Presentation is loading. Please wait.

Presentation is loading. Please wait.

Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida.

Similar presentations


Presentation on theme: "Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida."— Presentation transcript:

1 Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida

2 Need of e-Security Education Information security is required at all levels personal level, corporate level, state and country level. In any company, the integrity of its systems and the data contained within, including issues of customer privacy should be looked after very closely at protecting its literal and electronic borders.

3 Market Survey NASSCOM predicts requirement of 1,88,000 e- Security professionals by the year 2008. Lack of entry level courses and certifications in information security market. Security compliance is must for all companies with IT backbone. IT–ITES industry requires security experts. Cross training people in security is an asset to any organization. Information workers lack of basic security knowledge causes huge financial losses. NASSCOM points out that IT Security Education is the need for the hour.

4 Information Security & hacking market in India Reported cases of nearly 15,000 cyber crimes in India in an year (Source NDTV Profit); Fastest growing Internet user market; Among Top 10 countries in terms of cyber crimes; Cyber security business in India is currently worth US $1.5 billion; Cyber security business has a high growth rate of 30 percent. Number of hackers are three times the security professionals.

5 Challenges for e-security education through e-learning mode To impart the education in the traditional classroom mode or through e-Learning mode. The type of e-security knowledge required to be provided. To categorize the e-security information as per the requirement of different kinds of users. To identify the users to whom the e-Security education is to be provided. To design the syllabus according to different user perspectives. To develop the contents in such a way so as to enable the learners to understand clearly the theoretical concepts, practical explanation, real time solutions etc.

6 Importance of e-Learning approach e-Learning mode is most effective for users such as working professionals, students pursuing their studies etc,such as For imparting training with anytime, anywhere, any place methodology For broader audience coverage 24x7 information content availability Click & learn technique For faster learning in cost effective way

7 Relevance of e-Learning methodology to the e-security education Greater need for training to the masses Frequent up gradation of content for various categories of users Minimum training budgets and learning cost Distributed learner base makes classroom training difficult.

8 Current project : Design & Development of e-learning contents for e-security solution developers A project of DIT, MCIT (Ministry of Communications & Information Technology)

9 e-learning Facilities available at CDAC Resources available: H/W: Fully capable database server, Content Server, & Application Server. S/W: Content authoring & publishing tools Multimedia tools, Learning Management System. Dedicated team: One exclusively dedicated team for content development.

10 Highlights of the project Categorization of e-security contents for three categories of users namely: (I) Postgraduate /Engg. Students (II) System Administrators/Officers in charge of e- security (III) Scientists Designed the curriculum of contents for the three categories of users. Curriculum approved from eminent e-security experts and professors

11 Content Development Strengths at CDAC Content Creation Content Publishing Content Verification Content Hosting Content Access

12 Architecture for implementation- Deployment of content

13 Use of the e-Learning contents on e- security The developed e-Learning contents would provide various case studies with varying levels of complexity and security to enable the understanding of the development of e-security solutions. The case studies would be categorized according to the target group of users and according to the complexity of the requirements. The case studies can also feature the existing tools, which can be modified and updated as per the user requirements.

14 Use of the e-Learning contents on e- security The contents provide linkage of the case studies with the inherent algorithm and mathematical models Case study : Detailed explanation of the algorithm (crypto algo ) ↓ Number systems & mathematical models involved ↓ Implementation of the algorithm in a sample application using programming language ↓ Usage of the application as a e- security solution

15 Conclusion The developed contents for students (first category of users ) would be available in a couple of months, for the use of public and masses. The motive is to educate as many people as possible at their own pace, place and time, which would be effectively possible through e-learning mode. It is thus expected from various Engg. Colleges, Educational institutions and Industries imparting training to obtain the registration for accessing the developed advanced e-security contents through e- learning mode.

16 Implementation Content Server provided by C-DAC Noida Student Registers Appears for review tests and Online tests Practice sessions simulating lab sessions Participates in bulletin board Working models and Interactive Quiz Student is assigned UserId and Password Log into Content server at C-DAC Noida and attend contact sessions Personal Page Solved Question Papers


Download ppt "Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida."

Similar presentations


Ads by Google