first.

Report on Short-Term Programme (Faculty Development Programme) on Recent Trends in Banking and Finance

06th March 2018 to 12th March 2018 (7 days Programme for College & University Teachers)

Prof. (Dr.) Shrikrishna Mahajan (Convener, Short Term Programme) Chair Professor

The United Western Bank’s Late R.N. Godbole Chair in Financial Management and Banking Research Department of Commerce and Management Shivaji University, Kolhapur.

1

Short-Term Programme (Faculty Development Programme) on Recent Trends in Banking and Finance

06th March 2018 to 12th March 2018 (7 days Programme for College & University Teachers)

1. About the Chair: The United Western Bank’s Late R. N. Godbole Chair in Financial Management and Banking Research is a prestigious chair in the area of banking & finance. Initially, it has been constituted at Department of Commerce and Management by Shivaji University in collaboration with then The United Western Bank Ltd. The chair has organized 9 National workshops and National Seminars on various important issues in financial sector. It has published 13 books on various topics such as micro-finance, financial institutions, cooperative movement, foreign investment, service tax and financial inclusion etc.

The Chair also has a distinct feature of organizing Late Shri. R.N.Godbole Memorial Lecture every year on the occasion of the Birth Anniversary of Late Shri R.N. Godbole on a topic which has contemporary significance. The Chair has organized 8 memorial lectures on various issues related to Banking, Economy, Finance, Cooperation etc. which have been delivered by the eminent bankers and academicians.

2. Short Term Programme: The short-term programme) was organized by the The United Western Bank’s Late R.N. Godbole Chair1 at Department of Commerce and Management, Shivaji University, Kolhapur. This was a seven days Faculty Development Programme conducted for college and university teachers. The main theme of the programme was ‘Recent Trends in Banking and Finance’.

Inaugural function of this programme was arranged on 6th March 2018 in Humanities Auditorium of Shivaji University. The eminent banker Mr. P. N. Joshi2 was the chief guest of the function who inaugurated the programme. Prof. (Dr.) D. T. Shirke3 presided over the function. Senior economist Dr. J. F. Patial and the retired NABARD official Dr. S. L. Kumbhare were present as a guest of honour. In his inaugural address, Mr. Joshi said, the knowledge of banking should reach to the common man, there are many challenges in banking in present scenario, there are two real challenges before today’s banking which are: (i) competition between cooperative, commercial and nationalized banks and (ii) the increase in Non-performing Assets (NPAs).

In continuation, Mr. Joshi said, we should analyze the functioning of Reserve Bank of India as well as Finance Ministry. The social responsibility and accountability of banks has been increased especially after the nationalization made in 1969. RBI has worked as controller and regulator of banking sector however, it is under pressure because of burden of insurance on deposits, credit management and other responsibilities. Due to increasing NPAs, the performance of banks is questioned.

1 The chair was instituted in 2000 by then the United Western Bank at Shivaji University. Its area of specialization is Financial Management and Banking Research. 2 Former Chairman of then the United Western Bank and at present Director of Saraswat Cooperative Bank. 3 Pro-Vice-Chancellor, Shivaji University, Kolhapur. 2

Prof. Shirke, in his presidential remark, appealed the teacher-participants to update the knowledge in the subject. Prof. Shrikrishna Mahajan (Convener) made introduction and welcome at the beginning. Prof. A. M. Gurav offered the vote of thanks. Dr. K. V. Marulkar made anchoring for the function.

In this short term programme, 49 teachers from various colleges and universities from the state of Maharashtra were registered and participated.

During the period of 7 days, overall 28 sessions were conducted by the eminent bankers and academicians.

During the same programme, R. N. Godbole Memorial Lecture was organized on 12th March 2019. Prof. (Dr.) S. S. Sangwan4 delivered this prestigious lecture on “Changing Perspective of Rural Credit and Financial Inclusion in India”. The valedictory function was arranged on the same day. Dr. V. D. Nandavadekar was chief guest the valedictory session which was presided over by Prof. (Dr.) Shrikrishna Mahajan.

4 Professor, SBI Chair at Centre for Research on Rural and Industrial Development, Chandigarh. 3

Following are the sessions conducted during the short term programme and topic and name of respective resource persons have been stated below:

