Modules / Lectures

Video Transcript:

Auto Scroll Hide
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04


Sl.No Chapter Name MP4 Download
1Week 0 IntroductionDownload
2Analogy for Week 1 CEO's Problem Download
3Week 1: Discussing the CEO's ProblemDownload
4Week 1: From the CEO's Company to Layers in a NetworkDownload
5Week 1: Layers in DetailDownload
6Week 1 Layered Nature of a NetworkDownload
7Week 1: Introduction to Internet Data Capturing using WiresharkDownload
8Week 1: Network data captured while requesting a websiteDownload
9Week 1: What is Cisco Packet TracerDownload
10Week 1: Modes of Cisco Packet TracerDownload
11Week 1: Getting Cisco Packet TracerDownload
12Week 1: Logical and Physical Typologies in Cisco Packet TracerDownload
13Week 1: Devices on Cisco Packet TracerDownload
14Week 1: Introduction to the Cisco Packet Tracer Activity for Week 1Download
15Week 1: Introduction to the campus network on Cisco Packet TracerDownload
16Week 1: Loading the page in Simulation ModeDownload
17Week 1: Inspecting the packets in Simulation ModeDownload
18Week 1: Editing the dummy website on Cisco Packet TracerDownload
19Week 1: Summary of the Cisco Packet Tracer ActivityDownload
20Week 1: Introduction to Anupam's AdventureDownload
21Week 1: Anupam's adventure brings us to IP AddressingDownload
22Week 1: Addressing at various layersDownload
23Week 1: IP AddressesDownload
24Week 1: Address TranslationDownload
25Week 1: Introduction to IP AddressingDownload
26Week 1: Creating a network with Sub-net maskDownload
27Week 1: Nomenclature of a sub-net maskDownload
28Week 1: Network addresses and Private networksDownload
29Week 1: Introduction to the Addressing TopologyDownload
30Week 1: Addressing a local network and DHCPDownload
31Week 1: Addressing a local network manuallyDownload
32Week 1 : Addressing in Pubilc and Private NetworksDownload
33Week 1: Verifying Connectivity using PingDownload
34Week 1: Using network address translation to communicate on internetDownload
35Week 1: Using Sub nets and Summary of addressingDownload
36Week 1: Summary of the weekDownload
37Week 1: Analogy for the week 2Download
38Week 2 Lession 1.1 Discussion on dabbawala analogyDownload
39Week 2 Lesson 1 2 From dabbawalas to routers and switchesDownload
40Week 2 Lesson 2 What is routing ?Download
41Week 2 Lesson 3.1 Static routing in a router in CPTDownload
42Week 2 Lesson 3.2 How does a switch forwards packets CPTDownload
43Week 2 Lesson 3.3 How to add static route in a router? (CPT)Download
44Week 2 Lesson 4.1 Traveler's dilemmaDownload
45Week 2 Lesson 4.2 Duscussing the Traveler's dilemmaDownload
46Week 2 Lesson 4.3 From Traveler's dilemma to Dynamic RoutingDownload
47Week 2 Lesson 5.1 Dynamic Routing with Distance VectorDownload
48Week 2 Lesson 5.2 Distance Vector Routing in DetailDownload
49Week 2 Lesson 5.3 Dynamic Routing with Link StateDownload
50Week 2 Lesson 6 Setting up dynamic routing in Packet TracerDownload
51Week 2 Lesson 7 Summary of the weekDownload
52Week 2 Lesson 8.1 Introduction to analogy for week 3Download
53Week 2 Lesson 8.2 Analogy for week 3Download
54Week 2 Lesson 8.3 Questions on analogy for week 3Download
55Week 3 Lesson 1 Understanding the new order requirementsDownload
56Week 3 Lesson 2.1 Introduction to Tranport LayerDownload
57Week 3 Lesson 2.2 Introduction to TCPDownload
58Week 3 Lesson 2.3 Introduction to UDPDownload
59Week 3 Lesson 3.1 Exploring UDP on Cisco Packet TracerDownload
60Week 3 Lesson 3.2 TCP Connection EstablishmentDownload
61Week 3 Lesson 3.3 TCP Connection ClosureDownload
62Week 3 Lesson 3.4 Summay of TCP and UDP on Cisco Packet TracerDownload
63Week 3 Lesson 4 The story of the delivery fiascoDownload
64Week 3 Lesson 5.1 From delivery fisaco to Port NumbersDownload
65Week 3 Lesson 5.2 Application Layer in depthDownload
66Week 3 Lesson 6.1 Port number in WiresharkDownload
67Week 3 Lesson 6.3 Summary of port number and PATDownload
68Week 3 Lesson 7 Summary of the entire TCP IP stackDownload
69Week 3 Lesson 8.1 Introducing the analogy for week 4Download
70Week 3 Lesson 8.2 The secret boxDownload
71Week 3 Lesson 8 3 Questions on analogy for week 4Download
72Week 4 Lesson 1.1 Secret of the secret boxDownload
73Week 4 Lesson 1.2 From secret box to encryptionDownload
74Week 4 Lesson 2.1 Introduction to security and CIADownload
75Week 4 Lesson 2.2 Information Security and Defence in DepthDownload
76Week 4 Lesson 2.3 Information Classification and Access ControlDownload
77Week 4 Lesson 2.4 Process ManagementDownload
78Week 4 Lesson 2.5 Introduction to Network SecurityDownload
79Week 4 Lesson 2.6 Network Breach and CountermeasuresDownload
80Week 4 Lesson 2.7 Internet SecurityDownload
81Week 4 Lesson 2.8 Securing the Internet UsageDownload
82Week 4 Lesson 2.9 Internet Security ProductsDownload
83Week 4 Lesson 2.10 Personal Computing Device RecommendationsDownload
84Week 4 Lesson 2.11 Responsible Behavior on the InternetDownload
85Week 4 Lesson 2.12 Best practices for home Network and Media DevicesDownload
86Week 4 Lesson 3.5 Closing thoughts on securityDownload
87Week 4 Lesson 4 The story of a family tripDownload
88Week 4 Lesson 5 The troubleshooting approachDownload
89Week 4 Lesson 6.1 Troubleshooting Physical and Data Link LayersDownload
90Week 4 Lesson 6.2 Troubleshooting Network LayerDownload
91Week 4 Lesson 6.3 Troubleshooting Transport and Application LayersDownload
92Week 4 Lesson 6.4 Troubleshooting SummaryDownload
93Week 4 Lesson 6.5 Troubleshooting HeuristicsDownload
94Week 4 Lesson 7.1 Troubleshooting Challenge 1Download
95Week 4 Lesson 7.2 Trouble shooting challenge 2Download
96Week 4 Lesson 7.3 Trouble Shooting Challenge 3Download
97Week 4 Lesson 7.4 Thats How we TroubleshootDownload
98Week 4 Lesson 8 Week SummaryDownload
99Course ClosureDownload
100Course CreditsDownload

