23. IGNOU PGDIS Project

To prepare the IGNOU PGDIS Project, you need to follow a structured academic format. The PGDIS (Post Graduate Diploma in Information Security) project is practical and technical, so evaluators expect proper documentation, implementation, and analysis.

Below is a step-by-step detailed guide specifically for the Indira Gandhi National Open University PGDIS Project 👇


🎓 IGNOU PGDIS Project – Complete Guide

1. Understand the Project Requirement

  • PGDIS project is usually compulsory for completing the diploma
  • It focuses on Information Security / Cyber Security related topic
  • You must submit:
    • Project Report (printed)
    • Project synopsis (before approval in some cases)
    • Practical implementation (screenshots / code)

2. Choose a Suitable Project Topic 🔐

Select a simple but practical topic. Examples:

  • Network Vulnerability Assessment using Kali Linux
  • Password Security Analysis System
  • Phishing Detection System
  • Web Application Security Testing
  • Firewall Configuration and Analysis
  • Intrusion Detection System (IDS) Implementation
  • Secure File Encryption Tool
  • Cyber Security Awareness Portal

💡 Tip: Choose a topic that you can demonstrate with screenshots or code


3. Prepare Project Synopsis (If Required)

Some study centres ask for synopsis approval. Include:

  • Title of Project
  • Objective
  • Tools/Technology (Python, Kali Linux, etc.)
  • Methodology
  • Expected Outcome
  • Timeline

4. PGDIS Project Report Format 📄

Follow this standard IGNOU format:

1. Cover Page

  • Project Title
  • Your Name
  • Enrollment Number
  • Programme: PGDIS
  • Study Centre
  • Session/Year

2. Certificate

  • Supervisor certificate (if applicable)

3. Declaration

  • Student declaration (self-written)

4. Acknowledgement

5. Table of Contents

6. Chapter 1 – Introduction

  • Background of Information Security
  • Need of Project
  • Objectives
  • Scope

7. Chapter 2 – Literature Review

  • Concepts related to security
  • Existing systems
  • Research overview

8. Chapter 3 – Methodology

  • System design
  • Flowchart
  • Tools used
  • Architecture diagram

9. Chapter 4 – Implementation

  • Installation steps
  • Coding (if any)
  • Commands
  • Screenshots
  • Testing process

10. Chapter 5 – Results & Analysis

  • Output explanation
  • Security findings
  • Observations

11. Chapter 6 – Conclusion & Future Scope

12. Bibliography

  • Books
  • Websites

13. Appendix

  • Source code
  • Extra screenshots

5. Tools You Can Use 🛠️

  • Kali Linux
  • Wireshark
  • Nmap
  • Python
  • Metasploit
  • Burp Suite
  • OpenSSL

Use at least one practical tool in your project.


6. Project Length

  • Recommended: 60–80 pages
  • Include:
    • Diagrams
    • Screenshots
    • Tables

7. Formatting Guidelines

  • Font: Times New Roman
  • Heading: 14 Bold
  • Text: 12
  • Line spacing: 1.5
  • Margin: Left 1.5 inch, others 1 inch
  • Page numbers required

8. Important Submission Tips ⚠️

  • Use original screenshots
  • Do not copy full project from internet
  • Mention tools clearly
  • Add proper diagrams
  • Spiral bind or soft bind (as instructed)
  • Keep PDF copy for safety

9. Example Simple Project Structure

Title: “Network Vulnerability Assessment using Nmap”

Chapters:

  1. Introduction to Network Security
  2. Vulnerability Concepts
  3. Nmap Tool Overview
  4. Implementation (Commands + Screenshots)
  5. Analysis of Results
  6. Conclusion

10. Common Mistakes to Avoid ❌

  • No practical implementation
  • Copy-paste theory only
  • Missing screenshots
  • No conclusion
  • Wrong format