Sr. Topic Name of Resource Person No. 1 Inaugural Function: Recent Trends in Banking and Mr. P. N. Joshi Finance Prof. (Dr.) D. T. Shirke 2 Present Banking Scenario with reference to Prof. (Dr.) J. F. Patil Financial Resolution and Deposit Insurance (FRDI) Bill 2017 3 Virtual Currency Prof. (Dr.) V. B. Kakade 4 Issues in Agriculture Financing Part- I (Distress Dr. S. L. Kumbhare of farmers, community based organizations, Rural Infrastructure, Post harvest management) 5 Issues in Agriculture Financing Part – II ( Debt Dr. S. L. Kumbhare and Investment surveys ) 6 Teaching Case Studies Dr. H. M. Thakar 7 Learning Management System (Moodle) Mr. Parashram Vadar Prof. (Dr.) Shrikrishna Mahajan 8 Demonetization : Pros and cons Prof. (Dr.) P. S. Kamble 9 Role of DCC Bank in Rural Development Dr. A. K. Diwakar 10 Use of Erroneous English Dr. Arjun Kumbhar 11 Improving Teachers’ English Proficiency Dr. Arjun Kumbhar 12 Goods and Services Tax Prof. (Dr.) P. S. Kamble 13 Web Based Learning and Teaching Dr. V. S. Khandagale 14 Research Methodology in Commerce and Prof.(Dr.) J. F. Patil Management 15 Lunch Break 16 Cases of Rural/ Village Development Prof. (Dr.) Shrikrishna Mahajan 17 Possibilities of Doing Consultancy by Teachers Prof. (Dr.) A. M. Gurav 18 Delivery Channels in Banking Dr. D. M. Chandgadkar 19 Recent Development in Banking Sector Dr. K. Ramesha 20 Risk Management in Banks Dr. D. M. Chandgadkar 21 Retail Banking Dr. K. Ramesha 22 Participatory Learning and Teaching Method: Dr. Rajendra Kumbhar Some New Dimensions 23 Quality in Research Dr. Sarang Bhola 24 Teachers Student Interaction Dr. Sachin Surve 25 Causes of NPA’s Mr. Sushant Sutar 26 Use Language in Writing and Communication Dr. Shyamsunder Mirajkar 27 Changing Perspectives of Rural Credit Dr. S. S. Sangwan 28 Valedictory Function Dr. V. D. Nandavadekar

The short term programme was benefited to the participants at extent level of satisfaction according to the feedback given by them. *********

4

5

National Workshop on Emerging Trends in Information Technology in University Management

List of Participants (Outside)

Sr Name of the Designation Address Email Id Mobile DD/ Bank Acco No participants number Cheque mmod Number ation and Date requir ed 1 PATEL KETAN IT Officer Ganpat University, [email protected] 9925623463 607630 AXIS Yes JIVANLAL Ganpat Vidyanagar- Dated bank (27 to 2 PATEL Computer 384012. Mehsana- [email protected] 9662004305 9/8/2017 31 MITESHKUMAR Programmer Gozaria Highway, Aug) GOVINDBHAI Dist-Mehsana, Gujarat, 3 PATEL Office India [email protected] 9537920541 MANOJKUMAR Superintend HARGOVANBHAI ent 4 DR ASHUTOSH Senior Central Institute of [email protected] 9619010605 25597 SBI Yes D. DEO Scientist and Fisheries Education, Dated (28 to IT Cell Panch Marg Off Yari 10/8/201 30 Incharge Road, Versova 7 Aug) Mumbai- 400061 5 DR NANAJI Librarian Gokhale Institute of [email protected] 9423531433 117736 Bank of Yes SHEWALE Politics and Economis, Dated Mahara (28 to Pune-411004 19/8/201 shtra 29 7 Aug) 6 PRAMOD JOSHI Information Gokhale Institute of [email protected] 9422188839 117735 Bank of Yes Scientist Politics and Economis, Dated Mahara (28 to Pune-411004 19/8/201 shtra 29 7 Aug) 7 DR B System Rashtriya Sanskrit [email protected] 9493816515 284130 Andhra Yes CHANDRASEKH Analyst Vidyapeetha, Tirupati dated Bank, R (27 to ARAM (A.P.) 17/8/201 S 31) 7 Vidyap eetha Branch Tirupat 8 V.G. Deputy Rashtriya Sanskrit [email protected] 9440626556 284129 Andhra Yes SIVASANKARA Registrar Vidyapeetha, Tirupati Dated Bank, R (27 to REDDY (A.P.) 17/8/201 S 31) 7 Vidyap eetha Branch Tirupat 9 RANJIT Assistant Sikkim Manipal [email protected] 9547994659 205467 Union Yes PANIGRAHI Professor Institute of Technology dated Bank of (28 to 16/8/201 India 30) 7 10 MS ANSHU Assistant [email protected] 9013589088 SINGH Registrar 11 SHRI ASHUTOSH System [email protected] 9773960040 KUMAR Administrat or 12 MR SHYAM Section Central University of [email protected] 9887242411 Yes SINGH Officer Rajasthan (28 to 30) 13 GIRISHCHANDR Lexicon MGAHV, Vardha [email protected] 9422905758 004903 Bank of Yes A PANDEY associate dated18/ India (27 to 8/2017 31) 14 DR. DHIREN B. Professor & Gujarat Vidyapith, [email protected] 9825555340 Yes PATEL controller of Ahmedabad, Gujarat (28 to Exam 31) 15 RAMAN GUPTA Director,Co University of Jammu [email protected] 9419361851 032760 J&K Yes mputer dated Bank (27 to Centre 23/8/201 30) 7

