Modules / Lectures
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04


Sl.No Chapter Name MP4 Download Transcript Download
1Week 0 IntroductionDownloadDownload
Verified
2Analogy for Week 1 CEO's Problem DownloadDownload
Verified
3Week 1: Discussing the CEO's ProblemDownloadDownload
Verified
4Week 1: From the CEO's Company to Layers in a NetworkDownloadDownload
Verified
5Week 1: Layers in DetailDownloadDownload
Verified
6Week 1 Layered Nature of a NetworkDownloadDownload
Verified
7Week 1: Introduction to Internet Data Capturing using WiresharkDownloadDownload
Verified
8Week 1: Network data captured while requesting a websiteDownloadDownload
Verified
9Week 1: What is Cisco Packet TracerDownloadDownload
Verified
10Week 1: Modes of Cisco Packet TracerDownloadDownload
Verified
11Week 1: Getting Cisco Packet TracerDownloadDownload
Verified
12Week 1: Logical and Physical Typologies in Cisco Packet TracerDownloadDownload
Verified
13Week 1: Devices on Cisco Packet TracerDownloadDownload
Verified
14Week 1: Introduction to the Cisco Packet Tracer Activity for Week 1DownloadDownload
Verified
15Week 1: Introduction to the campus network on Cisco Packet TracerDownloadDownload
Verified
16Week 1: Loading the page in Simulation ModeDownloadDownload
Verified
17Week 1: Inspecting the packets in Simulation ModeDownloadDownload
Verified
18Week 1: Editing the dummy website on Cisco Packet TracerDownloadDownload
Verified
19Week 1: Summary of the Cisco Packet Tracer ActivityDownloadDownload
Verified
20Week 1: Introduction to Anupam's AdventureDownloadDownload
Verified
21Week 1: Anupam's adventure brings us to IP AddressingDownloadDownload
Verified
22Week 1: Addressing at various layersDownloadDownload
Verified
23Week 1: IP AddressesDownloadDownload
Verified
24Week 1: Address TranslationDownloadDownload
Verified
25Week 1: Introduction to IP AddressingDownloadDownload
Verified
26Week 1: Creating a network with Sub-net maskDownloadDownload
Verified
27Week 1: Nomenclature of a sub-net maskDownloadDownload
Verified
28Week 1: Network addresses and Private networksDownloadDownload
Verified
29Week 1: Introduction to the Addressing TopologyDownloadDownload
Verified
30Week 1: Addressing a local network and DHCPDownloadDownload
Verified
31Week 1: Addressing a local network manuallyDownloadDownload
Verified
32Week 1 : Addressing in Pubilc and Private NetworksDownloadDownload
Verified
33Week 1: Verifying Connectivity using PingDownloadDownload
Verified
34Week 1: Using network address translation to communicate on internetDownloadDownload
Verified
35Week 1: Using Sub nets and Summary of addressingDownloadDownload
Verified
36Week 1: Summary of the weekDownloadDownload
Verified
37Week 1: Analogy for the week 2DownloadDownload
Verified
38Week 2 Lession 1.1 Discussion on dabbawala analogyDownloadDownload
Verified
39Week 2 Lesson 1 2 From dabbawalas to routers and switchesDownloadDownload
Verified
40Week 2 Lesson 2 What is routing ?DownloadDownload
Verified
41Week 2 Lesson 3.1 Static routing in a router in CPTDownloadDownload
Verified
42Week 2 Lesson 3.2 How does a switch forwards packets CPTDownloadDownload
Verified
43Week 2 Lesson 3.3 How to add static route in a router? (CPT)DownloadDownload
Verified
44Week 2 Lesson 4.1 Traveler's dilemmaDownloadDownload
Verified
45Week 2 Lesson 4.2 Duscussing the Traveler's dilemmaDownloadDownload
Verified
46Week 2 Lesson 4.3 From Traveler's dilemma to Dynamic RoutingDownloadDownload
Verified
47Week 2 Lesson 5.1 Dynamic Routing with Distance VectorDownloadDownload
Verified
48Week 2 Lesson 5.2 Distance Vector Routing in DetailDownloadDownload
Verified
49Week 2 Lesson 5.3 Dynamic Routing with Link StateDownloadDownload
Verified
50Week 2 Lesson 6 Setting up dynamic routing in Packet TracerDownloadDownload
