BCA, Bachelor in Computer Application course having industry orientation with facility to specialization in the specific emerging IT and IT based focused areas. This course will focus on in demand technologies such as Information, Security, Artificial Intelligence, Bioinformatics, Data mining and analytics, JAVA, .Net, Oracle, Linux, Data Structure, C, C++ among other in its 3 years curriculum and would be based on international university patterns.
Industry Specific With Facility to Specialize in:
* Life science
* Banking and retail
* Software engineering
* IT enabled services
* Embedded technologies
* Innovative course content to meet industry requirements.
* Customized program with choice of elective stream.
* Self learning material will be available in the form of CDs coupled with web based on-line technical support.
* Virtual lab to practice at home work place.
C is versatile and all-embracing. It is the mother of all programming languages and we will make you learn the concept of programming in any computer language. Appin Certification course on C and Data Structure begins from basics and reaches to the advanced level programming. Our tutorials for C programming language are useful, practical and give a comprehensive idea on C and Data structures.
Course Coverage: Important Topics
- Data Types, Constants, Variables and Keywords.
- Sequence/Decision Control Structure,
- Functions, Pointers, Array,
- Structured, Union, Enumeration,
- File Input/output:
- OOPS Concept: Class, Object
- Programming construct: Inheritance, Encapsulation, Polymorphism
- Data Structure: Stacks, Queues, Linked Lists,
- Searching, Sorting Technique Algorithm, Trees
What Is Application Programming?
Application programming is the specific method prescribed by a computer operating system or by an application program by which a programmer writing an application program can make requests of the operating system or another application.
Why Application Programming is must for students now?
All the top software development companies require software programming experts in .NET, Java & C . These include Microsoft, Trilogy, Infosys, Wipro, TCS, HCL Technologies, Sapient, Patni Computers, Satyam, and Cognizant Technology Solutions along with many others. As most of software development takes place in .NET, Java & C these days a large number of SME's who carry out outsourced projects. Application programmers find jobs in all the industry sectors.
What is Embedded Technology?
Embedded Technology is the most popular technology that introduces advanced technologies and solutions for emerging embedded applications, including digital consumer electronics, automotive, wireless/ubiquitous computing and factory automation.
Why Embedded Technology is must for students now?
Millions of products in our everyday life today have some form of embedded software in them. Home appliances, automobiles, wireless devices and consumer electronics devices are just a few examples.In this embedded domain involves, software development, design and manufacture and even re-engineering of new and existing reference designs, development of device drivers, wired and wireless stacks and even porting of network protocols.
To design tomorrow's Embedded System today industry needs over a million professionals in this field by 2010. Because…
* Corporations need trained professionals for design and implement embedded software in electronic instrumentation hardware.
* Consulting firms need embedded specialists, engineers and technicians to provide professional expertise for corporations and government agencies.
1.Embedded Systems Design
2.Microcontrollers and Applications
6.C Programming and Data Sstructure.
What is Information Security and Ethical Hacking?
IT Security is a term which is concerned with the protection of hardware, software and a network of an organization, from the perils of disaster and external attacks (through virus, hacking, etc.). It is more to do with the electronic data and is covered in the IT Policy of an organization, in other words, it looks at protecting / safeguarding information and information systems from anyone including employees, consultants, suppliers, customers and of course, malicious hackers.
Why Information Security is must?
After the boom in Networking and Software jobs, the past two years have seen a sharp rise in the field of Information Security, Information Security and Ethical Hacking is the latest buzzword in the industry and not without reason in the past five years the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially.
“NASSCOM predicts requirement of 1,88,000 IT Security professionals by the year 2008. Currently the number of security professionals in India is around 22,000”.
Need for Information Security in the Indian market
Security Compliance is must for all companies with IT backbone. The requirement is high with organizations in IT/ ITES segment. Information workers lack of basic security knowledge. Information Security industry is going through an exponential growth rate. Current worldwide growth rate is billed at 21%. Higher salaries are been offered to professionals in IT security. Information security industry is currently over $100 B ($60 B in US, $ 20B UK, $4.5 B Japan, over $1.5 B India).