List of Participants (Local )

Sr Name of the Designation Address Email Id Mobile DD/ Bank Acco No participants number Cheque mmod Number ation and Date requir ed 1 Dr N J BANSODE Deputy Shivaji University, [email protected] UCO No Registrar Kolhapur Bank, 2 SHRI G S Deputy Shivaji University, Kolhap RATHOD Registrar Kolhapur ur 3 SHRI S M KUBAL Deputy Shivaji University, Registrar Kolhapur 4 SMT V L Deputy Shivaji University, ANTREDI Registrar Kolhapur 5 SMT S S ADSULE Deputy Shivaji University, Registrar Kolhapur 6 SHRI G R PALSE Deputy Shivaji University, Registrar Kolhapur 7 DR U K SAKAT Asstt. Shivaji University, Registrar Kolhapur 8 SHRI NS MANE Asstt. Shivaji University, Registrar Kolhapur 9 SHRI D D Asstt. Shivaji University, ADGALE Registrar Kolhapur 10 DR V J DHERE Asstt. Shivaji University, Registrar Kolhapur 11 CAPT A J Asstt. Shivaji University, KATKAR Registrar Kolhapur 12 SHRI A A Statistical Shivaji University, REDEKAR Officer Kolhapur 13 DR S Y Principal Vivekanand College, [email protected] 9421113453 830042 Oriental No HONGEKAR Kolhapur dated Bank of 23/8/201 Comme 7 rce, Kolhap ur 14 SAMIKSHA Principal SNDT Mumbai [email protected] 9822024691 377115 Bank of No VIVEK NIKAM Dated Mahara 23/8/201 shtra 7 15 MR SANTOSH Registrar Shivaraj College of [email protected] 9822415413 029946 Bank of No RANGRAO Arts, Commerce & D S Dated India SHAHAPURKAR Kadam Science 23/8/201 Gadhin College, Gadhinglaj 7 glaj 16 V S SALOKHE Administrat CSIBER, Kolhapur [email protected] No or Officer 17 M B PATIL Hardware CSIBER, Kolhapur [email protected] No In-charge 18 NISHA PAWAR Head Deptt SUKop [email protected] 9665444224 322079 UCO No of Dated bank Journalism 24/8/201 Kop 7 19 DR JAYDEEP S Director SUKop [email protected] 9850441874 No BAGI 20 T K KUNDALE Assistant SUKop [email protected] 8605887142 No Registrar 21 S M BHOSALE Assistant SUKop [email protected] 9890387898 322080 UCO No Professor Dated Bank 24/8/201 Kop 7

Scanned by CamScanner Scanned by CamScanner PMMMNMTT Resource Centre in Cyber Security & Data Sciences First FDP on Cyber Security during 1st January 2019 to 7th January 2019 Venue: Department of Computer Science, Shivaji University, Kolhapur, Maharashtra Registration List

Sr. No Name of the Faculty Name of Institute Signature 1. Anjali Gaikwad Bharati Vidyapeeth University IMK Kolhapur 2. Arjun Naikba Patil Sanjay Ghodawat University Attigre Kolhapur 3. Ashtekar Ashwini Shashank The New College Kolhapur 4. Azharuddin Aslam Dadhiwale D K A S C College 5. Bukka Bamaning Shivasharan Sangameshwar College Solapur 6. Dr Madhav Bhilave Shivaji University Kolhapur 7. Dr P. B. Dandge Shivaji University Kolhapur 8. Dr. Amar Lahu Powar Shri Vijaysinha Yadav College Peth Vadgaon 9. Dr. Ramesh Hanmant Karande Shri Vijaysinha Yadav College Peth Vadgaon 10. Gautam Dashrath Kelkar Jamkhed Mahavidyalaya Jamkhed 11. Jyoti Mayur Bohra Vpimsr 12. Komal Rohit Bhosale Dhananjayrao Gadgil College of Commerce Satara 13. Londhe Ashok Bhimrao Arts And Com. College Madha 14. Madhukar Wakhare MIT ACSC Alandi 15. Miss Bargale Nita Neminath Vivekanand College Kolhapur 16. Mohsin N Mulla Rajarambapu Institute of Technology 17. Mr. Vaibhav Raju Bage Department of Technology 18. Mr.Bhaskar J. Raskar Shripatrao Kadam Mahavidyalya Shirwal 19. Mr.Yogesh Mahadev Kamble DKTE’S Textile And Engineering Institute 20. Mrs. Sawant Manda Bapusaheb Savitribai Phule Mahila Mahavidyalaya Statara 21. Mrs. Shevate Tejshri Niranjan Kbpimsr Varye Satara. 22. Mulla Shagupta Mansur Bharati Vidyapeeths College of Engineering Kolhapur 23. Pallavi Dessai Vivekanand College Kolhapur 24. Pramod Ashok Kharade Bharati Viydapeeth College of Engineering Kolhapur 25. Praveen Hore Army Institute of Technology 26. Pravin Prakash Gaikwad Solapur University 27. R R Patil D A B N College Chikhali 28. Rachana Mudholkar Dr. D.Y. Patil Institute of Engineering Management And Research 29. Rahul Dilip Chavan The New College Kolhapur 30. Rajendra Vasant Jadhav Adarsh College Vita 31. Sagar B. Patil Bharati Vidyapeeth College of Engg. Kolhapur 32. Sangeeta Borde MIT Acsc 33. Santosh Madhale Shri. Yashawantrao Patil Science College Solankur 34. Sudhakar D Bhoite CSIBER Kolhapur 35. Taranpreet Singh ADCET 36. Vidya S Gaikwad Vishwakarma Institute of Information Technology 37. Vijay Vishnu Padalkar D.P.Bhosale College Koregaon Dist Satara 38. J B Yadav USIC, Shivaji University Kolhapur

