Book a Free Demo / Get Full-Programme Details

Web Designing and Publication Assistant

Goverment Funded Web Designing Course In Hrishi Computer Education

In line with the Hon. Prime Minister’s vision, the National Skill Development Corporation, under the Ministry for Skill Development and Entrepreneurship (MSDE), was launched in 2015 with the aim of equipping Indian youth with employable skills.
The Government of Maharashtra too has prioritized the Skill Development mission and set a vision of equipping 45 million individuals with employable skills by the year 2022.




  • Hrishi Computer Education is registered under the Maharashtra State Skill Development Society (MSSDS), which functions as the sole nodal agency for planning, co-ordination, execution & monitoring of the Skill Development Initiative of the Government of Maharashtra. We offer the government-funded course ‘Web Designing and Publication Assistant’ free of cost to students.
  • If you wish to pursue a career as a Web Designer/Developer and want to pursue a free web design course in Mumbai North (Vasai, Virar, Palghar) region, then this ‘Web Designing and Publication Assistant’ course will be an ideal choice. As an ISO 9000:2001 certified and government-recognized institute, Hrishi Computer Education is one of the top institutes for pursuing this free web design course.
  • In addition to training MS-Office, UI Designing, Cyber Security, Graphic Designing using graphic design tools such as CorelDRAW, Adobe Photoshop and Illustrator, this Web Designing Course also imparts training on Soft Skills and Entrepreneurship.

COURSE DURATION

1000 hrs.

WEEKLY

6 days/ 4 hours

Download Brochure

Course Fees

SCHEMES

Deendayal Antyodaya Yojana-National Urban Livelihoods Mission (DAY-NULM)

  • National Urban Livelihoods Mission (NULM) was launched by the Ministry of Housing and Urban Poverty Alleviation.
  • The NULM will focus on organizing urban poor in their strong grassroots level institutions, creating opportunities for skill development leading to market-based employment and helping them to set up self-employment venture by ensuring easy access to credit.

Pramod Mahajan Kaushlya V Vikas Abhiyan (PMKVVA)

  • Pramod Mahajan Kaushlya V Vikas Abhiyan (PMKVVA) is the flagship scheme of the Ministry of Skill Development & Entrepreneurship (MSDE).
  • The objective of this Skill Certification Scheme is to enable a large number of Indian youth to take up industry-relevant skill training that will help them in securing a better livelihood.

The complete syllabus of this web design course (as taught in the Mumbai North branches of Hrishi Computer Education) is given below:

MS-Office

1
  • Identification of Different parts of a Computer System
  • Turning a computer system on and off
  • History and Generation of Computer
  • Advantage and disadvantage of computer
  • Block Diagram of a Computer
  • Description of Different parts of a Computer
  • System Software and Application Software
  • Identifying different Desktop Icons. My Computer, My Documents
  • Changing Desktop Backgrounds, Mouse pointer, Screen Saver
  • Notepad, WordPad, MS Paint
  • Introduction to MS office
  • Word processing software
  • Electronic spreadsheet
  • Document formatting options
  • Tables, bullets and numbering
  • Font alignment, paragraph formatting
  • Insert picture, clipart, shapes, word art
  • Header & footer, text box
  • Page layout, mail merge
  • Spelling & grammar
  • Cell formatting options
  • Formulas and function
  • Charts
  • Sort, filter, what if analysis grouping
  • Subtotal
  • Creating slide show by using animation technique
  • Slide master
  • Clip art picture editing

