23. IGNOU PGDIS Project
To prepare the IGNOU PGDIS Project, you need to follow a structured academic format. The PGDIS (Post Graduate Diploma in Information Security) project is practical and technical, so evaluators expect proper documentation, implementation, and analysis.
Below is a step-by-step detailed guide specifically for the Indira Gandhi National Open University PGDIS Project 👇
🎓 IGNOU PGDIS Project – Complete Guide
1. Understand the Project Requirement
- PGDIS project is usually compulsory for completing the diploma
- It focuses on Information Security / Cyber Security related topic
- You must submit:
- Project Report (printed)
- Project synopsis (before approval in some cases)
- Practical implementation (screenshots / code)
2. Choose a Suitable Project Topic 🔐
Select a simple but practical topic. Examples:
- Network Vulnerability Assessment using Kali Linux
- Password Security Analysis System
- Phishing Detection System
- Web Application Security Testing
- Firewall Configuration and Analysis
- Intrusion Detection System (IDS) Implementation
- Secure File Encryption Tool
- Cyber Security Awareness Portal
💡 Tip: Choose a topic that you can demonstrate with screenshots or code
3. Prepare Project Synopsis (If Required)
Some study centres ask for synopsis approval. Include:
- Title of Project
- Objective
- Tools/Technology (Python, Kali Linux, etc.)
- Methodology
- Expected Outcome
- Timeline
4. PGDIS Project Report Format 📄
Follow this standard IGNOU format:
1. Cover Page
- Project Title
- Your Name
- Enrollment Number
- Programme: PGDIS
- Study Centre
- Session/Year
2. Certificate
- Supervisor certificate (if applicable)
3. Declaration
- Student declaration (self-written)
4. Acknowledgement
5. Table of Contents
6. Chapter 1 – Introduction
- Background of Information Security
- Need of Project
- Objectives
- Scope
7. Chapter 2 – Literature Review
- Concepts related to security
- Existing systems
- Research overview
8. Chapter 3 – Methodology
- System design
- Flowchart
- Tools used
- Architecture diagram
9. Chapter 4 – Implementation
- Installation steps
- Coding (if any)
- Commands
- Screenshots
- Testing process
10. Chapter 5 – Results & Analysis
- Output explanation
- Security findings
- Observations
11. Chapter 6 – Conclusion & Future Scope
12. Bibliography
- Books
- Websites
13. Appendix
- Source code
- Extra screenshots
5. Tools You Can Use 🛠️
- Kali Linux
- Wireshark
- Nmap
- Python
- Metasploit
- Burp Suite
- OpenSSL
Use at least one practical tool in your project.
6. Project Length
- Recommended: 60–80 pages
- Include:
- Diagrams
- Screenshots
- Tables
7. Formatting Guidelines
- Font: Times New Roman
- Heading: 14 Bold
- Text: 12
- Line spacing: 1.5
- Margin: Left 1.5 inch, others 1 inch
- Page numbers required
8. Important Submission Tips ⚠️
- Use original screenshots
- Do not copy full project from internet
- Mention tools clearly
- Add proper diagrams
- Spiral bind or soft bind (as instructed)
- Keep PDF copy for safety
9. Example Simple Project Structure
Title: “Network Vulnerability Assessment using Nmap”
Chapters:
- Introduction to Network Security
- Vulnerability Concepts
- Nmap Tool Overview
- Implementation (Commands + Screenshots)
- Analysis of Results
- Conclusion
10. Common Mistakes to Avoid ❌
- No practical implementation
- Copy-paste theory only
- Missing screenshots
- No conclusion
- Wrong format