PMMMNMTT Resource Centre in Cyber Security & Data Sciences 2ndFDP on Data Sciences during 10th Dec, 2018 to 16thDec, 2018 Department of Computer Science, Shivaji University, Kolhapur, Maharashtra

Registration List

Sr No Name of the participant College/Institute/University Signature 1. Abhijit Shankarrao Desai Bharati Vidyapeeth Imit Navi Mumbai 2. Abhijit Vitthal Patil K.H.CollegeGargoti 3. Amar Maruti Mane Willingdon College Sangli 4. Amol BhupalBokane Bharati VidyapeethsDr.Patangrao Kadam mahavidyalayaSangli 5. Archana RamakantRasal VPIMSRSangli 6. Atul Rajaram Chavan School of nano-science and technology 7. Deepak Vasant Ulape Shri ShahajiChhtrapatiMahavidyalay Kolhapur 8. Deepali Sushant Shipekar The New College 9. Dhanshree Bramhadev Patil The New College 10. Dilip Shankar Kothale SmtKasturbaiWalchand Collage Sangli 11. Goyal Prasad Tulsidas Shivraj College Gadhinglaj 12. Hatti Rohan Gururaj Dr.Ghali College Gadhinglaj 13. Jyoti M Bohra VPIMSRSangli 14. Mallamma V. Reddy Rani Channamma University Belgavi 15. Manisha Laxman Waghmode Bharati Vidyapeeths Institute of Management of Research and Studies Navi Mumbai 16. Monali Yashwant Khachane Yashwantrao Chavan School of Rural Development Shivaji University 17. MuralidharBhanarkar Shivaji University 18. Nilesh Suryakant Kulkarni AjaraMahavidyalayaAjara 19. Pankaj Dhakate G H Raisoni College of Engineering And Management 20. Patil ShantinathChavagounda Smt. KasturbaiWalchand College Sangli. 21. Poornima Girish Naik ChhShahu Institute of Business Education AndResearch 22. Pramod A. Kharade Bharati Vidyapeeth College of Engg. Kolhapur 23. Pratika Rajendra Suryawanshi Willingdon College Sangli 24. Pritee P Kinikar Smt. KasturbaiWalchand College 25. R. S. Kamath Chhatrapati Shahu Institute of Business Education Research 26. Radhika Mahadev Patil Vivekanand College Kolhapur 27. Rahul Vijay Patil Willingdon College Sangli 28. Rajani Rajaram Atigre CSIBERCNCVCW Kolhapur 29. S. G. Deshmukh The New College 30. Sagar B. Patil Bharati Vidyapeeth College of Engg. Kolhapur 31. Santosh Atmaram Shinde Shivaji University 32. Satpute Trupti Shamal YCSRD SUK 33. ShantinathNeminathChougule Jaysingpur College Jaysingpur 34. Shital RaygondaNandre Jaysingpur college Jaysingpur 35. Shraddha Kabir Kharade Shivaji University 36. Shrikant BalasahebKorke Government Institute of Forensic Science Nagpur 37. Shruti Swaroop Jamsandekar Chhatrapati Shahu Institute of Business Education Research 38. Shubhangi Rajaram Ghadge Shivraj College Gadhinglaj 39. Smruti Ashok Kulkarni Willingdon College Sangli 40. Sucheta Nitin Murumkar Smt. MathubaiGawareKanyaMahavidyalayaSangli 41. Sunil Suryaji Patil KITsInstitute of Management Education AndResearch 42. Suvarna Mahavir Patil Bharati Vidyapeeth Institute of Management 43. Swati Bhimrao Shinde Willingdon College Sangli 44. VidyullataShekhar Jadhav VPIMSR

