Modules / Lectures
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04


Sl.No Chapter Name MP4 Download
1Week 0 IntroductionDownload
2Analogy for Week 1 CEO's Problem Download
3Week 1: Discussing the CEO's ProblemDownload
4Week 1: From the CEO's Company to Layers in a NetworkDownload
5Week 1: Layers in DetailDownload
6Week 1 Layered Nature of a NetworkDownload
7Week 1: Introduction to Internet Data Capturing using WiresharkDownload
8Week 1: Network data captured while requesting a websiteDownload
9Week 1: What is Cisco Packet TracerDownload
10Week 1: Modes of Cisco Packet TracerDownload
11Week 1: Getting Cisco Packet TracerDownload
12Week 1: Logical and Physical Typologies in Cisco Packet TracerDownload
13Week 1: Devices on Cisco Packet TracerDownload
14Week 1: Introduction to the Cisco Packet Tracer Activity for Week 1Download
15Week 1: Introduction to the campus network on Cisco Packet TracerDownload
16Week 1: Loading the page in Simulation ModeDownload
17Week 1: Inspecting the packets in Simulation ModeDownload
18Week 1: Editing the dummy website on Cisco Packet TracerDownload
19Week 1: Summary of the Cisco Packet Tracer ActivityDownload
20Week 1: Introduction to Anupam's AdventureDownload
21Week 1: Anupam's adventure brings us to IP AddressingDownload
22Week 1: Addressing at various layersDownload
23Week 1: IP AddressesDownload
24Week 1: Address TranslationDownload
25Week 1: Introduction to IP AddressingDownload
26Week 1: Creating a network with Sub-net maskDownload
27Week 1: Nomenclature of a sub-net maskDownload
28Week 1: Network addresses and Private networksDownload
29Week 1: Introduction to the Addressing TopologyDownload
30Week 1: Addressing a local network and DHCPDownload
31Week 1: Addressing a local network manuallyDownload
32Week 1 : Addressing in Pubilc and Private NetworksDownload
33Week 1: Verifying Connectivity using PingDownload
34Week 1: Using network address translation to communicate on internetDownload
35Week 1: Using Sub nets and Summary of addressingDownload
36Week 1: Summary of the weekDownload
37Week 1: Analogy for the week 2Download
38Week 2 Lession 1.1 Discussion on dabbawala analogyDownload
39Week 2 Lesson 1 2 From dabbawalas to routers and switchesDownload
40Week 2 Lesson 2 What is routing ?Download
41Week 2 Lesson 3.1 Static routing in a router in CPTDownload
42Week 2 Lesson 3.2 How does a switch forwards packets CPTDownload
43Week 2 Lesson 3.3 How to add static route in a router? (CPT)Download
44Week 2 Lesson 4.1 Traveler's dilemmaDownload
45Week 2 Lesson 4.2 Duscussing the Traveler's dilemmaDownload
46Week 2 Lesson 4.3 From Traveler's dilemma to Dynamic RoutingDownload
47Week 2 Lesson 5.1 Dynamic Routing with Distance VectorDownload
48Week 2 Lesson 5.2 Distance Vector Routing in DetailDownload
49Week 2 Lesson 5.3 Dynamic Routing with Link StateDownload
50Week 2 Lesson 6 Setting up dynamic routing in Packet TracerDownload
51Week 2 Lesson 7 Summary of the weekDownload
52Week 2 Lesson 8.1 Introduction to analogy for week 3Download
53Week 2 Lesson 8.2 Analogy for week 3Download
54Week 2 Lesson 8.3 Questions on analogy for week 3Download
55Week 3 Lesson 1 Understanding the new order requirementsDownload
56Week 3 Lesson 2.1 Introduction to Tranport LayerDownload
57Week 3 Lesson 2.2 Introduction to TCPDownload
58Week 3 Lesson 2.3 Introduction to UDPDownload
59Week 3 Lesson 3.1 Exploring UDP on Cisco Packet TracerDownload
60Week 3 Lesson 3.2 TCP Connection EstablishmentDownload
61Week 3 Lesson 3.3 TCP Connection ClosureDownload
62Week 3 Lesson 3.4 Summay of TCP and UDP on Cisco Packet TracerDownload
63Week 3 Lesson 4 The story of the delivery fiascoDownload
64Week 3 Lesson 5.1 From delivery fisaco to Port NumbersDownload
65Week 3 Lesson 5.2 Application Layer in depthDownload
66Week 3 Lesson 6.1 Port number in WiresharkDownload
67Week 3 Lesson 6.3 Summary of port number and PATDownload
68Week 3 Lesson 7 Summary of the entire TCP IP stackDownload
69Week 3 Lesson 8.1 Introducing the analogy for week 4Download
70Week 3 Lesson 8.2 The secret boxDownload
71Week 3 Lesson 8 3 Questions on analogy for week 4Download
72Week 4 Lesson 1.1 Secret of the secret boxDownload
