Shivaji University Kolhapur (M.S.)
Total Page:16
File Type:pdf, Size:1020Kb
SHIVAJI UNIVERSITY KOLHAPUR (M.S.) CRITERIA-VI EVIDENCE(S) AS PER SOP METRIC NO. Average number of professional development / administrative training 6.3.3 programs organized by the Institution for teaching and non teaching staff during the last five years 1. List of professional development / administrative training programs organized by the institution 2. Brochures 3. Reports year-wise 4. List of participants of each programme 5. Photographs with date and caption. NOTE – The evidences from page No.1 to 40 are uploaded on the NAAC portal and the remains pages of evidence are upload on university portal. The link is provided in matrix no 6.3.3 AboutShivaji University: Objectives of the Training Shivaji University, established in 1962, is named after the · Train 2000 faculties 8. Matrices Preview Great Maratha Warrior and founder of the Maratha empire · Building networks of professional 9. Building Your First Matrix Chhatrapati Shivaji. It was inaugurated on 18th November, · Forming consortium of industries specialized in cyber security 10. Dictionaries in Python 1962 by Dr. Radhakrishnan, the then President of India. One which will interface with Shivaji universityKolhapur 11. Matrix Operations of the major objectives behind foundation of this University · Sensitizing cyber security to masses at large for 12. Explore & Define a ML use case was to cater to the regional needs of South Maharashtra. The strengthening cashless transactions. 13. EDA and Feature Engineering jurisdiction of the University is spread over three districts viz. Eligibility: 14. Working on Machine learning using python Kolhapur, Sangli and Satara with strength of about 3,00,000 15. Importing data into Python students studying in 280 affiliated colleges and recognised Faculty Members from Science and Technology, Humanities, 16. Exploring your dataset institutes. For more details visit www.unishivaji.ac.in Social Sciences, Commerce and Management discipline from Universities, Colleges, N!Ts, IIITs, Engineering Colleges and 17. Filtering a Data Frame About Resource Centre In Cyb er Security& DataSciences other Institutions of Higher Education. 18. Renaming Columns of a Data-frame National Resource Centre In Cyber Security & Data As the number of participants is limited to 40, preference will 19. Exploratory Data Analysis Sciences is established under the guidance RUSA be given on First Come First Serve basis 20. Univariate Analysis Maharashtra from the grants received from the MHRD, Programme Schedule 21. Univariate Analysis 2 Government of India under the "Pandit Madan, Mohan (10· December 2018 To 16MDecember, 2018) 22. Simple & Multiple Linear Malviya National Mission on Teachers and Training 23. Regression (PMMMNMTT) scheme. Objective of this centre is capacity Day and Date Course Contents 24. Regression Demo building of human resource which is recognized as a critical Day 1: 25. Simple Network Servers element to strengthen not only the organization/ institutions Introduction to Python Monday,10/12/2018 26. Package Managers but even the people at grassroots level by spreading Day2: awareness Cyber security. There is a large gap between Machine learning using Python ""� demand and availability of trained human resource in Cyber Tuesday,11/12/2018 .:� ·:,,- _-:,- Security, who can beneficially utilize the available Day3: Registration: "' � �' information for cyber safety. Cyber security trained human Wednesday,1 2/12/2018 Data Analytics using Python Participants have to register through online web-portal only. �--::- � No need to send any printed documents to the Resource ;:::;-;---;::: resource is needed both as the provider and user of Day4: Technology. This is vital for sustainable development so that Hands-on session on Centre/Shivaji University. Registration link: Thursday,13/11/2018 Python informed decision making can be done at all levels. http://sangnaksuraksha.com/FacultyRegistration.aspx Days: About the Training Hands-on session on Machine Instructions for the Participants: Friday, 14/11/2018 Cyber security is need of the time, as estimated byNational Learning ❖ Attendance at all sessions is mandatory. Breakfast,Lunch Association of Software and Services Companies Day 6: Hands-on session on Data Analytics and Tea will be provided. (NASSCOM)'s Cyber security Task Force, there is need of 1 Saturday,15/12/2018 ❖ Outstation participants will be provided accommodation million trained cyber security professionals in India by 2025. Day7: Exam and Evaluation only on advance intimation. But, currently there are only 62,000, so to fill this gap there is Sunday 16/12/2018 Technical Requirements from participants: need to introduce cyber security courses at graduate and postgraduate levels. Our aim is to