PMMMNMTT Resource Centre in Cyber Security & Data Sciences Faculty Development Program on Cyber Security during 16th Jan, 2019 to 22nd Jan, 2019 Department of Computer Science, Shivaji University, Kolhapur

Registration List

Sr.No. Name of the Faculty Name of Institute Sign 1. Abhijeet J. Pawar Department of Electronics Shivaji University Kolhapur 2. Akash Suresh Patil Bharati Vidyapeeth Engg College 3. Avinash Bhale Shivaji University Kolhapur 4. Deepa Rajendra Ingavale Shivaji University Kolhapur 5. Dr Mohammed Abuzar Ansari SIES College of Arts Science and Commerce 6. Dr Santosh Atmaram Shinde Shivaji University 7. Dr. (Mrs.) Aasawari Suhas Jadhav Shivaji University 8. Dr. Annasaheb V. Moholkar Department of Physics, Shivaji University, Kolhapur 9. Dr. Arundhati Jaysingrao Pawar The New College 10. Dr. G.G.Chougale Shri. Yashawantrao Patil Science College Solankur 11. Dr. Iranna Sharanappa Udachan Department of Technology Shivaji University Kolhapur 12. Dr. Tripti Karekatti Shivaji University Kolhapur 13. Dr. Urmila R. Pol Shivaji University Kolhapur 14. Dr.Pratibha B.Desai Shivaji University 15. Kavita Prakash Mali Gopal Krishna Gokhale College 16. Landage Nandkumar Subhash D.R.Mane Mahavidyalaya 17. Mr Prasanna S Karmarkar Department of Computer Shivaji University Kolhapur 18. Navni Pandurang Chougale Kits IMER 19. Onkar Vasudev Hatekat Chintamanrao College of Commerce 20. Parikhit Ashok Kadam Shivaji University 21. Poornima Girish Naik Chh Shahu Institute of Business Education and Research 22. Sagar Maruti Godase School of Physical Sciences. Solapur University 23. Santosh Vasant Madhale Shri. Yashawantrao Patil Science College Solankur 24. Shrinivas Pandurang Pawar USIC 25. Shruti Kale SIES College of Arts Science Commerce 26. Siddharth Madhukarrao Lokhande Department of Technology SUK 27. Subhash Mohan Todkari Sangmeshwar College Solapur 28. Sudha Bhagavatheeswaran SIES College of Arts Science and Commerce 29. Sunilkumar Shankarrao Nirmale Shivaji University 30. Swati Sambhaji Patil Kits IMER Kolhapur 31. Swati Shrikant Kamat Gopal Krishna Gokale College 32. Tukaram Dongale Shivaji University 33. Vaibhav Deepak Bachuwar Solapur University 34. Vidya Rahul Kamane S.M.Dr.Bapuji Salunkhe College Miraj 35. Vishnu Narayan Mandrekar DMC Higher Secondary School 36. 37. 38.

. PMMMNMTT Resource Centre in Cyber Security & Data Sciences Faculty Development Program on Cyber Security during 16th Jan, 2019 to 22nd Jan, 2019 Department of Computer Science, Shivaji University, Kolhapur

Attendance

Sr.No. Name of the Faculty 16/1/2019 17/1/2019 18/1/2019 19/1/2019 20/1/2019 21/1/2019 22/1/2019 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

1 2 3 4 1 2 3 4

PMMMNMTT Resource Centre in Cyber Security & Data Sciences First FDP on Cyber Security during 26th Nov, 2018 to 2nd Dec, 2018 Venue: Department of Computer Science, Shivaji University, Kolhapur, Maharashtra Registration List

Sr. No Name Name of Institute Signature 1 Ajinkya Sukhdev Kumbhar Shripatrao Chougule Arts And Science College Kotoli 2 Alankaran Shantaram Shelar Dktes Textile And Institute 3 Amit Ashok Kadam The New College Kolhapur 4 Amrita Manjrekar Department of Technology Shivaji University 5 Arun Chandrakant Kumbhar Sadashivrao Mandlik Mahavidyalay Murgud 6 Asmaparveen Mahamadhanif Kazi Shripatrao Chougule Arts And Science College 7 Barge Sagar Bhagavan S G M College Karad 8 Chandrakant P Mugali National Informatics Centre 9 Chavan Ashok Shamrao Shri. Vijaysinha Yadav Arts And Science College 10 Chhapkhane Prasad Gangadhar Devchand College Arjunnagar 11 Dipali Mane Department Of Technology 12 Sachin Jagadev Pawar Shri. Vijaysinha Yadav Arts And Science College 13 Suraj Balaso Chougule Warana Mahavidyalaya 14 Suryakant V. Maske Shri Vijaysinha Yadav Arts And Science College 15 Shahin Abdulaziz patel Shankrarrao Jagtap Arts And Commerce College 16 Gajanan Shankar Kumbhar Tilak Maharashtra Vidyapeeth 17 Janhavi Rode Kamala College Kolhapur 18 Meghana Bandiwadekar Department Of Technology 19 Mehul Arun Jadhav The New College Kolhapur 20 Morye Sanjay Anant Government College Of Arts And Science Aurangabad 21 Akshay Ramesh Swami Dattajirao Kadam Arts Science And Commerce College

