Title: CDAC Hyderabad
1C-DACHyderabad
Our experiences in offering courses on Cyber
Security and Software process Management using
e-Learning framework (e-Sikshak) A Case
Study)
2Outline
- E-Learning Activities
- Learning Management System
- Online Courses
- Content Development Process
- Standards Conformance
- Learning Resources Framework
- Training
3(No Transcript)
4E-Learning Activities
- Development of e-learning Framework (e-Sikshak)
- E-learning framework to offer e-learning course
in Hindi, Telugu and English - Presently being used by C-DAC and Indian Law
Institute - Content Development and Standards
- Development of Course Content on Cyber Security
complying to SCORM standards and to offer in
e-learning mode (DIT Funded Project) - Development of Quality Assurance Framework
(On-Going) - Establishing Walk-in e-Learning Technology
Laboratory (six months time)
5Three Key Steps in E-Learning
6Learning Management System
- eSikshak A Multilingual E-Learning Framework
(Funded by DIT, Govt of India) - Component based architecture
- Supports Asynchronous Synchronous communication
- Assessment, Course Organizer
- Indian Language Interface
7Components of eSikshak
Online Assessment Whiteboard Chat Multi-lingual
Support
Content Organizer White board A virtual class
room Discussion Forums Query Handler
8Telugu User Interface
9e-Sikshak in English
10Content Development
11CCSPM Syllabus
- Overview of Software Engineering
- Introduction to Software Engineering
- What is a successful Project?
- Software Quality Assurance
- Software Development Methodologies
- Development Life Cycle Models
- Project Execution Models
- Software Requirements Engineering
- Software Design
- Software Implementation
- Software Testing
- Software Release and Configuration Management
12Contd..
- Software Project Management
- Project Feasibility Studies
- Software Project Estimation
- Project Proposal
- Human Factors in Software Engineering
- Recruitment Process
- Team Formation
- The Training Process
- Software Project Planning Monitoring
- Learning from History Postmortem Analysis
- Software Quality Management
- ISO 9000 Quality Management System
- Capability Maturity Model for Software
- People Capability Maturity Model
- Capability Maturity Model Integration for
Software Engineering - Personal Software Process
- Ethical Issues in Software Engineering
13CCCS Syllabus
- Unit 1 Security Concepts and Mechanisms
- Networking Concepts Overview
- Information Security Concepts
- Security Treats and Vulnerabilities
- Cryptography
- Unit 2 Security Management
- Security Management Practices
- Security Laws and Standards
- Unit 3 Network Security
- Access Control and Intrusion Detection
- Server Management and Firewalls
- Security for VPN and NGN
- Unit 4 System and Application Security
- Security Architectures and Models
- System Security
- OS Security
14Course Material - PDF Format
15Course Material - PPT Format
Demo
16Video Lecture on Cryptography by Dr. PV Ananda
Mohan
Demo
17Video Lecture on e-Security Architecture by
Dr.Athithan
Demo
18Video Lecture on Computer Networking by Dr. Sarat
Demo
19Denial of Service simulation
Demo
20War Dialing simulation
Demo
21(No Transcript)
22Assessment
- Formative Assessment
- Multiple choice objective type assessment
- Assignments
23Standards Conformance
- Content Standards
- AICC (Content Structure, Launch, Communication
API, Data Model) - IEEE LTSC (Metadata Dictionary)
- IMS (Content Packaging, Metadata XML Binding)
24Sharable Content Object Reference Model (SCORM)
- A means to facilitate interoperability among
web-based learning products - A set of interrelated specifications designed to
meet DoDs ADL high- level requirements - A process to bring together disparate groups and
interests - A bridge from general emerging technologies to
commercial implementations - In nutshell
- A collection of specifications collected from
multiple sources by Advanced Distributed Learning
(ADL) to provide a comprehensive suite of
e-learning capabilities that enable
accessibility, interoperability, reusability and
cost-effectiveness of Web based learning
content.
25SCORM Implementation Procedure
- Discovering learning objects within the storage
space. - Creating Metadata for the learning objects using
the Metadata generator - Verifying the XML file containing the Metadata
information for SCORM conformance using the ADL
Test Suite - Creating web deliverable versions of the learning
objects keeping the RTE requirements in mind - Checking the generated learning object for SCORM
RTE conformance using the ADL Test Suite - Cataloging the learning object and storage
26Metadata Generator
27Content Packaging with ADL Test Suite
28Learning Resources Framework
29Essential for successful implementation
- Instructional Designer (External/ Internal)
- Content Author (External)
- Content Developers
- Multi Media Expert (Internal/ External)
- Subject Matter Experts (Internal/ External)
30Online Course Our Experience
- CCSPM is being offered to people who are involved
in - Software Design Development
- IT Graduates
- CCCS is being offered to students of
- Network Administrators
- IT Developers
- Information Security Officers
- Number of students trained 500 (Approx)
31Observations from Students Feedback
- Over all it is good experience of learning. I
would like to join more advanced version of this
course. And also need practical training. - The course description is nice, technical content
is good and simulations are helpful in
understanding the concepts. - Synchronization issues between slide transitions
need to be resolved. - Simulations must be downloadable.
32Shri RR Shah, Secretary, DIT (during Aug 2001)
inaugurating the National Seminar ELELTECH India
2001
National Seminar ELELTECH India 2001 in News
33Innaugrated by Prof. Dikshit Vice-chancellor,
IGNOU Shri B K Murty Vice President, Wipro Prof.
S.P.Mudur Concordia University Canada
Pannel discussion Chaired by Shri Ajeer Vidhya
JSFA, DIT
34INDIA ASEAN Seminar on ELearning and ELearning
Technologies
35Quality Assurance Framework
36Information Security Awareness Framework
37Identified Topics
38Identified Topics
39(No Transcript)
40(No Transcript)
41(No Transcript)
42(No Transcript)
43(No Transcript)
44(No Transcript)
45(No Transcript)
46(No Transcript)
47(No Transcript)
48(No Transcript)
49(No Transcript)
50Crossword Puzzle
51Knowledge Application
52Summary
- Cyber security content is successfully developed
with content in the form of presentations with
audio, lectures by domain experts and animations
with audio explaining the various concepts of
security - Practical experience to the learner through 2D/3D
based animations - Animations on how to install, configure and use
security tools such as firewalls, ethereal etc. - ISEA content will be offered in e-Learning mode
also.
53THANK YOU