Eligibility Criteria For Retail Sales Associates

Terminal Competency: After completion of the training, Participants would be able to:

  • 2. Use Internet & E- mail, Data Entry for transactions in Tally. Create Financial Statements. Generate Financial Reports for MIS.
  • 3. Assist to run an online business.
Underpinning Knowledge (Theory)
Computer Fundamentals
  • History and Generations of Computer
  • Advantage and disadvantage of Computer
  • Block Diagram of a Computer
  • Description of Different parts of a Computer.
  • System Software and Application Software
MS Office
  • Introduction to MS Office
  • Word Processing Software
  • Electronic Spreadsheet
Introduction to Accounting
  • Basics of Accounting, Accounting Concepts, Double Entry Concept, Golden Rule of Accounting, Voucher Entry, Ledger Posting, Final Account Preparation. Cash Book. Ratio Analysis
  • Depreciation, Stock Management
  • Analysis of VAT. Cash Flow, Fund Flow
Features of Tally
  • Accounting on Computers
  • Introduction – Reports.
  • Business Organizations (Different areas like Schools, Colleges, Shops, Factory etc) Double entry system of bookkeeping.
  • Budgeting Systems, Scenario management and Variance Analysis.
  • Costing Systems, Understanding Ratios, and Analysis of financial statements.
  • Inventory Basics, POS Invoicing, TDS, TCS, VAT & Service Tax Processing in Tally. Interface in Different Languages.
  • Processing Payroll Functions in Tally what is Management Control Systems.
Internet Basics
  • What is Internet? How Internet works? Types of Internet Browsers and Web pages.
  • Types of different web sites. Cyber Laws.
Cyber Security
  • Module 1 Overview of Information Security

    Understanding Information Security

    Need of the Information security

    Basics of IS (CIA)

    History and evolution of IS

    Dimensions of Information Security


    Information Security and Cyber Security relationship

    Why Care About Security?

    Challenges to Information Security

    Benefits of Information of Security

    Understanding techniques to enforce IS in an organization

    Identifying tools to enforce Information Security

    Identifying frameworks to enforce Information Security

  • Module 2 Overview of Security threats

    Overview of Information Security Threats

    Types of threats – DDoS, Malicious codes, Espionage, etc

    Identification of Threats

    Probing of threats

    Scanning of threats

    Modus Operandi

    Sources of Threats

    External threats

    Internal threats

    Best Practices or Guidelines used to Identify Threats

    Conduct regular education and awareness trainings for employees and third parties

    Best Practices or Guidelines used in mitigation of threats

    Deploying up to date technology

    Maintaining Systems and Procedures

    Educating Users

    Conducting regular education and awareness trainings for employees and third parties

    Collaborate with peers and experts through different forums to understand contemporary issues and solutions

  • Module 3 Information Security Vulnerabilities

    Why do Information Security Vulnerabilities exists

    Types of Technical Vulnerabilities

    Types of Native Vulnerabilities

    Understanding Security Vulnerabilities

    Flaws in Software or Protocol Designs

    Weaknesses in How Protocols and Software Are Implemented

    Weaknesses in System and Network Configurations

    Weaknesses in Web or Cloud applications

    Weaknesses in Online e-transactions

    Browser Security and Role of cookies and pop-ups

    Security holes in Browser, Web Applications, OS, and Smartphones

    Identifying role of Social sites and media in cyber security and vulnerability

    Understanding Vulnerability Assessment Tools and Techniques

    Techniques to Exploit Vulnerabilities

    Techniques to Fix the Vulnerabilities

    Identify security vulnerabilities on a regular basis using requisite tools and processes.

    How to fix the security gaps and holes

    Identifying liabilities of service providers, software vendors, Software authors, system owners, and third parties

    Best Practices and Guidelines to mitigate security Vulnerabilities

  • Module 4 Risk Management

    What is Risk?

    Relationship between Threat, Vulnerability, and Risk

    What Is the Value of an Asset?

    What Is a Threat Source/Agent?

    Examples of Some Vulnerabilities that Are Not Always Obvious

    What Is a Control?

    What Is Risk Likelihood and consequences?

    What Is Impact?

    Control Effectiveness

    Risk Management

    Purpose of Risk Management

    Risk Assessment (Phases)

    Why Is Risk Assessment Difficult?

    Types of Risk Assessment

    Different Approaches to Risk Analysis

    Best Practices and Guidelines in Assessing and Calculating Risks

    Develop and implement policies and procedures to mitigate risks arising from ICT supply chain and outsourcing.