Ichalkaranji Dattajirao Kadam Arts Science And Commerce College 22 Juber Ashagar Khatib Ichalkaranji 23 Nandkishor Jadhav Tatyasaheb Kore Institute Of 24 Pnakajkumar Das Yashwnatrao Chavan School Of Social Work Satara 25 Poonam Sunil Phadnis Kamala College Kolhapur 26 Pravin Vilasrao Sawant Department Of Technology Suk 27 Prof. Babasaheb Dnyandeo Patil Bharati Vidyapeeth Institute Of Management Imrda 28 Rohan Balgonda Patil Jaysingpur College Jaysingpur 29 Sadavare Ashok Bapuso Sgm College Karad 30 Sandip Sambhaji Patil Acs College Palus 31 Sandip Shripati Patil Shri Vijaysinha Yadav Arts And Science College 32 Sarjerao Shahajirao Ghatage S. G. M. College 33 Shital Sandeep Wasamkar Kamala College Kolhapur 34 Shraddha Kharade Department Of Mathematics Shivaji University 35 Shraddha S. Kulkarni Cncvcw Csiber 36 Siddharaj D Pujari Department of Technology 37 Sridevi Karnatak University Dharwad 38 Tamgave Pranoti Annaso Department of Technology Shivaji University Kolhapur 39 Tejashree Upendra Sawant Shivaji University 40 Tejpal Jaysing Moharekar Dr. Babasaheb Ambedkar Mahavidyalaya 41 Trupti Shamal Satpute Shivaji University 42 Uday Sambhaji Jadhav Bhogawati Mahavidyalay Kurukali 43 Vaishali Paragonda Kalsgonda Shivraj College 44 Varsha Prashant Desai V.P.Institute Of Management Studies Research Sangli 45 Vidya Laxmikant Badadare Kamala College Kolhapur 46 Vishal Harishchandra Pundikar Shri Shahaji Chhatrapati Mahavidyalaya 47 Yadav Prashant Patangrao Shri. Vijaysinha Yadav Arts And Science College

The United Western Bank’s Late R.N. Godbole Chair in Financial Management and Banking Research Department of Commerce and Management

Shivaji University, Kolhapur. Short-Term Programme (Faculty Development Programme) on Recent Trends in Banking and Finance (06th March 2018 to 12th March 2018)

List of Participants

Sr. No Name & Address 1. Prof. Maruti Ganpati Kamble. Sharada Housing Society, Tembhurni Road Kurduwadi, Tal. Madha, Dist. Solapur- 413208 2. Dr. Prakash Sadashiv Kamble. Samrat Ashok Nager, Barshi Road, Kurduwadi , Tal. Madha, Dist. Solapur. 3. Dr. Mahesh Rangrao Patil. Amrut Chouk, Patil Galli, Bhilawadi, Tal. Palus, Dist. Sangli. 4. Dr. Ingawale D. B. 787, 42/A, Lay out 01, Plat No.42, Baba Jaragnagar, Kolhapur. 5. Dr. Sapkal H. G. Shahu Nagar, Kakade Plot, Osmanabad. 6. Dr. R. D. Patil. Bharati Vidyapeeth, Institute & Mgt. Navi Mumbai. 7. Arun Sakharam Yadav. H/No. 1352, Karwanchi Wadi, Ratnagiri. 8. Athalye Vasudev Mahadav. Saki Stop, Ratnagiri. 9. Dr. Tanaji Kamaji Udgirkar. Head Dept. of Economics, Rajaram College, Kolhapur. 10. Anantkawlas Tukaram Vithoba. KBP Mahavidyalaya, Pandharpur, Solapur. 11. Dr. Jalindar Sahebrao Lad. Rajaram College, Kolhapur.

