ITEC :Indian Technical and Economic Cooperation

Home >   > CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING NOIDA


CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING NOIDA  ,  NOIDA


Centre for Development of Advanced Computing (C-DAC) is the premier R&D organization of the Ministry of Electronics and Information Technology (MeitY), Govt. of India for carrying out R&D in IT, Electronics and associated areas. Different areas of C-DAC, had originated at different times, many of which came out as a result of identification of opportunities. The setting up of C-DAC in 1988 itself was to built Supercomputers in context of denial of import of Supercomputers by USA. Since then C-DAC has been undertaking building of multiple generations of Supercomputer starting from PARAM with 1 GF in 1988. Almost at the same time, C-DAC started building Indian Language Computing Solutions with setting up of GIST group (Graphics and Intelligence based Script Technology). National Centre for Software Technology (NCST) set up in 1985 had also initiated work in Indian Language Computing around the same period. Electronic Research and Development Centre of India (ER and DCI) with various constituents starting as adjunct entities of various State Electronic Corporations, had been brought under the hold of Department of Electronics and Telecommunications (now MeitY) in around 1988. They were focusing on various aspects of applied electronics, technology and applications. With the passage of time as a result of creative echo system that got set up in C-DAC, more areas such as Health Informatics, etc., got created. while right from the beginning the focus of NCST was on Software Technologies. similarly C-DAC started its education and training activities in 1994 as a spin-off with the passage of time, it grew to a large efforts to meet the growing needs of Indian Industry for finishing schools. C-DAC has today emerged as a premier third party R&D organization in IT and E (Information Technologies and Electronics) in the country working on strengthening national technological capabilities in the context of global developments in the field and responding to change in the market need in selected foundation areas. In that process, C-DAC represents a unique facet working in close junction with MeitY to realize nations policy and pragmatic interventions and initiatives in Information Technology. As an institution for high-end Research and Development, C-DAC has been at the forefront of the Information Technology (IT) revolution, constantly building capacities in emerging/enabling technologies and innovating and leveraging its expertise, caliber, skill sets to develop and deploy IT products and solutions for different sectors of the economy, as per the mandate of its parent, the Ministry of Electronics and Information Technology, Government of India and other stakeholders including funding agencies, collaborators, users and the market-place.

Institute address: B-30, INSTITUTIONAL AREA, SECTOR-62, NOIDA, 201307


ITEC Coordinator Details:

NameEmail IdContact Detail
SHRI V.K. SHARMAvksharma[AT]cdac[DOT]in 9811900715 / 0120-2210854
SHRI NAVNEET JAINnavneetjain[AT]cdac[DOT]in 9811900728 / 0120-2210865
SMT PRIYANKA TIWARIpriyankamishra[AT]cdac[DOT]in 9560411488 / 0120-2210800


Courses available for Training Year : 2019-2020
You can browse the available courses on clicking the links below:

S.No. Name of Courses From To Open for Paricipants From Participant Profile SynopsisApply NowCourse Type
1SPECIALISED PROGRAMME ON MOBILE APPS DEVELOPMENT16-Mar-202008-May-2020Government officials with minimum 5 years experience preferably having IT or Electronics backgroundAcquaints participants with the set of processes and procedures involved in writing software for small, wireless computing devices using Cordova hybrid framework for multiple mobile platforms with a single codebase and make them learn how to create and deploy mobile applications under Android Platform.
Details
COMPLETEDITEC
2IT FUNDAMENTALS AND SYSTEM ADMINISTRATION FOR BHUTANESE LAB ASSISTANT02-Mar-202010-Apr-2020LAB ASSISTANTSTo equip the participants with the knowledge so as to enable them to set up a lab and handle hardware and software installation, configuration and troubleshooting. To make the participants aware about Cyber Security along with Basic IT.
Details
COMPLETEDITEC
3IT FUNDAMENTALS AND SYSTEM ADMINISTRATION FOR BHUTANESE LAB ASSISTANT20-Jan-202028-Feb-2020LAB ASSISTANTSTo equip the participants with the knowledge so as to enable them to set up a lab and handle hardware and software installation, configuration and troubleshooting. To make the participants aware about Cyber Security along with Basic IT.
Details
COMPLETEDITEC
4SPECIALISED PROGRAMME ON E-GOVERNANCE APPLICATION DEVELOPMENT08-Jul-201930-Aug-2019Government officials with minimum 5 years experience preferably having IT backgroundProvides understanding of application of ICT for delivering government services between government-to-citizen (G2C), government-to-business (G2B), government-to-government (G2G) and to make use of various software tools/ programming languages for developing modules of e-Governance Application
Details
COMPLETEDITEC


