ICGCIoT 2015 | 8-10 October 2015

Short Courses

The conference program includes short courses, which will be conducted by leading experts in the field. Details will get updated in the conference website and available in subsequent mailings. As of now we have the following short-courses confirmed:

Course 1: Introduction to Cryptography and Network Security

Course 2: The Resiliency of the Cloud Paradigm: the End-to-End Perspective

Course 3: Introduction to Big Data & Analytics

Proposals for short courses can be submitted to chair@gciot-conference.org

Course 1
Full Day

Introduction to Cryptography and Network Security

Course Leader

Prof. Dr. Asoke Nath, Department of Computer Science, St. Xavier's College, Kolkata.

Date/Time

8 October 2015 (Thursday) / 11.30am to 6.00pm

Fee

Rs. 1500 (local) / USD 150 (overseas)
(includes, Certificate, short course kit, buffet lunch & tea/coffee network session) + Free entry to innagural and keynotes on 8-Oct.-2015

Who Should Attend

Beginners as well as the experts in the area of network security and cryptography; Expert in different discipline and now want to learn what is network security and cryptography; and Working in cryptography and wants to know more about it. The lecture material will definitely help the students and researchers to start work on cryptography, right-away.


Limited seats, on first-come first-serve basis.           

Course 2
Full Day

The Resiliency of the Cloud Paradigm: the End-to-End Perspective

Course Leader

Dr. Pethuru Raj, Infrastructure Architect, IBM Global Cloud Center of Excellence, IBM India, Bangalore.

Date/Time

9 October 2015 (Friday) / 10.00 am to 6.00 pm

Fee

Rs. 2000 (local) / USD 200 (overseas)
(includes, Certificate, short course kit, buffet lunch & tea/coffee network session)

Who Should Attend

This course is intended for business and information technology workers such as, Business Analysts/ IT Specialists – security – infrastructure – services – systems – testing; Business Managers/ Business Process Owners / Consultants/ Sales; and Service Providers/ System Integrators/ Architects/ Developers.

This short course will help the participants to: Define the common terminology used in cloud computing; Identify the cloud computing and cloud services from a business perspective; Explain the different deployment models in cloud computing; Able to list the steps to successfully adopt cloud computing services; Identify the organizational capabilities and the clud benefit; List the impact and changes of cloud computing on IT service management; and Identify the issues associated with integrating cloud environment into an organization’s existing framework.

Course 3
Full Day

Introduction to Big Data & Analytics

Course Leader

Ms. Revathy Padmanaban, Big Data Automation Consultant, Big Data Assurance Unit, Tata Consultancy Services (TCS) Limited, India

Date/Time

8 October 2015 (Thursday) / 11.30 am to 6.00 pm

Fee

Rs. 2000 (local) / USD 200 (overseas)
(includes, Certificate, short course kit, buffet lunch & tea/coffee network session)

Who Should Attend

This course is designed for anyone who:

  • wants to understand big data landscape;
  • wants to analyze enormous amounts of data;
  • wants to work in Hadoop and its eco-system components, and
  • have a programming background and want to take career to next level.

Limited seats, on first-come first-serve basis.           

     

Course 1

Introduction to Cryptography and Network Security

Course Leader

Asoc. Prof. Dr. Asoke Nath
Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India




Abstract
Cryptography is a subject which primarily deals with how one can modify a readable text or document/object to unreadable text or document/ object. In cryptography we have two different approaches one is called encryption algorithm by which one can modify the readable text to some encrypted form which the people can not read or understand. The second approach is just the reverse of encryption that means to get back the original text or object from encrypted form by using some algorithm called decryption algorithm. Generally the decryption algorithm is the reverse process of encryption algorithm. The encryption or the decryption methods are of two types such as (i) Symmetric Key Cryptography where one key is used for encryption as well as decryption purpose and (ii) Public key cryptography where we use one key called public key for encryption purpose and another key called private key which is used for decryption purpose. The encryption key is distributed to all senders and the decryption key is distributed to the receiver only. In this short-course the author will try to focus on different symmetric key algorithm including some recent trends in symmetric key encryption methods and also discuss the public key cryptography including RSA algorithm.