Website User Interface Designing

2
  • Introduction to HTML5
  • How HTML Works
  • Difference between HTML and HTML5
  • All Html tags, attributes and Properties
  • Standard structure of webpage.
  • Importance of Meta tags.
  • Paragraphs
  • Marquee and headings
  • Colors(RGB,HEX,HSL,HSLA,RGBA)
  • Links
  • Tables
  • Forms
  • Fonts
  • Text rules
  • Text formatting
  • Static vs Dynamic website
  • DIV and Span tags
  • Styling Backgrounds
  • Introduction to Css and Css3
  • Internal external css introduction.
  • Comments in html
  • Introduction to cookies
  • Html 5 semantic elements
  • Html5 canvas
  • Html5 input tags
  • Html5 media(audio, Images and videos)
  • Html5 google maps Integration
  • Html5 API’s
  • Introduction to css3
  • Units in css3
  • Colors in css3
  • Backgrounds properties
  • Margins, paddings, Layouting
  • Box model
  • Font families
  • Css icons
  • Cursors
  • All lists
  • Css resets
  • Tables, responsive tables
  • Alignments
  • Block and inline elements
  • Css 3 pseudo elements
  • Css3 selectors
  • Css3 forms
  • Css animations.
  • Css3 layouts
  • Grid layouts
  • Flex box layouts
  • Responsive layouts
  • Media queries
  • Bootstrap introduction
  • Bootstrap Grids
  • Bootstrap typography
  • Bootstrap colors
  • Bootstrap tables
  • Bootstrap alerts
  • Bootstrap badges
  • Bootstrap progress bars
  • Bootstrap cards, dropdowns
  • Bootstrap menus and navs
  • Bootstrap modals and carousels
  • Bootstrap utilities
  • Bootstrap grid system
  • Bootstrap responsive classes
  • Practical live project(website from scratch)
  • Introduction to Photoshop
  • Understanding of various versions of Photoshop
  • Understanding print industry and printing technology
  • Working with Photoshop tools
  • Working with layers
  • Working with pallets
  • Working with animation (gifs) with Photoshop
  • Making albums
  • Making collages with Photoshop
  • Working with frame and layers
  • Working with a website design in Photoshop.
  • Design professional web layouts, author and publish websites on the internet
  • Design professional web layouts, author and publish websites on the internet using Dreamweaver
  • About flash and general overview – stage and work area of flash, using guides, grid & rulers.
  • Using frames and key frames, working with time line. Using layers using guide layers. Drawing in flash tooling colors In flash to use a gradient fill.
  • Importing artwork, video and audio. Different file formats in video & audio. Flash compatible audio & video file formats create interactive animations for learning medium.
  • Programming simple interactive applications using action scripting
  • Creating banners, logo animation, simple 2D animation content used in web and e-learning medium.
  • Crating scripts for wen for dynamic websites using java script.
  • Creating scripts for web for dynamic websites using VB script.
  • Using ASP to create dynamic web pages enabled with forms and database usage.
  • Knowledge of internet, web design techniques and study of designs as per content
  • Create interactive animations and applications for web using flash.
  • Theory related to practical
  • Study design issues in web medium and visualizing intuiting web designs

Website Scripting: Client Side

3
  • Introduction
  • Use of JavaScript
  • Html DOM(Document Object Model)
  • Manipulating through DOM
  • All DOM methods and events
  • Finding HTML elements by id, tags and class name
  • Finding elements by css selectors
  • Object collection
  • Html Dom animation
  • Mouse events
  • Event listeners
  • JS Validations(NULL and Password)
  • Client side JavaScript
  • JavaScript events, functions
  • About JQuery library
  • Using jQuery to manipulate html elements
  • Scrolling effects
  • Dynamic effects using jQuery
  • Using jQuery animations
  • Plugins integration owl carousel, data tables, charts ,and editors
  • Dom selection using Jquery
  • Dynamic effects
  • AJAX Intro
  • XML HTTP Request
  • XHR Ready State
  • XHR Responses
  • Fetching Text From Source
  • Ajax Polls
  • AJAX PHP
  • AJAX DATABASE
  • AJAX Examples

Dynamic Website - Server Side

4
  • Introduction to PHP
  • Installation of php on local machine
  • PHP variables, strings
  • PHP for loops, for each, while
  • Php arrays and its functions
  • Php attributes
  • Functions and methods in php
  • Date and time functions
  • Error handling In php
  • PHP and MySQL integration
  • Php sessions
  • Php cookies
  • Php global variables
  • Php GET and POST methods
  • String functions
  • File handling in php
  • File and image uploading to database
  • Connection to the database
  • LIVE PROJECT based on PHP and MySQL
  • Introduction to MySQLi
  • Creating databases, managing database
  • Creating tables and its columns
  • DCL,DDL,DML database core languages
  • Inserting, updating, deleting database
  • Alter database, table
  • Table joins
  • Order by ,group by
  • Union tables
  • Importing and exporting database
  • Using MySQL for live project
  • Database schemas
  • Database relationships

Live Projects

5
  • PHP Project Definition
  • Creating Flow Charts
  • Database Design
  • User Interface Development
  • Project Testing
  • Deployment on Cloud