Other courses for this institute:
S.No. Name of Courses From To Open for Paricipants From Participant Profile SynopsisApply NowCourse Type
1SPECIALISED PROGRAMME ON REDUCING CYBER CRIME THROUGH KNOWLEDGE EXCHANGE AND CAPACITY BUILDING30-Mar-202022-May-2020Government officials preferably having IT backgroundProvides understanding of various types of vulnerabilities and it’s exploitation, prevention of attacks and other threats in a network or internetwork and application of various countermeasures, and how to investigate various type of cyber crimes
Details
Course CompletedITEC
2SPECIALISED PROGRAMME ON IOT02-Mar-202024-Apr-2020Government officials with minimum 5 years experience preferably having IT or Electronics backgroundEquips the participants with knowledge on the latest microcontrollers with IoT application development, product design and prototyping.
Details
Course CompletedITEC
3SPECIALISED PROGRAMME IN WEB APPLICATION DEVELOPMENT (FOR JORDAN, SYRIA, TUNISIA ONLY)13-Jan-202001-May-2020TEACHERS WORKING IN COLLEGE/UNIVERSITYTHE SPECIALISED PROGRAMME IN WEB BASED APPLICATION DEVELOPMENT IS PRIMARILY MEANT FOR TEACHERS AND IS AIMED AT UPGRADING THE TECHNICAL KNOW-HOW OF MASTER TRAINERS ON LATEST TRENDS IN WEB APPLICATION DEVELOPMENT. THE MAIN OBJECTIVES OF THE COURSE IS TO GIVE IN DEPTH UNDERSTANDING OF WEB APPLICATION DEVELOPMENT USING JAVA BASED TECHNOLOGIES, MVC FRAMEWORKS, HANDLING DATABASES AND MOBILE APPLICATION DEVELOPMENT USING ANDROID PLATFORM.
Details
Course CompletedITEC
4SPECIALISED PROGRAMME ON BIG DATA ANALYTICS09-Dec-201917-Jan-2020Government officials with minimum 5 years experience preferably having IT backgroundEnables participants to analyze, systematically extract information from data sets that are too large or complex to be dealt by traditional data-processing application software and to handle big data challenges which include capturing data, data storage, data analysis and visualization
Details
Course CompletedITEC
5SPECIALISED PROGRAMME ON BIG DATA ANALYTICS09-Dec-201917-Jan-2020Government officials with minimum 5 years experience preferably having IT backgroundEnables participants to analyze, systematically extract information from data sets that are too large or complex to be dealt by traditional data-processing application software and to handle big data challenges which include capturing data, data storage, data analysis and visualization
Details
Course CompletedITEC
6SPECIALISED PROGRAMME IN SYSTEM ADMINISTRATION AND CYBER SECURITY (FOR JORDAN, SYRIA, TUNISIA ONLY)04-Nov-201920-Mar-2020TEACHERS PREFERABLY WORKING IN COLLEGE/UNIVERSITIESTHE SPECIALISED PROGRAMME IN SYSTEM ADMINISTRATION AND CYBER SECURITY IS PRIMARILY MEANT FOR TEACHERS AND IS AIMED AT TRAINING THE TRAINERS. THE MAIN OBJECTIVES OF THE COURSE IS TO GIVE IN DEPTH UNDERSTATING OF SYSTEM ADMINISTRATION ON LINUX AND WINDOWS PLATFORMS, MAKE PARTICIPANTS AWARE OF APPLICATIONS AND NETWORK SECURITY, BUILD THE UNDERSTANDING OF CYBER CRIMES AND USING CYBER FORENSIC TO DEAL WITH THEM. THE PROGRAMME ALSO PROVIDES UNDERSTANDING OF DIFFERENT FLAVORS OF WIRELESS NETWORKS.
Details
Course CompletedITEC