73Week 4 Lesson 1.2 From secret box to encryptionDownload
74Week 4 Lesson 2.1 Introduction to security and CIADownload
75Week 4 Lesson 2.2 Information Security and Defence in DepthDownload
76Week 4 Lesson 2.3 Information Classification and Access ControlDownload
77Week 4 Lesson 2.4 Process ManagementDownload
78Week 4 Lesson 2.5 Introduction to Network SecurityDownload
79Week 4 Lesson 2.6 Network Breach and CountermeasuresDownload
80Week 4 Lesson 2.7 Internet SecurityDownload
81Week 4 Lesson 2.8 Securing the Internet UsageDownload
82Week 4 Lesson 2.9 Internet Security ProductsDownload
83Week 4 Lesson 2.10 Personal Computing Device RecommendationsDownload
84Week 4 Lesson 2.11 Responsible Behavior on the InternetDownload
85Week 4 Lesson 2.12 Best practices for home Network and Media DevicesDownload
86Week 4 Lesson 3.5 Closing thoughts on securityDownload
87Week 4 Lesson 4 The story of a family tripDownload
88Week 4 Lesson 5 The troubleshooting approachDownload
89Week 4 Lesson 6.1 Troubleshooting Physical and Data Link LayersDownload
90Week 4 Lesson 6.2 Troubleshooting Network LayerDownload
91Week 4 Lesson 6.3 Troubleshooting Transport and Application LayersDownload
92Week 4 Lesson 6.4 Troubleshooting SummaryDownload
93Week 4 Lesson 6.5 Troubleshooting HeuristicsDownload
94Week 4 Lesson 7.1 Troubleshooting Challenge 1Download
95Week 4 Lesson 7.2 Trouble shooting challenge 2Download
96Week 4 Lesson 7.3 Trouble Shooting Challenge 3Download
97Week 4 Lesson 7.4 Thats How we TroubleshootDownload
98Week 4 Lesson 8 Week SummaryDownload
99Course ClosureDownload
100Course CreditsDownload

Sl.No Chapter Name English
1Week 0 IntroductionDownload
Verified
2Analogy for Week 1 CEO's Problem Download
Verified
3Week 1: Discussing the CEO's ProblemDownload
Verified
4Week 1: From the CEO's Company to Layers in a NetworkDownload
Verified
5Week 1: Layers in DetailDownload
Verified
6Week 1 Layered Nature of a NetworkDownload
Verified
7Week 1: Introduction to Internet Data Capturing using WiresharkDownload
Verified
8Week 1: Network data captured while requesting a websiteDownload
Verified
9Week 1: What is Cisco Packet TracerDownload
Verified
10Week 1: Modes of Cisco Packet TracerDownload
Verified
11Week 1: Getting Cisco Packet TracerDownload
Verified
12Week 1: Logical and Physical Typologies in Cisco Packet TracerDownload
Verified
13Week 1: Devices on Cisco Packet TracerDownload
Verified
14Week 1: Introduction to the Cisco Packet Tracer Activity for Week 1Download
Verified
15Week 1: Introduction to the campus network on Cisco Packet TracerDownload
Verified
16Week 1: Loading the page in Simulation ModeDownload
Verified
17Week 1: Inspecting the packets in Simulation ModeDownload
Verified
18Week 1: Editing the dummy website on Cisco Packet TracerDownload
Verified
19Week 1: Summary of the Cisco Packet Tracer ActivityDownload
Verified
20Week 1: Introduction to Anupam's AdventureDownload
Verified
21Week 1: Anupam's adventure brings us to IP AddressingDownload
Verified
22Week 1: Addressing at various layersDownload
Verified
23Week 1: IP AddressesDownload
Verified
24Week 1: Address TranslationDownload
Verified
25Week 1: Introduction to IP AddressingDownload
Verified
26Week 1: Creating a network with Sub-net maskDownload
Verified
27Week 1: Nomenclature of a sub-net maskDownload
Verified
28Week 1: Network addresses and Private networksDownload
Verified
29Week 1: Introduction to the Addressing TopologyDownload
Verified
30Week 1: Addressing a local network and DHCPDownload
Verified
31Week 1: Addressing a local network manuallyDownload
Verified
32Week 1 : Addressing in Pubilc and Private NetworksDownload
Verified
33Week 1: Verifying Connectivity using PingDownload
Verified
34Week 1: Using network address translation to communicate on internetDownload
Verified
35Week 1: Using Sub nets and Summary of addressingDownload
Verified
36Week 1: Summary of the weekDownload
Verified
37Week 1: Analogy for the week 2Download
Verified
38Week 2 Lession 1.1 Discussion on dabbawala analogyDownload
Verified
39Week 2 Lesson 1 2 From dabbawalas to routers and switchesDownload
Verified
40Week 2 Lesson 2 What is routing ?Download