12. Dr. Kumar Ganapati Kamble D. R. K. College of Commece, Kolhapur. 13. Dr. Nitin Arvind Jarandikar. Radanagari Mahavidhalaya, Radanagari. 14. Mrs. Sunanda Sukhdev Kadam. D. R. K. College of Commerce, Kolhapur. 15. Mrs. Pournima D. Chavan (Udupi) Arts & Com, College, Kadegaon, Dist. Sangli 16. Mrs. Sulochana R. Dantrao Arts & Com, College, Kadegaon, Dist. Sangli 17. Dr. Ravindra Mirjakar Mahavir Mahavidyalaya, Kolhapur. 18. Dr. Machchhindra T. Gophane Dep. Of Mathematics, Shivaji University 19. Dake Devidas Kishanrao Gopal Krishnna Gokhale College, Kolhapur. 20. Patil Babasheb Shatnu Jaywant Mahavidyalaya, Ichalkaranji. 21. Patil Suresh Pandurang Shri. Vijaysinha Yadav Arts & Sci. College, Peth Vadgaon. 22. Dr. Dinesh Dattatray Satpute Assistant Prof. English Y. C. Warana Mahavidyalaya, Waranagar, Tal. Panhala, Dist. Kolhapur. 23. Dr. Dnyaneshwar Hilal Pawar. Department of Geography, Shivaji University, Kolhapur.

24. Dr. Supanekar Sanjay Raghunath Balasaheb Desai College, Patan Tal. Patan, Dist. Satara 25. Dr. S. S. Kenjle Arts and Comm. College, Vaduj Tal. Khatav, Dist. Satara 26. Dr. Ms. V. P. Katti Department of Economics, Shivaji University, Kolhapur.

27. Dr. T. A. Kamble R. B. Madkholkar Mahavidyalaya, Chandgad, Tal. Chandgad, Dist. Kolhapur.416506 28. Dr. S. R. Powar. Karmaveer Hire Art’s, Commerce & Science Education College, Shri Mouni Vidyapeath, Gargoti. 29. Kamble Bajirao Namdev. Shri Venktesh Mahavidyalaya, Ichalkarnji. 30. Dr. Dnyandev Salu Kale. Amdar Shashikant Shinde Mahavidyalaya, Medha, Tal. Jawali, Dist. Satara.415012 31. Shri. Anil D. Patil. Shivshri Colony, Patil Vasahat, Po. Gadhinglaj, Dist. Kolhapur. 416502 32. Mrs. Moruskar A. D. Dr. D. V. Patil Colony, Gargoti, Tal. Bhudargad, Dist. Kolhapur. 33. Dr. Mrs. Urmila Mahesh Chavan Miraj Mahavidyalaya, Miraj, 9 Shree Ramnivas Govt. Colony. Vishrambag, Sangli.416415 34. Dr. Seema Shashikant Kadam. Prem Bangalow, Chhatrapatinagar, Ratnagiri. 415639 35. Mr. Sharad N. Boravadekar. Guruprassad Complex Near Vishalgadkar Wada, Nagala Park, Kolhapur. 36. Ms. Kavita Shrikant Vadrale. Yashwantrao Chavan School of Rural Development, Shivaji University, Kolhapur.

37. Dr. R. G. Korabu. D. D. Shinde Sarkar, College, Kolhapur. 38. Shri. S. H. Mane BV’s Yashwanrao Chavan Law College, Karad. 39. Dr. Lande S. D. Adity Residence Plat No. 406, Samarta Chowk, Kasaguedi Pune 40. Dr. Sadamate M. G. Krantiagrani G. D. Bapu Lad, Mahavidyalaya, Kundal Tal. Palus Sangli 416313

41. Dr. A. V. Moholkar Dept. of Physics, Shivaji University, Kolhapur.

42. Mrs. Swati P. Hake Dept of Economics, Shikshanmaharshri De. Bapuji Salunkhe College, Miraj, Dist. Sangli

43. Dr. Chavare Dattatraya Tatyaba. D. G. College of Commerce, Satara.

44. Mr. Patil Ranjit Bhauso. Anandibai Raorane Arts, Commerce & Science College, tal. Vaibhavwadi, Dist. Sindhudurg. 45. Dr. Manasi Vijay Latkar Maitra, 165/3D, Mangalai Colony, Shahungar, Satara. 46. Dr. Arun Annashabe Patil. Mahavir College, Kolhapur. 47. Dr. Tatoba Kalappa Badame D. D. V. P. College, Tasgaon. Add. Dr. Chavan Hospatil, Ganpati Mandir, Tasgaon, Tal. Tasgaon Dist. Sangli 48. Dr. Rajkumar A. Waingade Asst. Prof. (Economics) Devchand College, Arjunnagar, Kagal, Kolhapur. 49. Patil Ranjit Bhausaheb Anandibai Raorane Arts, Commerce & Science College, Vaibhavwadi, At/post/tal. Vaibhavwadi, Dist. Sindhudurg.

Prof. (Dr.) Shrikrishna Mahajan Convener Short Term Programme Chair Professor The United Western Bank’s Late R.N. Godbole Chair Department of Commerce and Management Shivaji University, Kolhapur.

