Video Transcript:

Auto Scroll Hide


New Assignments
Module NameDownload
Assessment-2Assessment-2
Assessment-3Assessment-3
Assessment-4Assessment-4
Assessment-5Assessment-5
Assessment-6Assessment-6
Assessment-7Assessment-7
Assessment-8Assessment-8
assessment-1assessment-1
Module NameDownloadDescriptionDownload Size
Week 1DescriptiveSolutionsNPTELFinalexamDescriptiveSolutionsNPTELFinalexam82


Sl.No Chapter Name MP4 Download
1Operating System IntroductionDownload
2Storage Hierarchy , Exceptions, Interrupts and trapsDownload
3OS Management ServicesDownload
4OS Security IssuesDownload
5Process And ThreadsDownload
6 Process SchedulingDownload
7Scheduling AlgorithmDownload
8Process SynchronizationDownload
9Memory Management - 1Download
10Memory Management - 2Download
11File Systems 1Download
12File Systems-1Download
13Unix FilesystemDownload
14Unix Filesystem (Contd.)Download
15Linux : Basic CommandsDownload
16Linux : Basic Commands (Contd.)Download
17Linux : Users and PermissionsDownload
18Linux : I/O Redirection and PipesDownload
19Linux : Task ControlDownload
20Linux : Shell EnvironmentDownload
21Linux: Text EditorsDownload
22Linux : Compression / ArchivingDownload
23Linux: Print & Sync CommandsDownload
24Linux: File ComparisonDownload
25Basic Networking AdministrationDownload
26Filesystems and DevicesDownload
27Shell IntroductionDownload
28Shell Comments and VariablesDownload
29Shell VariablesDownload
30Shell Arrays and ArithmeticDownload
31Shell Condition and RelationDownload
32Shell ExamplesDownload
33Shell FunctionsDownload
34Shell File TestDownload
35Shell Loop ControlDownload
36Shell Script VariationsDownload
37Shell Pattern MatchingDownload
38Shell Case StatementsDownload
39Shell Co-routinesDownload
40Shell Signals and TrapsDownload
41Shell SubshellDownload
42Shell DeclarationsDownload
43Shell Examples 2Download
44Shell ReviewDownload
45An IntroductionDownload
46Structure of a NetworkDownload
47Network Core - DefinitionDownload
48Network Access and Physical MediaDownload
49Structure of ISP and Packet DelaysDownload
50Network Protocol LayersDownload
51Network DevicesDownload
52Network Security- An IntroductionDownload
53Public Key CryptographyDownload
54Digital SignaturesDownload
55Security in PractiseDownload
56Security in Practise (contd.)Download
57WiresharkDownload
58SnortDownload
59Review IDownload
60Review IIDownload

Sl.No Chapter Name English
1Operating System IntroductionDownload
Verified
2Storage Hierarchy , Exceptions, Interrupts and trapsDownload
Verified
3OS Management ServicesDownload
Verified
4OS Security IssuesDownload
Verified
5Process And ThreadsDownload
Verified
6 Process SchedulingDownload
Verified
7Scheduling AlgorithmDownload
Verified
8Process SynchronizationDownload
Verified
9Memory Management - 1Download
Verified
10Memory Management - 2Download
Verified
11File Systems 1Download
Verified
12File Systems-1Download
Verified
13Unix FilesystemDownload
Verified
14Unix Filesystem (Contd.)Download
Verified
15Linux : Basic CommandsDownload
Verified
16Linux : Basic Commands (Contd.)Download
Verified
17Linux : Users and PermissionsDownload
Verified
18Linux : I/O Redirection and PipesDownload
Verified
19Linux : Task ControlDownload
Verified
20Linux : Shell EnvironmentDownload
Verified
21Linux: Text EditorsDownload
Verified
22Linux : Compression / ArchivingDownload
Verified
23Linux: Print & Sync CommandsDownload
Verified
24Linux: File ComparisonDownload
Verified
25Basic Networking AdministrationDownload
Verified
26Filesystems and DevicesDownload
Verified
27Shell IntroductionDownload
Verified
28Shell Comments and VariablesDownload
Verified
29Shell VariablesDownload
Verified
30Shell Arrays and ArithmeticDownload
Verified
31Shell Condition and RelationDownload
Verified
32Shell ExamplesDownload
Verified
33Shell FunctionsDownload
Verified
34Shell File TestDownload
Verified
35Shell Loop ControlDownload
Verified
36Shell Script VariationsDownload
Verified
37Shell Pattern MatchingDownload
Verified
38Shell Case StatementsDownload
Verified
39Shell Co-routinesDownload
Verified
40Shell Signals and TrapsDownload
Verified
41Shell SubshellDownload
Verified
42Shell DeclarationsDownload
Verified
43Shell Examples 2Download
Verified
44Shell ReviewDownload
Verified
45An IntroductionDownload
Verified
46Structure of a NetworkDownload
Verified
47Network Core - DefinitionDownload
Verified
48Network Access and Physical MediaDownload
Verified
49Structure of ISP and Packet DelaysDownload
Verified
50Network Protocol LayersDownload
Verified
51Network DevicesDownload
Verified
52Network Security- An IntroductionDownload
Verified
53Public Key CryptographyDownload
Verified
54Digital SignaturesDownload
Verified
55Security in PractiseDownload
Verified
56Security in Practise (contd.)Download
Verified
57WiresharkDownload
Verified
58SnortDownload
Verified
59Review IDownload
Verified
60Review IIDownload
Verified


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available