Verified
41Week 2 Lesson 3.1 Static routing in a router in CPTDownload
Verified
42Week 2 Lesson 3.2 How does a switch forwards packets CPTDownload
Verified
43Week 2 Lesson 3.3 How to add static route in a router? (CPT)Download
Verified
44Week 2 Lesson 4.1 Traveler's dilemmaDownload
Verified
45Week 2 Lesson 4.2 Duscussing the Traveler's dilemmaDownload
Verified
46Week 2 Lesson 4.3 From Traveler's dilemma to Dynamic RoutingDownload
Verified
47Week 2 Lesson 5.1 Dynamic Routing with Distance VectorDownload
Verified
48Week 2 Lesson 5.2 Distance Vector Routing in DetailDownload
Verified
49Week 2 Lesson 5.3 Dynamic Routing with Link StateDownload
Verified
50Week 2 Lesson 6 Setting up dynamic routing in Packet TracerDownload
Verified
51Week 2 Lesson 7 Summary of the weekDownload
Verified
52Week 2 Lesson 8.1 Introduction to analogy for week 3Download
Verified
53Week 2 Lesson 8.2 Analogy for week 3Download
Verified
54Week 2 Lesson 8.3 Questions on analogy for week 3Download
Verified
55Week 3 Lesson 1 Understanding the new order requirementsDownload
Verified
56Week 3 Lesson 2.1 Introduction to Tranport LayerDownload
Verified
57Week 3 Lesson 2.2 Introduction to TCPDownload
Verified
58Week 3 Lesson 2.3 Introduction to UDPDownload
Verified
59Week 3 Lesson 3.1 Exploring UDP on Cisco Packet TracerDownload
Verified
60Week 3 Lesson 3.2 TCP Connection EstablishmentDownload
Verified
61Week 3 Lesson 3.3 TCP Connection ClosureDownload
Verified
62Week 3 Lesson 3.4 Summay of TCP and UDP on Cisco Packet TracerDownload
Verified
63Week 3 Lesson 4 The story of the delivery fiascoDownload
Verified
64Week 3 Lesson 5.1 From delivery fisaco to Port NumbersDownload
Verified
65Week 3 Lesson 5.2 Application Layer in depthDownload
Verified
66Week 3 Lesson 6.1 Port number in WiresharkDownload
Verified
67Week 3 Lesson 6.3 Summary of port number and PATDownload
Verified
68Week 3 Lesson 7 Summary of the entire TCP IP stackDownload
Verified
69Week 3 Lesson 8.1 Introducing the analogy for week 4Download
Verified
70Week 3 Lesson 8.2 The secret boxDownload
Verified
71Week 3 Lesson 8 3 Questions on analogy for week 4Download
Verified
72Week 4 Lesson 1.1 Secret of the secret boxDownload
Verified
73Week 4 Lesson 1.2 From secret box to encryptionDownload
Verified
74Week 4 Lesson 2.1 Introduction to security and CIADownload
Verified
75Week 4 Lesson 2.2 Information Security and Defence in DepthDownload
Verified
76Week 4 Lesson 2.3 Information Classification and Access ControlDownload
Verified
77Week 4 Lesson 2.4 Process ManagementDownload
Verified
78Week 4 Lesson 2.5 Introduction to Network SecurityDownload
Verified
79Week 4 Lesson 2.6 Network Breach and CountermeasuresDownload
Verified
80Week 4 Lesson 2.7 Internet SecurityDownload
Verified
81Week 4 Lesson 2.8 Securing the Internet UsageDownload
Verified
82Week 4 Lesson 2.9 Internet Security ProductsDownload
Verified
83Week 4 Lesson 2.10 Personal Computing Device RecommendationsDownload
Verified
84Week 4 Lesson 2.11 Responsible Behavior on the InternetDownload
Verified
85Week 4 Lesson 2.12 Best practices for home Network and Media DevicesDownload
Verified
86Week 4 Lesson 3.5 Closing thoughts on securityDownload
Verified
87Week 4 Lesson 4 The story of a family tripDownload
Verified
88Week 4 Lesson 5 The troubleshooting approachDownload
Verified
89Week 4 Lesson 6.1 Troubleshooting Physical and Data Link LayersDownload
Verified
90Week 4 Lesson 6.2 Troubleshooting Network LayerDownload
Verified
91Week 4 Lesson 6.3 Troubleshooting Transport and Application LayersDownload
Verified
92Week 4 Lesson 6.4 Troubleshooting SummaryDownload
Verified
93Week 4 Lesson 6.5 Troubleshooting HeuristicsDownload
Verified
94Week 4 Lesson 7.1 Troubleshooting Challenge 1Download
Verified
95Week 4 Lesson 7.2 Trouble shooting challenge 2Download
Verified
96Week 4 Lesson 7.3 Trouble Shooting Challenge 3Download
Verified
97Week 4 Lesson 7.4 Thats How we TroubleshootDownload
Verified
98Week 4 Lesson 8 Week SummaryDownload
Verified
99Course ClosureDownload
Verified
100Course CreditsDownload
Verified


Sl.No Language Book link
1EnglishDownload
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available