Other courses for this institute : 2024-2025
S.No. Name of Courses From To Open for Paricipants From Participant Profile SynopsisApply NowCourse Type
1SPECIALISED PROGRAMME ON IOT-INTERNET OF THINGS26-Feb-202511-Mar-2025ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC. PARTICIPANTS SHOULD HAVE BASIC KNOWLEDGE OF C PROGRAMMING.AIM-THIS COURSE AIMS TO DEVELOP KNOWLEDGE AND CRITICAL UNDERSTANDING OF THE UNDERLYING PRINCIPLES OF INTERNET OF THINGS.OBJECTIVE-UNDERSTAND THE ARCHITECTURE OF IOT.FAMILIARIZE ON INTERFACING PERIPHERALS WITH RASPBERRY PI TO EXPLORE THE APPLICATION AREAS OF IOT.TO UNDERSTAND THE BUILDING BLOCKS OF IOT AND CHARACTERISTICS.
Details
ITEC
2SPECIALISED PROGRAMME ON MACHINE LEARNING22-Jan-202504-Feb-2025ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC. PARTICIPANTS SHOULD HAVE GOOD KNOWLEDGE IN PYTHON PROGRAMMING.AIM-EQUIP PARTICIPANTS WITH A SOLID FOUNDATION IN MACHINE LEARNING,EMPOWERING THEM TO APPLY SUPERVISED AND UNSUPERVISED LEARNING TECHNIQUES EFFECTIVELY.OBJECTIVES-UNDERSTAND THE FUNDAMENTALS AND TYPES OF MACHINE LEARNING.GAIN PROFICIENCY IN KEY MACHINE LEARNING LIBRARIES,NUMPY,PANDAS AND SCIKIT LEARN.MASTER SUPERVISED LEARNING ALGORITHMS LINEAR REGRESSION,LOGISTIC REGRESSION,K NEAREST NEIGHBORS,SVM,EXPLORE UNSUPERVISED LEARNING TECHNIQUES,K MEANS CLUSTERING AND DBSCAN.HARNESS THE POWER OF DECISION TREES,RANDOM FORESTS AND ENSEMBLE LEARNING.INTRODUCE NEURAL NETWORKS USING TENSORFLOW AND KERAS.APPLY THEORETICAL CONCEPTS THROUGH HANDS ON EXERCISES FOR PRACTICAL PROFICIENCY.ENABLE PARTICIPANTS TO CONFIDENTLY APPROACH REAL WORLD MACHINE LEARNING CHALLENGES.
Details
ITEC
3SPECIALISED PROGRAMME ON BIG DATA ANALYTICS04-Dec-202417-Dec-2024ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC. PARTICIPANTS SHOULD HAVE BASIC KNOWLEDGE OF LINUX OPERATING SYSTEM.AIM-THE AIM OF THIS COURSE IS TO UNDERSTAND AND IMPLEMENT VARIOUS BIG DATA TECHNOLOGIES LIKE HADOOP,SPARK.EXPLAIN THE IMPACT OF BIG DATA,INCLUDING USE CASES,TOOLS AND PROCESSING METHODS.DESCRIBE APACHE HADOOP ARCHITECTURE,ECOSYSTEM,PRACTICES AND USER RELATED APPLICATIONS. OBJECTIVES-BIG DATA ANALYTICS INVOLVES THE USE OF ADVANCED TOOLS AND TECHNIQUES TO PROCESS,MANAGE AND ANALYZE MASSIVE VOLUMES OF DATA,WITH THE GOAL OF UNCOVERING PATTERNS,TRENDS AND VALUABLE INFORMATION.GAIN A COMPREHENSIVE UNDERSTANDING OF THE FUNDAMENTAL CONCEPTS RELATED TO BIG DATA AND THE CHALLENGES ASSOCIATED WITH LARGE-SCALE DATA PROCESSING.FAMILIARIZE STUDENTS WITH THE TOOLS AND TECHNOLOGIES COMMONLY USED IN BIG DATA ANALYTICS SUCH AS HADOOP,SPARK,HIVE AND NOSQL DATABASES.LEARN HOW TO EFFICIENTLY PROCESS AND MANAGE LARGE DATASETS, INCLUDING DATA CLEANING,TRANSFORMATION, AND INTEGRATION.DEVELOP SKILLS IN CREATING VISUALIZATIONS THAT EFFECTIVELY COMMUNICATE INSIGHTS DERIVED FROM BIG DATA.CULTIVATE PROBLEM SOLVING SKILLS TO ADDRESS REAL WORLD CHALLENGES RELATED TO BIG DATA SUCH AS IDENTIFYING BUSINESS OPPORTUNITIES,OPTIMIZING PROCESSES OR DETECTING ANOMALIES.
Details
ITEC