Cyber security

6
  • Understanding security
  • Need of the information security
  • Basics of IS (CIA)
  • History and evolution of IS
  • Dimensions of information security
  • Intranet / internet
  • Information security and cyber security relationship
  • Why care about security?
  • Challenges to information security
  • Benefits of information of security
  • Understanding techniques to enforce IS in an organization
  • Identifying tools to enforce information security
  • Identifying frameworks to enforce information security
  • Overview of information security threats
  • Types of threats – Dos, malicious codes, Espionage, etc.
  • Identification of threats
  • Probing of threats
  • Scanning of threats
  • Modus operandi
  • Sources of threats
  • External threats
  • Internal threats
  • Best practices or guidelines used to identify threats
  • Conducts regular education and awareness trainings for employees and third parties
  • Best practices or guidelines used in mitigation of threats
  • Deploying up to date technology
  • Maintaining systems and procedures
  • Educating users
  • Conducting regular education and awareness trainings for employees and third parties
  • Collaborate with peers and experts through different forums to understand contemporary issues and solutions
  • Why do information security vulnerabilities exists
  • Types of technical vulnerabilities
  • Types of native vulnerabilities
  • Understanding security vulnerabilities
  • Flaws in software or protocol designs
  • Weaknesses in How protocols and software are implemented
  • Weaknesses in system and network configurations
  • Weaknesses in web or cloud applications
  • Weaknesses in online e-transactions
  • Browser security and role of cookies and pop-ups
  • Security holes in browser, web applications, OS and smartphones
  • Identifying role of social sites and media in cyber security and vulnerability
  • Understanding vulnerability assessment tools and techniques
  • Techniques to exploit vulnerabilities
  • Identify security vulnerabilities on a regular basis using requisite tools and processes.
  • How to fix the security gaps and holes
  • Identifying liabilities of service providers, software vendors, software authors, system owners, and third parties
  • Best practices and guidelines to mitigate security vulnerabilities
  • What is Risk?
  • Relationship between threat, vulnerability and Risk
  • What is the value of an Asset?
  • What is a threat source/Agent?
  • Examples of some vulnerabilities that are not always obvious
  • What is risk likelihood and consequences?
  • What is impact?
  • Control effectiveness
  • Risk management
  • Purpose of Risk management
  • Risk Assessment (Phases)
  • Why is Risk Assessment Difficult?
  • Types of Risk Assessment
  • Different approaches to risk analysis
  • Best practices and guidelines in assessing and calculating risks
  • Develop and implement policies and procedures to mitigate risks arising from ICT supply chain and outsourcing.
  • Best practices and guidelines in mitigating risks.
  • Need for legal framework and its enforcement
  • Types of law
  • Foundational concepts of law
  • Common laws – criminal
  • Common laws – civil
  • Common laws – administrative
  • Intellectual property laws
  • More intellectual property laws
  • Software licensing
  • Historic examples of computer crimes
  • Who perpetrates these crimes?
  • IT (Amendment) Act 2008
  • Cyber crimes
  • Authorities
  • Enforcement and penalties
  • Security measures and privacy protection
  • Digital signature legal ecosystem
  • Intermediary guidelines
  • National cyber security policy identification protection & prosecuting
  • Computer crime and its barriers
  • Countries working together
  • Security principle for international use
  • Determine if a crime has indeed been committed
  • When should law enforcement investigating
  • Investigation of any crime
  • Role of evidence in a trial
  • General rules for evidence
  • Evidence requirements
  • Evidence collection topics
  • Chain of custody
  • How is evidence processed?
  • Evidence types
  • Hearsay rule exception
  • Privacy of sensitive data
  • Privacy issues
  • Section 43A, 72 of IT (Amendment) Act, justice A.P. Shah report
  • European union principles on privacy
  • US laws on privacy
  • Routing data through different countries
  • Employee privacy issues
  • Sets of ethics
  • Ethics – Mile2
  • Ethics – computer ethics Institute
  • Ethics – internet Architecture Board
  • GAISP –Generally Accepted information security principles
  • Understanding privacy as a domain
  • Relationship between security and privacy
  • Revitalizing security program to enable privacy protection
  • Assess privacy implications of security technologies
  • Privacy impact assessment
  • Develop and implement privacy protection measures within the organization
  • Understanding security frameworks
  • Security standards
  • Understanding organizations requirements from an information security point of view
  • Security policy, procedures, and practices
  • Security policy
  • Security-Related procedures
  • Security practices
  • Security compliances
  • Develop information security policies and procedures
  • Implement information security policies and procedures
  • Collaborate with other departments within the organization for effective implementation of security provisions
  • Understand the organization and individual behaviors for information security
  • Enforcing and maintaining strategies for effective implementation of security practices
  • Update and upgrade key performance indicators for security implementation
  • Best practices and guidelines in developing information security policies and procedure

Soft and Entrepreneurship Skills

7
  • Development Competency/ Proficiency in English/Vernacular
  • Effective Communication
  • Self & Time Management
  • Motivation Techniques
  • Interpersonal Skill Development
  • Computer Literacy
  • Life Skills
  • Entrepreneurship
  • Occupational safety, Health and Environment Education

WHAT STUDENT SAYS ABOUT US?

Book a Free Demo / Get Full-Programme Details

HRISHI Computer Education, one of the leading IT/ Computer Education Institutes in Vasai-Virar, is run under the visionary leadership of Mrs. Surekha Bhosale.

HRISHI Computer Education is one of the leading IT Education Institute in Vasai Taluka under the visionary leadership of Mrs. Surekha Bhosale.


     Head Office

     Vasai Gaon

     Virar

KEEP IN TOUCH

Subscribe to Our Newsletter to get Important News & Offers

Protected by Copyscape Privacy Policy

Copyright © 2019. All right reserved by Hrishi Computer Education.