SCAT-POONCH UNDER THE GUIDANCE AND TEACHING OF DR. TARIQ HUSSAIN SHEIKH PROVIDES A NUMBER OF BASIC AS WELL AS PROFESSIONAL COMPUTER COURSES.
1. Certificate Course in Computers(3 Months)
2. Certificate course in Computers( 6 Months)
3.Diploma Course in Computer Applications(1 Year DCA)
4.Diploma course in Information Technology (1 year DIT)
5.Advance course in Computer Applications (website Designing course, 2 Years, ADCA)
6.Advance course in Computer Applications (Software Designing course, 2 Years, ADCA)
7.Advance course in Computer Applications (Ethical Hacking course, 2 Years, ADCA)
The above mentioned courses are briefly explained as under:
CERTIFICATE COURSE IN COMPUTER :-
The program offers basic computer training to equip a person to use computers in day-to-day life for professional and personal use. ... Recognize the basic components of computers and terminology. Understand data, information and file management. Create documents using Word Processor, Spreadsheet & Presentation Software.
DIPLOMA COURSE IN COMPUTER APPLICATIONS ( DCA):-
DCA, Diploma in Computer Applications, is a one-year diploma course in the field of Computer Applications which involves study of numerous computer applications such as MS Office, Internet Applications, Operating System, Database Management System (DBMS), HTML among other subjects.
The course curriculum ensures to provide an aspirant a deeper knowledge of the subject as well as will make the student technology friendly.
DIPLOMA COURSE IN INFORMATION TECHNOLOGY (DIT):-
Diploma in Information Technology is a Diploma level Information Technology course. Information Technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications. The course is suitable for those who interested or desirous in Diploma in Information Technology and its related areas, etc.
Those who are willing to go for teaching fields at higher degree level i.e. college and university level both in private and government institutions are a good suit for it.
They should have good communication and interpersonal skills and other IT knowledge required for it.
They should have been up to date with IT technologies and other related terms regarding it; as it will be beneficial during both the career and course.
ADVANCE COURSE IN COMPUTER APPLICATION ( WEB DESIGNING ADCA):-
This is a two year course with an objective to train you in the field of website designing. This course is dividing in eight modules of 03 months each. Module 1-3 cover fundamentals of computer including computer networks and internet technology. Module 3-5 cover graphic designing which including overview of software like Coral Draw, Photoshop, and Flash etc. Module 5-7 covers web designing programming which includes HTML, DHTML, CSS, Java script and format page. Module 8 cover RDBMS, ASP/PHP programming. All these modules have separate lab session and project work at the end. At the end of this course you will be capable of handling office work and able to create, design and develop a fully functional websites.
5.ADVANCE COURSE IN COMPUTER APPLICATION (SOFTWARE DESIGNING ADCA):-
Advance Diploma in Computer Applications (ADCA)- refers to the collective hardware, software and processes that enable automation of the information processing and communication tasks in an organization. It involves using computers and software to digitize, store, process and communicate most routine tasks and processes in a standard office. DCA - ADCA is designed to fulfill the student's JOB requirements. The objective of this course is to expert the students in daily office work and teaching requirements. After completion this course, the one is capable to Write Letters, Generate Tables, Print Documents, Make Charts, E-mail documents ,to get information from Internet and Teach in private schools up to senior secondary students. This course covers the syllabus of Secondary Education and most of Graduation.Course Contents - 2 Year
Programming in 'C' Language
Object Oriented Programming in 'C++"
Pure Object Oriented Programming in Core Java
PC Organization
PC Assembling and Troubleshooting
Network Essentials
6. ADVANCE COURSE IN COMPUTER APPLICATION (ETHICAL HACKING ):-
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated.
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples −
Website Hacking − Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.
Network Hacking − Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.
Email Hacking − It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.
Ethical Hacking − Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.
Password Hacking − This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
Computer Hacking − This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.
Hacking is quite useful in the following scenarios −
To recover lost information, especially in case you lost your password.
To perform penetration testing to strengthen computer and network security.
To put adequate preventative measures in place to prevent security breaches.
To have a computer system that prevents malicious hackers from gaining access.
Hacking is quite dangerous if it is done with harmful intent. It can cause −
Massive security breach.
Unauthorized system access on private information.
Privacy violation.
Hampering system operation.
Denial of service attacks.
Malicious attack on the system.
There could be various positive and negative intentions behind performing hacking activities. Here is a list of some probable reasons why people indulge in hacking activities −
Just for fun
Show-off
Steal important information
Damaging the system
Hampering privacy
Money extortion
System security testing
To break policy compliance