The Open Institute of Technology and Education delivers these career development programs below;

Our work lives, personal lives, and finances have all begun gravitating towards the world of the internet, mobile computing, and electronic media. Unfortunately, this widespread phenomenon makes us more vulnerable than ever to malicious attacks, invasions of privacy, fraud, and other such pleasantries. That’s why Cyber Security is such a vital part of a secure and well-ordered digital world. Cyber security keeps us safe from hackers, cybercriminals, and other agents of fraud.


Need for Cyber Security 
Classification of Malware, Threats
Security Models and Security Mechanisms
Vulnerability Assessment
Information Security and Network Security
Mobile Device Security, Cloud Security
Internet of Things Security
Virtual Currency and Block Chain Technology
Security Auditing
Analysis of Crimes and Human Behavior
Criminal Profiling, Cyber Trails
Cyber Jurisprudence
Stylometry and Incident Handling

Computer forensics, or digital forensics, is a fairly new field. Computer forensics investigators, also known as computer forensics specialists, computer forensics examiners, or computer forensics analysts, are charged with uncovering and describing the information contained on, or the state or existence of, a digital artifact. Digital artifacts include computer systems, hard drives, CDs, and other storage devices, as well as electronic documents and files like emails and JPEG images. The fast-growing field of computer forensics includes several branches related to firewalls, networks, databases, and mobile devices. Digital forensics technicians can find work with many types of organizations: government (local, state, and federal), accounting firms, law firms, banks, and software development companies.


Introduction to Digital Forensics 
Fundamentals of Computer Hardware and accessories
Computer architecture
Understanding the binary number system & Conversions
Operating System Part II
Understanding file system
Networking and types of networks
Understanding Computer crimes
Intellectual-property crimes
cyber terrorism, hate speech, and cyber security
Legal and privacy issues in computer forensics
Mobile phone Forensics
Memory & Network forensics
Operating System Forensics
Cloud Forensics
Computer forensic investigation
Open and Proprietary tools for Digital Forensics

Crime is a close sibling of human society; both grew together in the backyard of civilization and evolved progressively. They could never be able to ignore each other. The same is true for the internet. The internet was created for the good of one and all but the good of the internet have also brought evil by also creating a space with dark sides to it because the huge potential of cyberspace has also been exploited by humans for committing modern-day crimes.


Cyber Criminology Evolution, Contribution, and Impact
Basics of the Internet and Cyber Crimes
Social Media and E-Commerce
Cyber-crime, Warfare, and Terrorism
Internet Addiction Disorder (IAD)
Cyber Crime Theories
Cyber Policing and Cyber Crime Investigation
Cyber Offences and the Law
Digital Evidence
Cyber Jurisprudence

An important component of governance is upholding the rule of law and ensuring the safety and security of its people. If a country fails in this endeavor, it loses its claim to be called a nation and becomes prone to disintegration and turmoil. There may be many reasons which could lead to such a situation including political unrest, economic instability, social breakdown. Many times the forces leading these attempts are within a country, however, there may be external powers who intend to exploit the local turmoil and may foster violence or other forms of instability within the host country.


Introduction to Internal Security
understanding Terrorism
Evolution of Extremism
Nature and Forms of Organized Crime
Overview of Cyber Security Issues
Communalism and Related Issues

Threat to internal security
Managing Disaster
Urban guerrilla warfare
Security Challenges in Border Areas

Development Communication, a combination of two concepts, development and communication has undergone changes in keeping with the dynamics of the world. Post Second World War, aid-dependent ‘third world’ has become the ‘emerging economies ‘of today and the capitalist market economy has become day-to-day reality. Technology has taken over our lives. Liberalization, privatization, and globalization have become outdated. New buzzwords are coming into circulation every day, and yet for the large majority of the world’s population, hunger, health, sanitation, and education are still fundamental issues.


Understanding Development
Role and Relevance of Development Communication
Paradigms in Development Communication
Alternative Development
Diffusion of Innovation
Behavioral Change Communication
Global/ Local Perspectives
Communication Planning and Rural Development

Modern Media for Development Communication
Poverty and Development Planning
Media Assistance and Development
Development in the Age of Globalization
ICT and Rural Development
Digital Divide and Development
Internationalizing Development Communication
Development Communication: A philanthropy or tyranny

An examination of a disputed document is a scientific problem and it is no longer confined to a comparison of signature or writing but it also includes examination of ink, typed matter, printed matter, watermark, and all other elements that combine together to form a document. The examination of a document is not complete until every element has been studied and examined thoroughly.


Introduction to Questioned Documents
Identification Handwritings
Forgery and types
Identification of Forged Documents
Writing Instrumentation
Classification of paper and usage
Understand the types of Inks
Handwriting samples Collection
Forensic Stylistics
Document Alterations and cryptography
Digital document assessment
Script Analysis
Currency notes Verification and counterfeiting
Digital Photography and Enhancement

The Program has been framed with the intention to provide a general concept of the dimensions of disasters caused by nature beyond human control as well as the disasters and environmental hazards induced by human activities with emphasis on Natural disasters, Man-made disasters, Application of GIS, and ICT in Preparedness, Response, Rehabilitation, and Recovery.

This course’s objective is to meet the needs of people involved in disaster management for both sudden-onset natural disasters (i.e., earthquakes, floods, hurricanes) and slow-onset disasters (i.e., famine, drought). This course is designed for government personnel, representatives of private voluntary agencies, and other individuals interested in disaster management.


Introduction to Disaster Management
Geographical Information Systems and IT in Disaster Management
Risk Assessment and Vulnerability Analysis
Disaster Preparedness and Response
Recovery, Rehabilitation, and Reconstruction
Reporting, Information, and Documentation in Disasters
E-Governance and Emerging Technology in Disaster Management
Community Linkage in Disaster Management
Case Studies in Disaster Management



Multimedia and Animation are no more confined to the cinema but it has become an integral part of advertising, TV media, Education, Games, Cartoon serials etc.
Multimedia’s main role is to present the audio-video material in an aesthetic manner. Animation is also related to it, which involves an accurate combination of design, drawing, layout and photography.

Introduction to Multimedia
Digital Imaging
2D Animation
3D Animation
Audio Visual Production


To impart knowledge on the basics of entrepreneurial skills and competencies to provide the participants with necessary inputs for the creation of new ventures.  To explore new vistas of entrepreneurship in the 21st-century environment to generate innovative business ideas.


Introduction to Entrepreneurship
Management Concepts and Organisational Behaviour
Development of Entrepreneurial Skills
Business Opportunity Identification
Small Business Management
Institutional Support System
Business Communication and Ethics in Business
Project Work

Computer Systems
Software Testing
Computer Science
Computer Security

The virtual world of the internet is known as cyberspace and the laws governing this area are known as Cyber laws all the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction. Cyber law can also be described as that branch of law that deals with legal issues related to using of inter-networked information technology. In short, cyber law is the law governing computers and the internet.

Term 1

Cyber Space and its Governance
E-Commerce, E-Governance and E-Contract
Domestic Regulatory Framework
Digital Records and Cyber Forensics

Term 2

Cyber Crime and Offences
Intellectual Property Rights in Cyber Space
Emerging Issues of Cyber Space
Human Rights and Cyber Security Laws