Verified
51Week 2 Lesson 7 Summary of the weekDownloadDownload
Verified
52Week 2 Lesson 8.1 Introduction to analogy for week 3DownloadDownload
Verified
53Week 2 Lesson 8.2 Analogy for week 3DownloadDownload
Verified
54Week 2 Lesson 8.3 Questions on analogy for week 3DownloadDownload
Verified
55Week 3 Lesson 1 Understanding the new order requirementsDownloadDownload
Verified
56Week 3 Lesson 2.1 Introduction to Tranport LayerDownloadDownload
Verified
57Week 3 Lesson 2.2 Introduction to TCPDownloadDownload
Verified
58Week 3 Lesson 2.3 Introduction to UDPDownloadDownload
Verified
59Week 3 Lesson 3.1 Exploring UDP on Cisco Packet TracerDownloadDownload
Verified
60Week 3 Lesson 3.2 TCP Connection EstablishmentDownloadDownload
Verified
61Week 3 Lesson 3.3 TCP Connection ClosureDownloadDownload
Verified
62Week 3 Lesson 3.4 Summay of TCP and UDP on Cisco Packet TracerDownloadDownload
Verified
63Week 3 Lesson 4 The story of the delivery fiascoDownloadDownload
Verified
64Week 3 Lesson 5.1 From delivery fisaco to Port NumbersDownloadDownload
Verified
65Week 3 Lesson 5.2 Application Layer in depthDownloadDownload
Verified
66Week 3 Lesson 6.1 Port number in WiresharkDownloadDownload
Verified
67Week 3 Lesson 6.3 Summary of port number and PATDownloadDownload
Verified
68Week 3 Lesson 7 Summary of the entire TCP IP stackDownloadDownload
Verified
69Week 3 Lesson 8.1 Introducing the analogy for week 4DownloadDownload
Verified
70Week 3 Lesson 8.2 The secret boxDownloadDownload
Verified
71Week 3 Lesson 8 3 Questions on analogy for week 4DownloadDownload
Verified
72Week 4 Lesson 1.1 Secret of the secret boxDownloadDownload
Verified
73Week 4 Lesson 1.2 From secret box to encryptionDownloadDownload
Verified
74Week 4 Lesson 2.1 Introduction to security and CIADownloadDownload
Verified
75Week 4 Lesson 2.2 Information Security and Defence in DepthDownloadDownload
Verified
76Week 4 Lesson 2.3 Information Classification and Access ControlDownloadDownload
Verified
77Week 4 Lesson 2.4 Process ManagementDownloadDownload
Verified
78Week 4 Lesson 2.5 Introduction to Network SecurityDownloadDownload
Verified
79Week 4 Lesson 2.6 Network Breach and CountermeasuresDownloadDownload
Verified
80Week 4 Lesson 2.7 Internet SecurityDownloadDownload
Verified
81Week 4 Lesson 2.8 Securing the Internet UsageDownloadDownload
Verified
82Week 4 Lesson 2.9 Internet Security ProductsDownloadDownload
Verified
83Week 4 Lesson 2.10 Personal Computing Device RecommendationsDownloadDownload
Verified
84Week 4 Lesson 2.11 Responsible Behavior on the InternetDownloadDownload
Verified
85Week 4 Lesson 2.12 Best practices for home Network and Media DevicesDownloadDownload
Verified
86Week 4 Lesson 3.5 Closing thoughts on securityDownloadDownload
Verified
87Week 4 Lesson 4 The story of a family tripDownloadDownload
Verified
88Week 4 Lesson 5 The troubleshooting approachDownloadDownload
Verified
89Week 4 Lesson 6.1 Troubleshooting Physical and Data Link LayersDownloadDownload
Verified
90Week 4 Lesson 6.2 Troubleshooting Network LayerDownloadDownload
Verified
91Week 4 Lesson 6.3 Troubleshooting Transport and Application LayersDownloadDownload
Verified
92Week 4 Lesson 6.4 Troubleshooting SummaryDownloadDownload
Verified
93Week 4 Lesson 6.5 Troubleshooting HeuristicsDownloadDownload
Verified
94Week 4 Lesson 7.1 Troubleshooting Challenge 1DownloadDownload
Verified
95Week 4 Lesson 7.2 Trouble shooting challenge 2DownloadDownload
Verified
96Week 4 Lesson 7.3 Trouble Shooting Challenge 3DownloadDownload
Verified
97Week 4 Lesson 7.4 Thats How we TroubleshootDownloadDownload
Verified
98Week 4 Lesson 8 Week SummaryDownloadDownload
Verified
99Course ClosureDownloadDownload
Verified
100Course CreditsDownloadDownload
Verified