phpbanner-image


Web Design Certification Course
Introduction
Web design is the visual aesthetics and page layout of a website. It goes hand-in-hand with web development in the creation of a static website or dynamic web application.The web design process starts with a visual concept, which you could sketch by hand or with software like Photoshop. Then, you use HTML and CSS to build the website. HTML and CSS are the codes for writing web pages. HTML handles the basic structure and ‘bones’ of your page, while CSS handles the style and appearance. If you’re a good web designer, you’ll also pay attention to concepts like responsive design, aesthetics, usability and accessibility when building your site. Responsive design is a popular technique for making websites look good and function well on additional devices, like phones and tablets. It does this by setting different CSS rules for different browser widths.
Course Duration For Web Designing

Course Duration For Web Design Course :

  • 24 Weeks ( Regular Batch )
Eligibility Criteria For Web Design Course

Eligibility For Web Design Course :

  • BCA | BCS | BSc | BE | BTech | MCA | MCS | MCM | MSc | ME | MTech | Any Graduate
Web Design with Web-Development Syllabus
Introduction to WEB
  • W3C and W3C Members
  • Why WHATWG
  • What is Web?
HTML Basics
  • Introduction
  • Parts in HTML Document
  • Editors
  • Basics
  • Elments
  • Attributes
  • Headings
  • Paragraphs
  • Formattiing
  • Links
  • Head
  • CSS
  • Images
  • Tables
  • Javascript
  • HTML XHTML
  • HTML4 Drawbacks
HTML5 Intro
  • HTML5 History
  • New Features and groups
  • Backward Compatibility
  • Why HTML?
  • Power of HTML5
  • m or mobi or touch domains
  • Common Terms in HTML5
HTML5 Syntax
  • The DOCTYPE
  • Character Encoding
Obsolete Elements/ Deprecated Elements
  • acronym
  • applet
  • big
  • center
  • dir
  • font
  • frame
  • frameset
  • isindex
  • noframes
  • s
  • strike
  • tt
  • u
  • xmp
HTML5 Elements
  • New Semantic
  • Structural Elements article
  • aside
  • bdi
  • commands
  • details
  • dialog
  • summary
  • figure
  • figcaption
  • footer
  • header
  • mark
  • meter
  • nav
  • progress
  • ruby
  • rt
  • rp
  • section
  • time
  • wbr
HTML5 Canvas
  • What is Canvas?
  • Create a Canvas
  • Canvas Coordinates
  • Canvas - Paths
  • Canvas - Text
  • Canvas - Gradients
  • Canvas - Images
HTML5 SVG
  • What is SVG?
  • SVG Advantages
  • Differences Between SVG 7 Canvas
  • Comparison of Canvas and SVG
HTML5 DraD/DROP
  • Introduction
  • Make an Element Draggable
  • What to Drag? Where to Drop?
HTML5 Geoloaction
  • Introduction
  • Locate the user's position
  • Handling Errors and Rejections
  • The getCurrentPosition()
  • Geolocation object
HTML5 Video
  • Introduction
  • Video on the Web
  • How it Works?
  • Video Formats & Broser Support
  • HTML5 Video Tags
HTML5 Audio
  • Introduction
  • Audio on the Web
  • How it Works?
  • Audio Formats & Broser Support
  • HTML5 Audio Tags
HTML5 Input Types
  • Introduction
  • Color
  • Date
  • Datetime
  • Datetime-local
  • Email
  • Month
  • Number
  • Range
  • Search
  • Tel
  • Time
  • Url
  • Week
HTML5 Form Elements
  • datalist
  • keygen
  • output
HTML5 Form Attrinutes
  • New attributes for form and input New attributes doe form
  • autocomplete
  • novalidate
New aatributes for input
  • autocomplete
  • autofocus
  • form, formaction
formenctype, formmethod
  • formnovalidate
  • formtarget
  • height and width
  • list, min and max
  • multiple
  • pattern(regexp)
  • placeholder
  • required, step
HTML5 Semantic
  • Introduction
  • What are Seamantic Elements?
  • non-seamantic elements: div and span
  • seamantic element form table and img
  • New Seamantic Element in HTML5
  • header
  • nav
  • section
  • article
  • aside
  • figcaption
  • figure
  • footer
HTML5 Web Storage
  • What is HTML5 Web Storage?
  • Browser Support
  • The localStorage Object
  • The session Storage Object
HTML5 App Cache
  • What is Application Cache?
  • Cache Manifest Basics
  • HTML5 Cache Manifest
  • HTML5 Web Worker Support
