Search

Advanced Search

Fifth TTP on IVFRT-MMP organized in Delhi

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Nov 7, 2013
Welcome session of the TTP
Welcome session of the TTP

Presentation Session during the TTP
Presentation Session during the TTP

A 2-days’ Trainers’ Training Programme (TTP) was organized on Immigration, Visa, Foreigners’ Registration & Tracking-Mission Mode Project (IVFRT-MMP) on 24th and 25th October 2013 at the Central IVFRT Office, 3rd Floor, DMRC Building, Shastri Park, Delhi. It was the 5th TTP for the participants involved in the implementation of IVFRT-MMP in various state and district locations. The 5th TTP was started with a formal inauguration by Sh. K. Ramasubramanian, STD, NIC and followed by a brief Overview of IVFRT by Sh. NK Prasad, PSA & Training Coordinator, IVFRT. The entire TTP was customized in such a manner that every module and session was exclusively targeted to the need of state level applications and its implementation.   

Technical sessions for the Day-one started with Sh. N. S. Rawat, PSA, NIC along with his team who took a very important session on “Visa Issuance Process in India & Indian Missions”.  In continuation, session on “BL/ PRC/ referral process and issuance of visa of all categories” was taken by Sh. J. Christopher, TD and Sh. Vikas Nagi, SSA, NIC.

Subsequently, sessions were conducted on Immigration Control System (ICP) and APIS, LOC and ICP Networking by Sh. Madhvendra Singh, PSA NIC and Sh. Alok Roy Chaudhary, SSA NIC with their team respectively. Biometric Enrollment and Verification System along with Deportee Management System was covered by Ms. R. G. Charumati with a live demonstration. Sessions on “VPN technical aspects and troubleshooting client issues and Antivirus and WebEx” was taken by Sh. S. Hasan Mahmood, Scientific Officer, NIC.

Technical Sessions on Day-two of TTP was dedicated to the important modules of C-FRO, UCF, Indian Citizenship, NDAL, OCI, C-Form, S-Form and Q & A & Feedback sessions. C-FRO module was covered by Sh. A. Ravikumar, TD, NIC and his team. The session on UCF System was covered by Sh. Shambhu Kumar, SSA NIC.

Further sessions on Indian Citizenship (IC) and National Database on Arms License (NDAL) were presented by Sh. D. P. M. Reddy, SSA NIC with his team and Sh. Mohammad Zaheen, PSA, NIC with his team respectively. The presentation on “Overseas Citizenship of India” was given by Sh. Ajay Katoch, SSA, NIC.

Likewise, other two modules on C-Form and S-Form were covered by Sh. K. Ramasubramanian, STD, NIC & Sh. Pradip Kumar, PSA, NIC and Sh. V. Suresh, TD & Sh. K. Anandan, SA, NIC respectively. Two days’ TTP was ended with concluding words by Sh. CL Sharma, TD, NIC and a heartfelt  vote of thanks by Sh. N. K. Prasad, PSA & Training Coordinator, IVFRT, NIC to Dr. BN Shetty, DDG, NIC and Dr. RK Mishra, TD, NIC for their kind support and overall guidance for the conduct of above TTP programme and also to all concerned for making the programme a grand success. 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...