4SPECIALISED PROGRAMME ON ARTIFICIAL INTELLIGENCE - SPANISH20-Nov-202403-Dec-2024ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC.PARTICIPANTS SHOULD HAVE GOOD KNOWLEDGE OF PYTHON PROGRAMMING AND BASICS OF MACHINE LEARNING.AIM-THIS COURSE AIMS TO PRESENT IN DEPTH KNOWLEDGE AND APPLICATIONS IN ARTIFICIAL INTELLIGENCE AND CASE STUDIES BASED ON NEURAL NETWORKS AND DEEP LEARNING.THE COURSE INCLUDES THE IMPLEMENTATION OF NEURAL COMPONENTS AND AS WELL AS APPLYING DEEP LEARNING IN REAL WORLD DATA SETS USING MODERN DEEP LEARNING PACKAGES.EMPHASIS ON THE LATEST AI COMPUTING PLATFORMS.APPLICATIONS AND TRENDS TO AUTOMATE THE AI BASED APPLICATION PROCESSES.AN IMPORTANT AIM OF THE COURSE IS TO LEARN PRACTICAL IMPLEMENTATION SKILLS ALONG WITH THE ABOVE CONCEPTS,PRINCIPLES AND METHODOLOGIES.OBJECTIVE-DEVELOP AN UNDERSTANDING OF MODERN CONCEPTS IN AI AND WHERE THEY CAN BE USED.DESIGN,IMPLEMENT AND APPLY NOVEL AI TECHNIQUES BASED ON EMERGING REAL WORLD REQUIREMENTS.INTRODUCE MAJOR DEEP LEARNING ALGORITHMS,THE PROBLEM SETTINGS AND THEIR APPLICATIONS TO SOLVE REAL WORLD PROBLEMS.UNDERSTANDING OF FUNDAMENTAL ISSUES AND CHALLENGES OF DATA SCIENCE AND DEEP LEARNING DATA,MODEL,SELECTION COMPLEXITY.IDENTIFY THE DEEP LEARNING ALGORITHMS WHICH ARE MORE APPROPRIATE FOR VARIOUS TYPES OF LEARNING TASKS IN VARIOUS DOMAINS.IMPLEMENT RECURRENT NEURAL NETWORKS IN PYTHON USING THE PYTORCH AND TENSORFLOW LIBRARIES AND TRAIN THEM WITH REAL WORLD DATASETS.
Details
ITEC
5SPECIALISED PROGRAMME ON MOBILE APP DEVELOPMENT WOMEN ONLY31-Jul-202413-Aug-2024ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC. PARTICIPANTS SHOULD HAVE BASIC KNOWLEDGE OF JAVA PROGRAMMING.AIM-THIS PROGRAM OFFERS OPPORTUNITY TO LEARN ANDROID APP DEVELOPMENT.HERE WE CAN DESIGN NATIVE APPLICATIONS,WHICH ARE SPECIFIC TO ANDROID OS DEVICES LIKE MOBILES,TABLETS ETC.THIS COURSE WILL HELP PARTICIPANTS TO CREATE RICHLY FEATURED AND ADAPTABLE MOBILE APPLICATIONS SOLUTIONS FOR REAL TIME PROBLEMS.OBJECTIVE-LEARN THE BASICS OF MOBILE PLATFORM AND ITS APPLICATIONS.TO DEVELOP,IMPLEMENT AND DEPLOY TECHNIQUES IN APP DEVELOPMENT FOR ANDROID PLATFORM.LEARN TO ADD FEATURES IN APPS BASED ON FIREBASE CLOUD MESSAGING,DATA STORAGE.PARTICIPANTS CAN ENGAGE WITH DYNAMIC AND SEGMENTED APP FEATURES AND NOTIFICATIONS.BUILD,LAUNCH AND MAINTAIN NATIVE MOBILE APPS.
Details
ITEC
6SPECIALISED PROGRAMME ON CYBER SECURITY & FORENSICS01-May-202414-May-2024ALL COUNTRIESGOVT OFFICIALS, PROFESSIONALS, RESEARCH SCHOLARS, TEACHERS ETC. PARTICIPANTS SHOULD HAVE BASIC KNOWLEDGE OF NETWORKING , WINDOWS & LINUX OPERATING SYSTEM.AIM-TO PREPARE THE PROFESSIONALS TO CREATE AWARENESS ABOUT THREATS,ATTACKS AND VULNERABILITIES AND HELP IN MITIGATION AND IDENTIFICATION OF THE FOOTPRINTS OF THE VARIOUS CYBER ATTACKS.TO INSTILL THE MINDSET OF UNDERSTANDING THE CONTINUOUS EVOLVING CYBER THREATS AND ATTACKS.OBJECTIVE-IDENTIFY AND COMPREHEND THE VARIOUS TYPES OF CYBER THREATS LIKE MALWARE, PHISHING AND OTHER ATTACK VECTORS.HELP UNDERSTAND THE ENCRYPTION,NETWORK SECURITY BASICS.GAIN THE HANDS ON EXPERIENCE ON ETHICAL HACKING TOOLS AND TECHNIQUES.IMPLEMENT AND MANAGE SECURITY MEASURES TO PROTECT NETWORK INFRASTRUCTURE USING FIREWALLS,IDPS ,UTM.ACQUIRE KNOWLEDGE OF CYBER FORENSICS TOOLS AND METHODOLOGIES FOR THE INVESTIGATING CYBER CRIMES.EXPLAIN THE IMPORTANCE OF STAYING UPDATED ON THE LATEST CYBER SECURITY TRENDS AND TECHNOLOGIES.
Details
Nomination ClosedITEC
Other Institutes
  • Download Brochure