  • Create a Web Worker File
  • Terminate a Web Worker
HTML5 SSE
  • One Way Messaging
  • Browser Support
  • The EventSource Object
HTML Media
  • New Media Elements
  • audio
  • video
  • source
  • embed
  • track
HTML Multimedia
  • What is Multimedia
  • Broser Support
  • output
  • Multimedia Format
  • Video Format
  • Sound Format
HTML5 MathML
  • Introduction
  • Using MathML Characters
  • Matrix Presentation
  • Math Formulas
CSS 1.0 and 2.0
  • CSS Basics
  • CSS Introduction
  • CSS Syntax, CSS Id & Class
  • CSS Styling, Styling Backgrounds
  • Styling Text, Styling Fonts
  • Styling Links, Styling List
  • Styling Tables
  • CSS Border
CSS3
  • Introduction
  • CSS3 Modules
  • Selectors
  • Box Model
  • Backgrounds and Borders
  • Text Effects
  • 2D/3D Transformations
  • Animations
  • Multiple Column Layout
  • User Interface
Borders
  • border-radius
  • box-shadow
  • border-image
CSS3 Backgrounds
  • background-size
  • background-origin
CSS3 Text Effects
  • text-shadow
  • word-wrap
CSS3 Fonts
  • @font-face Rule
  • font-stretch
  • font-weight
CSS3 2D Transforms
  • How does it Works?
  • Browser Support
  • 2D Transforms
  • translate()
  • rotate()
  • scale()
  • skew()
  • matrix()
CSS3 3D Transforms
  • rotateX()
  • rotateY()
CSS3 Transitions
  • How does it work?
  • transition-property
  • transition-duration
  • transition-delay
CSS3 Animation
  • CSS3 @keyframes Rule
  • Browser Support
  • Animation, animation duration
CSS3 Multiple Columns
  • column-count
  • column-gap
  • column-rule
CSS3 User Interface
  • resize
  • box-sizing
  • outline-offset
Module 1 Overview of Information Security
  • Understanding Information Security
  • Need of the Information security
  • Basics of IS (CIA)
  • History and evolution od IS
  • Dimensions of Information security
  • Intranet/Internet
  • Information Security and Cyber Security relationship
  • Why Care About Security
  • Challenges to Information Security
  • Benefits of Information Security
  • Understanding techniques to enforce IS in an organization
  • Identifying tools to enforce Information Security
  • Identifying framework to enforce Information Security
Module 2 Overview of Security threats
  • Overview of Security threats
  • Types of threats-DDos, Malicious codes, Espionage, ect
  • Indentification of Threats
  • Probing of threats
  • Scanning of threats
  • Modus Operandi
  • Sources of Threats
  • External threats
  • Internal threats
  • Best Practices of Guidelines used to Identify Threats
  • Conduct regular education and awareness trainings for employees and third parties
  • Deploying up to date technology
  • Maintaining System and Procedures
  • Educating Users
  • Conducting regular education and awareness trainings for employees and third parties
  • Collaborate with peers and experts through different forums to understand contemporary issues and solutions
Module 3 Information Security Vulnerabilities
  • Why do Information Security Vulnerabilities exits
  • Types of Technical Vulnerabilities
  • Types of Native Vulnerabilities
  • Understandings Security Vulnerabilities
  • Flaws in Software or Protocol Designs
  • Weaknesses in How Protocols and Software are Implemented
  • Weaknesses in System and Network Configurations
  • Weaknesses in Web or Cloud application
  • Weaknesses in Online e-transactions
  • Browser Security and Role of cookies and pop-ups
  • Security holes in Browser, Web Applications, OS and Smartphones
  • Indentifying role od Social sites and media in cyber security and vulnerability
  • Understanding Vulnerability Assessment Tools and Techniques
  • Techniques to Exploit Vulnerabilities
  • Techniques to Fix the Vulnerabilities
  • Identify security Vulnerabilities on a regular basis using requisite tools and processes
  • How to fix the security gaps and holes
  • Identifying liabilities of service providers, software vendors, Software authors, system owners and third parties
  • Best Practies and Guidelines to mitigate security Vulnerabilities
Module 4 Risk Management
  • What is Risk?
  • Relationship between Threats, Vulnerability and Risk