What Is Networking & Communication?
In Information Technology, Networking is the construction, design, and use of a network, including the physical (cabling, hub, bridge, switch, router, and so forth), the selection and use of telecommunication protocol and computer software for using and managing the network, and the establishment of operation policies and procedures related to the network.
Why Networking & Communication is must for students now?
In the world of computers, most people decide to network because they have more than one computer and want to share one broadband Internet connection, whether at home or at the office. There are other benefits as well, including the ability to share files, pictures, music and more with everyone on the network. Everyone can share a single printer and gamers can play against competitors on the network or connect game consoles to take advantage of online gaming. If the networking is wireless-enabled, desktop computers can be set up where they're convenient in the home or small office, not just where there happens to be a wire. Laptop computer users are free to roam almost anywhere in, or around, the network without losing their connection.
The course involves making of a robot from scratch. During the workshop you will be exposed to programming in 8051 Microcontroller, PIC microcontroller & Embedded Linux. At the end of the Training you would have constructed your own robot. The Training clears concepts related to embedded systems, artificial intelligence, robotics and automation. The Training is a flagship workshop of Appin. Students interested to make their career in Robotics or Embedded Technologies always join the type of training.
- Introduction to Embedded Systems
- Introduction to 8051
- Instruction set of 8051
- Basic & Port Programming of 8051
- Timer Programming of 8051
- Interrupt Programming of 8051
- Serial Communication Programming for 8051
- LCD & Seven segment Display
- Embedded C Programming
- Introduction to Robotics
- Actuators & Motors
- Sensors and other Peripherals
Why Information Security?
After the boom in Networking and Software jobs, the past two years have seen a sharp rise in the field of Information Security. Information Security and Ethical hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially.
“NASSCOM predicts requirement of 1,88,000 professionals by the year 2008. Currently the number of security professionals in India is around 22,000.”
The current demand for Information Security jobs continue to grow. With information security increasingly becoming a boardroom level concern, training and certification are becoming increasingly important for candidates and companies alike.
* Network Security Systems Manager
* Network Security Systems Administrator
* Network Security Engineer
* Systems/Applications Security Executive
* Web Security Administrator
* Web Security Manager
* Security Auditor
* Ethical Hacker Data Security Specialist
* Chief Information Security Officer
* Computer Forensic Investigator
* IT Security Consultant
* IT Security Manager
* IT Security Administrator
* Security Certified Programmer
* Forensics Investigator
Why Information Security?
After the boom in Networking and Software jobs, the past two years have seen a sharp rise in the field of Information Security. Information Security and Ethical hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially. “NASSCOM predicts requirement of 1, 88,000 professionals by the year 2008. Currently the number of security professionals in India is around 22,000.” The current demand for Information Security jobs continue to grow. With information security increasingly becoming a boardroom level concern, training and certification are becoming increasingly important for candidates and companies like. Need for Information Security in the Indian Market Security Compliance is must for all companies with IT backbone. The requirement is high with organizations in IT / ITES segment. Information workers lack of basic security knowledge. Information Security Industry is going through an exponential growth rate, current worldwide growth rate is billed at 21 %.
Course Contents: ISEH
- Desktop & Server Security
- Malwares, LAN Security, & Firewall Security
- Internet Security
- Scanning, Fingerprinting, and Information Gathering
- Technical Attacks & Password Cracking
- Art of Googling and Data Backup
- Penetration Testing and Catching Criminals
- Cryptography, Stagnography & Cyber Forensics
- Security Auditing and Cyber Laws
Java is an object-oriented programming language developed by Sun Microsystems in the early 1990s. The language is very similar in syntax to C and C++ but, in techie terms, it has a simpler object model and fewer low-level facilities.Java quickly became a popular programming language. Newer versions of the java programming language had multiple configurations built for different platforms. For example, J2EE for enterprise applications and J2ME for mobile applications.J2EE provides the environment to develop and deploy the enterprise applications. Basically J2EE is a platform that is used to making the server side applications. The course in-depth study in Web container and EJB Container.