Course Outline

  1. Definition and Introduction of Cryptography
  2. Some Classical Cryptography Algorithms:
    • Modified Caesar Cipher Method
    • Transposition Method
    • Vernam Cipher Method
    • Book Cipher/Running Key Cipher Method
    • Hill Cipher Method
    • Playfair Method
    • Diffie-Hellman key exchange Method
    • Data Encryption Standard(DES) Method a brief overview
    • Advanced Encryption Standard(AES) Method a brief overview
  3. Introduction to Public key cryptography: Rivest Shamir Adleman (RSA) method
  4. Symmetric key algorithms developed by Nath et. al.
    • Symmetric Key Cryptography using Random Key Generator :Meheboob, Saima and Asoke(MSA) method
    • A new Symmetric key Cryptography Algorithm using extended MSA method :DJSA symmetric key algorithm
    • New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm
    • Advanced Symmetric key Cryptography using extended MSA method : DJSSA symmetric key algorithm
    • An Integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm
    • Symmetric key cryptosystem using combined cryptographic algorithm- generalized modified vernam cipher method, MSA method and NJJSAA method: TTJSA algorithm
    • Symmetric key Cryptography using two-way updated – Generalized Vernam Cipher method: TTSJA algorithm
    • Ultra Encryption Standard (UES) Version-I: Symmetric Key Cryptosystem using generalized modified Vernam Cipher method, Permutation method and Columnar Transposition method
    • Modern Encryption Standard Version-I : Bit level exchange and random byte resuffling algorithm : MES-I
    • Modern Encryption Standard Version-II
    • Modern Encryption Standard Version-III
    • Bit Level Encryption Standard(BLES) Version II
    • Bit Level Encryption Standard(BLES) Version III
    • Multi Way Feed Back Encryption Standard version-1(MWFES-1)
    • 3 dimensional Multi Way Feedback Encryption Standard (3dMWFES)
  5. Digital Signatures
    • Introduction
    • Message Digests
    • Message Digest Algorithm
    • MD5
    • Secure Hash Algorithm (SHA)
  6. Kerberos
    • Introduction
    • Basics of Kerberos
    • Advantages of Kerberos
    • Disadvantages of Kerberos
  7. Conclusion
  8. References
  9. Acknowledgement


Who Should Attend

Expert in different discipline and now want to learn what is network security and cryptography.
who are working in cryptography and wants to know more about it.
This course material will help both beginners as well as the experts in the area of network security and cryptography. The lecture material will definitely help the students and researchers to start work on cryptography, right-away.
 

Course 2

The Resiliency of the Cloud Paradigm: the End-to-End Perspective

Course Leader

Dr. Pethuru Raj
Infrastructure Architect, IBM Global Cloud Center of Excellence, IBM India, Bangalore.




Abstract
The Cloud paradigm is on the fast track these days as it has the exemplary potential to emerge as a boon for the sagging and struggling IT industry to bring in the much-needed business agility, acceleration and automation. The cloud idea is the culmination of the cool convergence of several enterprise-class technologies. In other words, the cloud concept is a kind of technology cluster. Virtualization, service oriented architecture (SOA), scores of matured computing models (utility, cluster, grid, autonomic, etc.), a bevy of automation tools for job scheduling, capacity planning, resource provisioning and management, load balancing, and security, performance engineering and enhancement, etc. are the principal hallmarks of the powerful cloud discipline. Thus the cloud journey has started on a strong note and it is being projected that the cloud idea is to blossom and become the core, central and cognitive environment for hosting all kinds of applications and platforms. In this short course, we are to learn the beginning, the journey thus far, the trends emanating in this field, the future, etc.