  • What is the value of an Asset?
  • What is a Threat Source/Agent?
  • Examples of Some Vulnerabilities that Are Not Always Obvious
  • What is Control?
  • What is Risk Likelihood and consequences?
  • What is Impact?
  • Control Effectiveness
  • Risk Management
  • Purpose of Risk Management
  • Risk Assessment(Phases)
  • Why is Risk Assessment Difficult?
  • Types of Risk Assessment
  • Differnt Approaches to Risk Analysis
  • Best Practices and Guidelines in Assessing and Calculating Risks
  • Develop and Implement policies and procedure to mitigate risks arising from ICT supply chain and outsourcing.
  • Best Practices and Guidelines in Mitigating Risk
Module 5 Software Development Security
  • How did We Get Here?
    • Device vs. Software Security
    • Why Are We Not Improving at a Higher Rate?
    • Usual Trend of Dealing with Devlopment Level Security
    • Where to Implement Software Development Security
  • Issues in application secuirty(SQL Injection, cross scripting, etc.)
  • Security in SDLC
    • Development Methodologies
    • Maturity Models
    • Security Issues
    • OWASP Top Ten (2011)
  • Modularity of Objects and Security
    • Object-Oriented Programmning Characteristics
    • Module Characteristics
    • Linking Through COM
    • Mobile Code with Active Content
    • World Wide Web OLE
    • ActiveX Security
    • Java and Applets
    • API
  • Security of Embedded Systems
  • Comman Getway Interface
    • How CGI Script Works
    • Cookies
    • PCI Requirements
  • Virtualization
    • Type 1 and Software Security
    • Type 2 and Software Security
Legal Framework
  • Need for Legal Framework and its enforcement
  • Types Of Law
    • Foundational Concepts of Law
    • Common Laws - Criminal
    • Common Laws - Civil
    • Common Laws - Administrative
    • Intellectual Property Laws
    • More Intellectual Property Laws
    • Software Licensing
Historic Examples of Computer Crimes
  • Who perpetrates These Crimes?
IT(Amendment) Act 2008
  • Cyber Crimes
  • Authorities
  • Enforcement and Penalties
  • Security measures and privacy protection
  • Digital Signature legal ecosystem
  • Intermediary Guidelines
National Cyber Security Policy Identification Protection & Prosecution
  • Computer Crime and its Barriers
  • Countries Working Together
  • Security Principles for International Use
  • Determine if a Crime Has Indeed Been committed
  • When Should Law Enforcement Get Involved?
  • Citizen versus Law Enforcement Investigation
  • Investigation of any Crime
Role of Evidence in Trial
  • General Rules for Evidence
  • Evidence Requirements
  • Evidence Collection Topics
  • Chain of Custody
  • How Is Evidence Processed?
  • Evidence Types
  • Hearsay Rule Exception
Privacy of Sensitive Data
  • Privacy Issues
  • Section 43A, 72 of IT(Amendment) Act, Justice A.P.Shah Report
  • European Union Principles on Privacy
  • US Laws on Privacy
  • Routing Data Through Different Countries
  • employee Privacy Issues
Sets of Ethics
  • Ethics - Mile2
  • Ethics - Computer Ethics Institute
  • Ethics - Internet Architecture Board
  • GAISP - Generally Accepted Information Security Principles
Privacy Protection
  • Understanding Privacy as a Domain
  • Reletionship between security and privacy
  • Revitalizing security program to enable privacy protection
  • Assess privacy implications of security technologies
  • Privacy impact assessment
  • Develop and implement privacy protection measures within the organization
Audit and Testing
  • what is Information Security Audit?
  • Importance of information Security Audit
  • Identifying the Information Security Audit Objectives
  • Audit Planning and preparations
  • Performing Security Audits and Reviews
  • Vulnerability assessment and Penetration testing
  • Code Reviews
  • Audit Controls
  • Logical security audit
  • Ethics and codes of conduct for Auditors
  • Security policies and Procedure Audits and Compliance Audits
  • Conduct and Close internal audits
  • Information Security audit tools
  • Reporting to senior management on defined parameters

Enquiry