*********

‘Emerging Trends in Information Technology in University Management’ August 28-30, 2017

Shivaji University, Kolhapur

Day 1: 28th August 2017- Inaugural Function

Day 2: 29th August 2017 - Participants of Workshop

Day 3: 30th August 2017 - Valedictory Function of Workshop

Shivaji University, Kolhapur Academy of Academic Administrators Grooming the Participants for Creating Positive Attitude 7th Jan. 2019

Shivaji University, Kolhapur Academy of Academic Administrators Three Days Workshop Newly Appointed Principals 13th to 15th Feb. 2019

Shivaji University, Kolhapur Academy of Academic Administrators Workshop on Worklife Balance of Female Employees 23rd Jan. 2019

Shivaji University, Kolhapur Academy of Academic Administrators Grooming the Participants for Creating Positive Attitude 29th Dec. 2018

Shivaji University, Kolhapur Academy of Academic Administrators Foundation Programme for Promoted Assistant Supritendents 25th to 27th Oct. 2018

Hon’ble Pro Vice Chancellor Dr. D. T. Shirke’s speech at the time of Inauguration of E-Content Workshop (29th March, 2019)

Shri. Shrikant Thakkar (Expert from EMMRC, Pune) Expert talk during E- Content Workshop (30th March, 2019)

FDP- DAY 1 FDP- DAY 2

FDP- DAY 4

FDP- DAY 6

Practical Sessions in Lab

Visit to Shivaji University Space Research Laboratory, Panhala

a. Day 7 : Mr. Rohan Nyayadish was the resource person for last day i.e. day seven of FDP. He spoke on email Security, Concept of hacking, Case Studies, Phishing /Nigerian Scams and Steganography concept. Types of phishing:- Lottery Scam, Foreign job offer scam, Vishing:-Voice+phishing Second session focused on Wi-fi security tips, Online banking frauds, Online Banking safety tips, Privacy Law is not , How to maintain security, Mobile Crime:- Anonymous Calls and sms, Carrying obscene material, MMS Scandals, , Bulk SMS, Mobile Hacking, Denial of service, Smishing :- Phishing+SMS, Uninvited SMS.

Third session after lunch was dedicated to AADHAAR Privacy Act, Sound.pk,mGoogle map Pokémon-game were debated. Paul‘s Theorem:- Paul’s cyber space iceberg theorem was explained. Actual depth of the cyberspace problem.Black whole Concept.26/11 incident discussion, Technology responsibilities in this incident were the topics of debate

Mr Rohan Nyayadhish giving away momento to participant who stood first in the test

Last session of the FDP was evaluation where test was conducted on Cyber security awareness on Kahoot Platform and rankers were presented with the memento.

Participants with resource persons Mr Sankalp Mate and Mr Amar Thakare

Adv. Jhala delivering the Session

Day 1

Session by Aniket Badami With Participants

Mr. Aniket Badami delivering session on Malware

Mr. Amar Thakare guiding participants on Lab assignments in Lab

Mr. Amar Thakare tea time discussions with participants

Felicitation of Mr. Dinesh Kudche

FDP Day-1

FDP Day-2

FDP Day-3

FDP Day-6 Shivaji University, Kolhapur MBA Unit, Department of Commerce and Management, Faculty Development Programme on Learner Centric Approach 24th to 28th February 2019

FACULTY DEVELOPMENT PROGRAMME ON RESEARCH METHODOLOGY AND DATA ANALYSIS USING SPSS FOR MANAGEMENT TEACHERS 5TH TO 9TH January 2016

One Day Symposium : Administrative Reforms in Distance Education (26th Nov. 2016)Participants Group Photo (2016)

One Day Symposium : Administrative Reforms in Distance Education (26th Nov. 2016) Dr. B. M. Hirdekar Former COE of SUK addressing the Participants (2016)

Director, Centre for Distance Education Addressing the participants of Workshop (Soft Skills, 2017)

Shivaji University, Kolhapur Academy of Academic Administrators One Day Workshop for Supritendents and Section Officers for the Presentation of Submission of Various Meetings in University and Preparation of Minutes and Reports Thereof 1st Sept. 2018

Shivaji University, Kolhapur Academy of Academic Administrators Workshop on Writing & Communication Skill 1st Jan. 2020

Shivaji University, Kolhapur Academy of Academic Administrators Workshop on Writing & Communication Skill 3rd Jan. 2020

Shivaji University, Kolhapur Academy of Academic Administrators & Yashwantrao Chavan Academy of Development Administration Workshop on Right to Information Act -2005 20th Sept. 2019

Shivaji University, Kolhapur Academy of Academic Administrators & Yashwantrao Chavan Academy of Development Administration Workshop on Right to Information Act -2005 21st Sept. 2019