For Students: Students interested in programming and a vent for technical career will be greatly benefited from Java/J2EE. The course will lay a strong foundation for the students who wish to pursue the most famous certification in the field of J2EE.
- INTRODUCTION TO JAVA
- JAVA LANGUAGE FUNDAMENTAL
- OOPS CONCEPT
- EXCEPTION HANDLING AND MULTITHREADING
- I/O STREAMS
- COLLECTION FRAMEWORK
- APPLET AND SWING
- JDBC (JAVA DATABASE CONNECTIVITY)
Microsoft.Net technology provides the ability to quickly build, deploy, manage, and use connected, security-enhanced solutions with Web services. .NET-connected solutions enable businesses to integrate their systems more rapidly and in a more agile manner and help them realize the promise of information anytime, anywhere, on any device.
- Introduction of .Net
- The Common Language Runtime (C.L.R)
- Net Framework Class Library
- Syntax and Data Type: Language Fundamentals
- Oops Concepts, Inheritance And Namespace Classes
- Events and Delegates
- File Handling
- Date & String Methods
- Exception Handling
- Form and Control
- Memory Management
- Ado.Net Evolution Of Ado.Net
- Ado.Net? Abd its Architecture
- Connections and Command Object
- Data Reader
- Data View
- Data Relation
- Adding Constraints to a Table
- Advance Topic
- Assembly and Deployment
Nanotechnology is dealing with research and the construction in the sphere of very small structures: one nanometre is one millionth of a millimeter. Moreover it is playing with the atoms. The worldwide need for nanotechnology workers is expected to reach 2 million by 2015.
This involves the wider perspective of Designing, Modelling and Simulation & Visualization of Nanoproducts using Nano-IT software tools as per the industry standards. Our workshop has converged Information Technology with Nanotechnology. Essentially the ability to control the atomic and molecular building blocks of material, nanotechnology will be applied to change or create chemical, electronic, magnetic, optical and structural properties in materials or nanostructures.
- Bottom up self assembly
- Top Down assembly
- Other production process
MEMS and NEMS
Surface Analytic Instrumentation Techniques for Nanotechnology
- CNT Fabrication
- Modeling and Simulation of Nanotechnology
- Properties of CNT
- Nano electronics
- Nano Diamonds
In the world of computers, most people decide to network because they have more than one computer and want to share one broadband Internet connection, whether at home or at the office. There are other benefits as well, including the ability to share files, pictures, music and more with everyone on the network. Everyone can share a single printer and gamers can play against competitors on the network or connect game consoles to take advantage of online gaming. If the networking is wireless-enabled, desktop computers can be set up where they're convenient in the home or small office, not just where there happens to be a wire. Laptop computer users are free to roam almost anywhere in, or around, the network — without losing their connection. In short, a networking is convenient and it can save your money. Doesn't that sound good? Need for Networking Technology Professionals
Networking and Communication skills are must for all industry sectors and there is all time need for the qualified experts in this field.
Networking & Communication Technologies Industry is currently booming over $100 billion and is increasing day by day.
Networking & Communication industry is going through a drastic phase of transformation and networking professionals are getting highly paid these days.
1.Introduction to Networking
* Constructing Data Links
* Deploying Physical Media
* Capitalizing on Ethernet
* Transport and Protocols: TCP and UDP
* Applications and Management Protocols
* Version of IP Address
* Characteristics of IPV4
* Public & Private IP Address
* No. of Network & IP Address
* Class A
* Class B
* Class C
* Network Address
* Broadcast Address
* Difference between Supernetting & CIDR
* Difference between Supernetting & Summarization
* Routing Protocols
* Ospf In Single Area
* Ospf In Multiple Area
* Advanced Internetworking
4.Switching & Bridging
* Collison Domain & Broadcast Domain
* Bridge & its Function
* VLAN & TRUNK
* VLAN & its Advantages
* How to create VLAN
* Access port & Access link
* Trunk port & Trunk link
* Trunking Protocols ISL & dot1q 80/20& 20/80 rules
* VTP & its Advantages
* VTP operational mode of Switch
* Basic concepts of RSTP