Search

Advanced Search

Trainings

Showing 126 to 130 of total 178 records

GIGW Workshop at NIC Delhi on 12 August 2013

Lokesh Joshi, Delhi lokesh[at]nic[dot]in
  |   Aug 13, 2013

NIC has developed “Guidelines for Indian Government websites” (GIGW) as an initiative under the National Portal of India Project. These guidelines aim at achieving the objective of making the Indian Government websites comply with the essential pre-requisites of UUU Trilogy i.e; Usable,...

Training Programmes conducted on C-Form Module under IVFRT-MMP at Jaipur

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Jul 19, 2013

A Series of training programmes on C-Form Module under IVFRT-MMP were conducted at Jaipur, Rajasthan. These training programmes were organized at Rajputana Sheraton Hotel, Jaipur on 22nd May 2013, at Om Niwas, Jaipur on 24th May 2013 and at NIC Training Division, Jaipur on 18th July 2013 with the...

IVFRT Workshop organized on C-FRO, PRC, C-Form, and S-Form at Mangalore District

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Jul 19, 2013

Two days IVFRT Workshop-cum-Training Programme was organized on 8th and 9th July 2013 at Mangalore for the five FROs of Mangalore region. FRO officers from Mangalore Urban, Mangalore Rural, Udupi, Chikmagalur and Uttara Kannada attended the training. The training was conducted by a team consisting...

Training programme conducted on Form-C module of IVFRT Project at PHQ Itanagar, Arunachal Pradesh

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Jul 19, 2013

A training programme on Form-C Module under IVFRT Project was conducted on 5th July, 2013 at the Police Headquarter, Itanagar for all the Hoteliers of Arunachal Pradesh and officials from Police HQ (SB). The aim of the training was to sensitize Arunachal Pradesh Police officials and Hoteliers about...

A 3 days long training- cum -awareness programme for bidders of OFDC at NIC Bhubaneswar

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jul 18, 2013

Orissa Forest Development Corporation, a Government of Odisha Undertaking under the Forest & Environment Department, has decided to invite on line bids to sell the Kendu leaves through eProcurement mode using GePNIC. After successful workshop for departmental officers of OFDC in June 2013, a 3...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...