    Best Practices and Guidelines in Mitigating Risks

  • Module 5 Legal Framework

    Need for Legal Framework and its enforcement

    Types of Law

    Foundational Concepts of Law

    Common Laws – Criminal

    Common Laws – Civil

    Common Laws – Administrative

    Intellectual Property Laws

    More Intellectual Property Laws

    Software Licensing

    Historic Examples of Computer Crimes

    Who Perpetrates These Crimes?

    IT (Amendment) Act 2008

    Cyber crimes


    Enforcement and Penalties

    Security measures and Privacy protection

    Digital Signature legal ecosystem

    Intermediary Guidelines

    National Cyber Security Policy Identification Protection & Prosecution

    Computer Crime and Its Barriers

    Countries Working Together

    Security Principles for International Use

    Determine if a Crime Has Indeed Been Committed

    When Should Law Enforcement Get Involved?

    Citizen versus Law Enforcement Investigation

    Investigation of Any Crime

    Role of Evidence in a Trial

    General Rules for Evidence

    Evidence Requirements

    Evidence Collection Topics

    Chain of Custody

    How Is Evidence Processed?

    Evidence Types

    Hearsay Rule Exception

    Privacy of Sensitive Data

    Privacy Issues

    Section 43A, 72 of IT (Amendment) Act, Justice A.P. Shah Report

    European Union Principles on Privacy

    US Laws on Privacy

    Routing Data Through Different Countries

    Employee Privacy Issues

    Sets of Ethics

    Ethics – Mile2

    Ethics – Computer Ethics Institute

    Ethics – Internet Architecture Board

    GAISP- Generally Accepted Information Security Principles

  • Module 6 Privacy Protection

    Understanding Privacy as a Domain

    Relationship between security and privacy

    Revitalizing security program to enable Privacy Protection

    Assess privacy implications of security technologies

    Privacy impact assessment

    Develop and implement privacy protection measures within the organization

  • Module 7 Information Security Policy and Procedures

    Understanding Security Frameworks

    Security Standards

    Understanding organizational requirements from an information security point of view

    Security Policy, Procedures, and Practices

    Security Policy

    Security-Related Procedures

    Security Practices

    Security Compliances

    Develop information security policies and procedures

    implement information security policies and procedures

    Collaborate with other departments within the organization for effective implementation of security provisions.

    Understand the organization and individual behaviors for information security

    Enforcing and maintaining strategies for effective implementation of security practices

    Update and upgrade Key Performance Indicators for security implementation

    Best practices and Guidelines in developing information security policies and procedure

Internet Marketing
  • What is Internet Marketing? What is chatting?
  • e-bay and similar open source tools
  • Types of basic modules.
  • Types of advanced modules
  • What is international selling?
Practical Competencies
Computer Fundamentals
  • Identification of Different parts of a Computer System.
  • Turning a computer system on and off
Windows OS
  • Identifying different Desktop Icons. My Computer, My Documents
  • Changing Desktop Backgrounds, Mouse Pointer, Screen Saver
  • Notepad , WordPad, MS Paint
MS Word
  • Document formatting options
  • Tables, Bullets and Numbering
  • Font, Alignment, paragraph formatting
  • Insert Picture, Clipart, Shapes, WordArt
  • Header & Footer, Text Box
  • Page Layout, Mail Merge
  • Spelling & Grammar
MS Excel
  • Cell Formatting Options
  • Formulas and Functions
  • Charts
  • Sort, Filter, What if Analysis, Grouping
  • Subtotal
  • Pivot Table
Introduction to Tally
  • Tally Fundamentals (Learning how to use of Tally) Processing Transactions in Tally.
  • Report Generation (Creating statements like Invoice, Bill, Profit & Loss account etc.)
  • Cost Centre & Cost Category Practical on Features of Tally
  • Features of Tally (Company creation etc.) Recording Transactions
  • Budgeting Systems, Scenario management and Variance Analysis, Use Tally for Costing Ratio Analysis
  • Cash Flow Statement and Funds Flow Statement Analyzing and Managing Inventory.
  • Point of Sale, Taxation, Multilingual Functionality Payroll Accounting, Systems Administration and Other Utilities, Backup & Restore of Company. User Creation.
Marketing Practical
  • Surfing of different web sites. Study to create e-mail account. Study of chatting.
  • Practical related with e-bay and similar open source tools