Sl.No Chapter Name English
1Week 0 IntroductionDownload
Verified
2Analogy for Week 1 CEO's Problem Download
Verified
3Week 1: Discussing the CEO's ProblemDownload
Verified
4Week 1: From the CEO's Company to Layers in a NetworkDownload
Verified
5Week 1: Layers in DetailDownload
Verified
6Week 1 Layered Nature of a NetworkDownload
Verified
7Week 1: Introduction to Internet Data Capturing using WiresharkDownload
Verified
8Week 1: Network data captured while requesting a websiteDownload
Verified
9Week 1: What is Cisco Packet TracerDownload
Verified
10Week 1: Modes of Cisco Packet TracerDownload
Verified
11Week 1: Getting Cisco Packet TracerDownload
Verified
12Week 1: Logical and Physical Typologies in Cisco Packet TracerDownload
Verified
13Week 1: Devices on Cisco Packet TracerDownload
Verified
14Week 1: Introduction to the Cisco Packet Tracer Activity for Week 1Download
Verified
15Week 1: Introduction to the campus network on Cisco Packet TracerDownload
Verified
16Week 1: Loading the page in Simulation ModeDownload
Verified
17Week 1: Inspecting the packets in Simulation ModeDownload
Verified
18Week 1: Editing the dummy website on Cisco Packet TracerDownload
Verified
19Week 1: Summary of the Cisco Packet Tracer ActivityDownload
Verified
20Week 1: Introduction to Anupam's AdventureDownload
Verified
21Week 1: Anupam's adventure brings us to IP AddressingDownload
Verified
22Week 1: Addressing at various layersDownload
Verified
23Week 1: IP AddressesDownload
Verified
24Week 1: Address TranslationDownload
Verified
25Week 1: Introduction to IP AddressingDownload
Verified
26Week 1: Creating a network with Sub-net maskDownload
Verified
27Week 1: Nomenclature of a sub-net maskDownload
Verified
28Week 1: Network addresses and Private networksDownload
Verified
29Week 1: Introduction to the Addressing TopologyDownload
Verified
30Week 1: Addressing a local network and DHCPDownload
Verified
31Week 1: Addressing a local network manuallyDownload
Verified
32Week 1 : Addressing in Pubilc and Private NetworksDownload
Verified
33Week 1: Verifying Connectivity using PingDownload
Verified
34Week 1: Using network address translation to communicate on internetDownload
Verified
35Week 1: Using Sub nets and Summary of addressingDownload
Verified
36Week 1: Summary of the weekDownload
Verified
37Week 1: Analogy for the week 2Download
Verified
38Week 2 Lession 1.1 Discussion on dabbawala analogyDownload
Verified
39Week 2 Lesson 1 2 From dabbawalas to routers and switchesDownload
Verified
40Week 2 Lesson 2 What is routing ?Download
Verified
41Week 2 Lesson 3.1 Static routing in a router in CPTDownload
Verified
42Week 2 Lesson 3.2 How does a switch forwards packets CPTDownload
Verified
43Week 2 Lesson 3.3 How to add static route in a router? (CPT)Download
Verified
44Week 2 Lesson 4.1 Traveler's dilemmaDownload
Verified
45Week 2 Lesson 4.2 Duscussing the Traveler's dilemmaDownload
Verified
46Week 2 Lesson 4.3 From Traveler's dilemma to Dynamic RoutingDownload
Verified
47Week 2 Lesson 5.1 Dynamic Routing with Distance VectorDownload
Verified
48Week 2 Lesson 5.2 Distance Vector Routing in DetailDownload
Verified
49Week 2 Lesson 5.3 Dynamic Routing with Link StateDownload
Verified
50Week 2 Lesson 6 Setting up dynamic routing in Packet TracerDownload
Verified
51Week 2 Lesson 7 Summary of the weekDownload
