Training


.Regular Courses offered at AITI-KACE

Foundations of Software Development (FSD)

Foundations of Software Development is an introductory course for individuals who have interest in Information Technology (IT).

Learn More

Diploma in Business Computing (DBC)

The DBC programme is designed for individuals or professionals who intend to enhance their programming skills and gain expertise in developing database driven applications with the C sharp (C#) programming language.

Learn More

Diploma in Advanced Computing (DAC)

The Post Graduate Diploma in Advanced Computing (PG-DAC) is the flagship programme of CDAC INDIA. The course is targeted towards engineers and IT professionals who wish to venture into the domain of advanced computing.

Learn More

Cyber Security

Reports have shown that the annual cost of global cybercrime is expected to reach six (6) trillion US dollars by 2021(Cybersecurity Ventures Report,2017).
Learn More

Cisco Certified Network Associate(CCNA)

As networking capabilities continue to grow and expand, corporations, nonprofits, schools, hospitals, governments, and NGOs around the world are experiencing.

Learn More

Certificate in Enterprise Linux System Administration (CELSA)

This course will teach participant how to design, deploy and maintain a network running under Linux and to admini

Learn More

International Computer Driving License (ICDL)

The International Computer Driving License (ICDL) program is made up of a list of modules. Each ICDL module provides a

Learn More

Application Development

using GIS & Geospatial Web API’s

Learn More

Database Administration


Database Administration; POSTGRESQL /MySQL/MSSQL / ORACLE

Learn More

Master Class on E-learning

Master Class on E-learning Course on Design, Development and Implementation

Learn More

Network and  Information Security (NIS)

The functionality and use of computer systems and networks keep advancing and now involves most of business or life critical tasks and information. This has left the security of information and computer networks with an ever-changing landscape of threats and vulnerabilities

Learn More