train teachers with practical The eligible candidates will be given confirmation is available ❖ Participants should carry their own laptop as well as - skills so that more and more cyber security experts can be on web-portal and it will also be informed through email. All debit cards, credit cards, payment wallets, netbanking, shaped every year. It is expected that the 'Train the Trainers' confirmed participants will have to submit a relieving letter UPI, mobile banking, paypal, aadhar, PAN card with them approach shall percolate to the students in colleges and make from their institution on the first day of the training. for sample demos them suitable to take up challenges in the domain of Cyber Laboratory assignments ❖ Participants should carry smartphone either android / Security which is the need of this decade and will thus 1. Introduction to Python . ios with them. improve their employability enhancing campus placement. In 2. Introduction to Machine Learning. ❖ Participant should focus on smartphone apps like addition, Cyber Security courses will help in start-ups and 3. Importing data using python for analysis Truecaller, PayTM, PhonePe, Google Pay, PayZApp, employment opportunities. The facultyshall be also trained 4. Exploring data sets for analysis Authenicator, Facebook, WhatsApp, lnstagram, Other specifically as knowledge creator with strong practical 'skills' 5. Working with loops, metrics, data submission financial or important apps. and theoretical details. 6. Building Data-Frames, merging data-frames and visualization with data-frames 7. Data analytics using python 8. AboutShivaji University: Objectives of the Training 4. Collect the Owner's information using spyware. Shivaji University, established in 1962, is named after the · Train 2000 faculties 5. Steganography: Perform data hiding using covered Great Maratha Warrior and founder of the Maratha empire · Building networks of professional writing Chhatrapati Shivaji. It was inaugurated on 18th November, · Forming consortium of industries specialized in cyber security 6. Identification of virus infected file using virustotal.com 1962 by Dr. Radhakrishnan, the then President of India. One which will interface with Shivaji universityKolhapur 7. Understanding traceroute functionality using open of the major objectives behind foundation of this University · Sensitizing cyber security to masses at large for visual traceroute was to cater to the regional needs of South Maharashtra. The strengthening cashless transactions. 8. Vulnerability analysis in web application using Zed jurisdiction of the University is spread over three districts viz. Attack Proxy Kolhapur, Sangli and Satara with strength of about 3,00,000 Eligibility: Faculty Members from Science and Technology, Humanities, 9. Isolating WLAN Traffic using Separate Firewall for VPN students studying in 280 affiliated colleges and recognised Connection Social Sciences, Commerce and Management discipline from institutes. For more details visit www.unishivaji.ac.in 10. To Create a Virtual Private Network(VPN) over WAN Universities, Colleges, N!Ts, IIITs, Engineering Colleges and About Resource Centre In Cyb er Security& DataSciences 11. To evaluate application response time in the presence other Institutions of Higher Education. National Resource Centre In Cyber Security & Data and absence of a firewall. As the number of participants is limited to 40, preference will Sciences is established under the guidance RUSA 12. Managing Security in Small Business Network be given on First Come First Serve basis Maharashtra from the grants received from the MHRD, Programme Schedule 13. Security Group Policies Management Government of India under the "Pandit Madan, Mohan (01 January, 2019 To 7 January, 2019) 14. Group Policy management Malviya National Mission on Teachers and Training 15. ICMP Ping 16.Subnetting (PMMMNMTT) scheme. Objective of this centre is capacity Day and Date Course Contents 17. Firewalls 18.RIP building of human resource which is recognized as a critical Day 1: Introduction and 19. OSPF 20.VPN element to strengthen not only the organization/ institutions Tuesday, 01/01/2019 Computer Security- I 21. VLAN 22.Case study on IT Act 2000 but even the people at grassroots level by spreading 23. Case study on cyber attack / cyber crime awareness Cyber security. There is a large gap between Day2: Computer ""� demand and availability of trained human resource in Cyber Wednesday,02/01/2019 Security -I .:� ·:,,- _-:,- Security, who can beneficially utilize the available Day3: Network Registration: "' � �' information for cyber safety. Cyber security trained human Thursday, 03/01/2019 Security I Participants have to register through online web-portal only. ;:::;-;---;:::�--::- � resource is needed both as the provider and user of No need