Verified
52Week 2 Lesson 8.1 Introduction to analogy for week 3Download
Verified
53Week 2 Lesson 8.2 Analogy for week 3Download
Verified
54Week 2 Lesson 8.3 Questions on analogy for week 3Download
Verified
55Week 3 Lesson 1 Understanding the new order requirementsDownload
Verified
56Week 3 Lesson 2.1 Introduction to Tranport LayerDownload
Verified
57Week 3 Lesson 2.2 Introduction to TCPDownload
Verified
58Week 3 Lesson 2.3 Introduction to UDPDownload
Verified
59Week 3 Lesson 3.1 Exploring UDP on Cisco Packet TracerDownload
Verified
60Week 3 Lesson 3.2 TCP Connection EstablishmentDownload
Verified
61Week 3 Lesson 3.3 TCP Connection ClosureDownload
Verified
62Week 3 Lesson 3.4 Summay of TCP and UDP on Cisco Packet TracerDownload
Verified
63Week 3 Lesson 4 The story of the delivery fiascoDownload
Verified
64Week 3 Lesson 5.1 From delivery fisaco to Port NumbersDownload
Verified
65Week 3 Lesson 5.2 Application Layer in depthDownload
Verified
66Week 3 Lesson 6.1 Port number in WiresharkDownload
Verified
67Week 3 Lesson 6.3 Summary of port number and PATDownload
Verified
68Week 3 Lesson 7 Summary of the entire TCP IP stackDownload
Verified
69Week 3 Lesson 8.1 Introducing the analogy for week 4Download
Verified
70Week 3 Lesson 8.2 The secret boxDownload
Verified
71Week 3 Lesson 8 3 Questions on analogy for week 4Download
Verified
72Week 4 Lesson 1.1 Secret of the secret boxDownload
Verified
73Week 4 Lesson 1.2 From secret box to encryptionDownload
Verified
74Week 4 Lesson 2.1 Introduction to security and CIADownload
Verified
75Week 4 Lesson 2.2 Information Security and Defence in DepthDownload
Verified
76Week 4 Lesson 2.3 Information Classification and Access ControlDownload
Verified
77Week 4 Lesson 2.4 Process ManagementDownload
Verified
78Week 4 Lesson 2.5 Introduction to Network SecurityDownload
Verified
79Week 4 Lesson 2.6 Network Breach and CountermeasuresDownload
Verified
80Week 4 Lesson 2.7 Internet SecurityDownload
Verified
81Week 4 Lesson 2.8 Securing the Internet UsageDownload
Verified
82Week 4 Lesson 2.9 Internet Security ProductsDownload
Verified
83Week 4 Lesson 2.10 Personal Computing Device RecommendationsDownload
Verified
84Week 4 Lesson 2.11 Responsible Behavior on the InternetDownload
Verified
85Week 4 Lesson 2.12 Best practices for home Network and Media DevicesDownload
Verified
86Week 4 Lesson 3.5 Closing thoughts on securityDownload
Verified
87Week 4 Lesson 4 The story of a family tripDownload
Verified
88Week 4 Lesson 5 The troubleshooting approachDownload
Verified
89Week 4 Lesson 6.1 Troubleshooting Physical and Data Link LayersDownload
Verified
90Week 4 Lesson 6.2 Troubleshooting Network LayerDownload
Verified
91Week 4 Lesson 6.3 Troubleshooting Transport and Application LayersDownload
Verified
92Week 4 Lesson 6.4 Troubleshooting SummaryDownload
Verified
93Week 4 Lesson 6.5 Troubleshooting HeuristicsDownload
Verified
94Week 4 Lesson 7.1 Troubleshooting Challenge 1Download
Verified
95Week 4 Lesson 7.2 Trouble shooting challenge 2Download
Verified
96Week 4 Lesson 7.3 Trouble Shooting Challenge 3Download
Verified
97Week 4 Lesson 7.4 Thats How we TroubleshootDownload
Verified
98Week 4 Lesson 8 Week SummaryDownload
Verified
99Course ClosureDownload
Verified
100Course CreditsDownload
Verified


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available