Course Outline

  1. An Introduction to the Cloud Computing
    • What is Cloud Computing? Why it matters?
    • Traditional IT Infrastructures Vs Cloud Infrastructures
    • Cloud Infrastructure and Cloud Advantages
    • The Virtualization Paradigm
    • Cloud Computing – All the Background Information (the beginning, the formalization, the noteworthy milestones, the accomplishments thus far, etc.)
    • The IT Transformation, Optimization, Simplification and Standardization via the Cloud Concepts
    • The Elasticity and Economy of Clouds
    • The Lean and Green Computing through Clouds
    • The Key Drivers and Motivations for the Grand Success of the Cloud Paradigm
    • The Cloud Journey (Cloud 1.0 & Cloud 2.0)
    • The Use, Technical and Business Cases
    • The Cloud Realization Technologies
    • The Prevailing Challenges and Risks
    • A Demo of how a Cloud environment functions
  2. The Cloud Paradigm for the Real-world Things
    • The Cloud Management Frameworks (OpenStack)
    • The Cloud Delivery & Deployment Models
    • The Generic as well as Specific Clouds
    • The Cloud Networking and Storage Aspects
    • The Cloud Load balancing, Security, Active Directory (AD) / LDAP, etc.
    • The Industry Verticals Profitably leveraging the Cloud Innovations
    • Clouds as the Core, Central, and Cognitive Platform for the Smarter Planet
    • The Role of Cloud in the Internet of Things (IoT), Cyber Physical System (CPS) and Smarter Environments
    • The Prominent Application Domains wherein the Cloud Field started to bear fruits
    • A Demo on Device, Sensor and Mobile Clouds
  3. Cloud Platforms, Tools, Tips and Techniques
    • The Auto-Scaling Techniques
    • Cloud Integration for Hybrid Clouds
    • The Cloud Brokerage Services and the Platforms
    • The Research Activities on Cloud Computing
    • The Cloud Modernization and Migration Steps
    • The Cloud Patterns & Practices
    • The Cloud Adoption Strategy-making Tips
    • Cloud-Enablement and Cloud-Native Applications
    • A Demo on Application Design, Development, Debugging, Deployment and Delivery
  4. The Emerging and Evolving Trends
    • Software-defined Cloud Environments (Cloud 3.0)
    • Software-defined Infrastructure (SDI)
    • Software-defined Networking (SDN)
    • Software-defined Storage (SDS)
    • The Cloud Skills Matrix (Technology and Technical Competencies)
    • A Demo on the future of Clouds
    • Docker Containers on Cloud Infrastructures
    • Cloud Configuration and Orchestration Platforms


Who Should Attend

This course is intended for business and information technology workers such as, Business Analysts/ IT Specialists – security – infrastructure – services – systems – testing; Business Managers/ Business Process Owners / Consultants/ Sales; and Service Providers/ System Integrators/ Architects/ Developers.

This short course will help the participants to: Define the common terminology used in cloud computing; Identify the cloud computing and cloud services from a business perspective; Explain the different deployment models in cloud computing; Able to list the steps to successfully adopt cloud computing services; Identify the organizational capabilities and the clud benefit; List the impact and changes of cloud computing on IT service management; and Identify the issues associated with integrating cloud environment into an organization’s existing framework.


 

Course 3

Introduction to Big Data & Analytics

Course Leader

Ms. Ms. Revathy Padmanaban
Big Data Automation Consultant, Big Data Assurance Unit, Tata Consultancy Services (TCS) Limited, India




Abstract
Big data is data that surpasses the processing capacity of conventional database systems. The data is too big, moves too fast, or doesn’t fit the limits of your database architectures. To process and get insights from this data, we must choose an alternative way to process it.The hot IT catchphrase, big data has become feasible as cost-effective approaches have now emerged to tame massive data. Within this data lies valuable information, previously hidden because of the amount of work required to extract them. To leading corporations, such as Walmart or Google, this power has been in reach for some time, but at fantastic cost. Today’s commodity hardware, cloud architectures and open source software bring big data processing into the reach of the less resourced. Big data processing is eminently feasible for even the small garage startups, who can cheaply rent server time in the cloud.The value of big data to an organization falls into two categories: analytical use and enabling new products. Big data analytics can reveal insights hidden previously by data too costly to process. The past decade’s successful web startups are prime examples of big data used as an enabler of new products and services. This short course will focus on the concept of big data technologies and business analytics with its strategic importance to any organization. Participants will be introduced to the concept of business analytics with big data technologies: Hadoop, Hive and HBase.


Course Outline

  1. Introduction to Big Data & Analytics
    • What is Big Data?
    • Characteristics of big data
    • Traditional data management systems and their limitations
    • Big Data Analytics
    • What is Hadoop?
    • Why is Hadoop used?
    • The Hadoop eco-system
    • Big Data/Hadoop use cases
  2. Hadoop - HDFS
    • HDFS Architecture
    • HDFS internals and use cases
    • HDFS Daemons
    • Basic Hadoop commands
    • Hands-on exercise
  3. Hive
    • Understanding Hive
    • Using Hive command line interface
    • Basic DDL operations
    • Hands-on examples
  4. HBase
    • HBase overview
    • HBase architecture
    • HBase data access
    • Overview of Zookeeper
    • Hands-on exercise


Who Should Attend

This course is designed for anyone who:

  • wants to understand big data landscape;
  • wants to analyze enormous amounts of data;
  • wants to work in Hadoop and its eco-system components, and
  • have a programming background and want to take career to next level.


Go to top of page