Modules / Lectures


New Assignments
Module NameDownload
noc19_cs25-assessmentid-101noc19_cs25-assessmentid-101
noc19_cs25-assessmentid-102noc19_cs25-assessmentid-102
noc19_cs25-assessmentid-75noc19_cs25-assessmentid-75
noc19_cs25-assessmentid-77noc19_cs25-assessmentid-77
noc19_cs25-assessmentid-85noc19_cs25-assessmentid-85
noc19_cs25-assessmentid-88noc19_cs25-assessmentid-88
noc19_cs25-assessmentid-90noc19_cs25-assessmentid-90
noc19_cs25-assessmentid-92noc19_cs25-assessmentid-92
noc19_cs25-assessmentid-93noc19_cs25-assessmentid-93
noc19_cs25-assessmentid-94noc19_cs25-assessmentid-94
noc19_cs25-assessmentid-95noc19_cs25-assessmentid-95


Sl.No Chapter Name MP4 Download
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload

Sl.No Chapter Name English
1Week 1.1 Intro to CourseDownload
Verified
2Week 1.2 IntroToCourseDownload
Verified
3Week 1.3 IncidentsDownload
Verified
4Tutorial 1 Part 1 UbuntuDownload
Verified
5Tutorial 1 Part 2 PythonDownload
Verified
6Week 2.1 OSM APIs and tools for data collectionDownload
Verified
7Tutorial 2 Part 1 Facebook APIDownload
Verified
8Tutorial 2 Part 2 Facebook APIDownload
Verified
9Week-2.2 Trust and Credibility on OSMDownload
Verified
10Week 3.1 Misinformation on Social MediaDownload
Verified
11Week 3.2 Privacy and Social MediaDownload
Verified
12Tutorial 3 Part 1 Twitter API Download
Verified
13Tutorial 3 Part 2 MySQLDownload
Verified
14Tutorial 3 Part 3 MongoDBDownload
Verified
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
Verified
16Week-5.1 Policing and Online Social MediaDownload
Verified
17Week-5.2 Policing and Online Social MediaDownload
Verified
18Week 5.3 Policing and Online Social MediaDownload
Verified
19Week 6.1: eCrime on Online Social MediaDownload
Verified
20Week 6.2 eCrime on Online Social MediaDownload
Verified
21Tutorial 4 Social Network AnalysisDownload
Verified
22Week-7.1: Link Farming in Online Social Media Download
Verified
23Week-7.2: NudgesDownload
Verified
24Week-7.3: Semantic attacks: Spear phishingDownload
Verified
25Tutorial 5: Analyzing text using Python NLTKDownload
Verified
26Week 8.1: Profile Linking on Online Social MediaDownload
Verified
27Week 8.2: Anonymous NetworksDownload
Verified
28Tutorial 6: Gephi Network VisualizationDownload
Verified
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
Verified
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
Verified
31Tutorial 7: Visualization - HighchartsDownload
Verified
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
Verified
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
Verified
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Verified
Sl.No Chapter Name Bengali
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Sl.No Chapter Name Gujarati
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Sl.No Chapter Name Hindi
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Sl.No Chapter Name Kannada
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Sl.No Chapter Name Malayalam
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Sl.No Chapter Name Marathi
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Sl.No Chapter Name Tamil
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload
Sl.No Chapter Name Telugu
1Week 1.1 Intro to CourseDownload
2Week 1.2 IntroToCourseDownload
3Week 1.3 IncidentsDownload
4Tutorial 1 Part 1 UbuntuDownload
5Tutorial 1 Part 2 PythonDownload
6Week 2.1 OSM APIs and tools for data collectionDownload
7Tutorial 2 Part 1 Facebook APIDownload
8Tutorial 2 Part 2 Facebook APIDownload
9Week-2.2 Trust and Credibility on OSMDownload
10Week 3.1 Misinformation on Social MediaDownload
11Week 3.2 Privacy and Social MediaDownload
12Tutorial 3 Part 1 Twitter API Download
13Tutorial 3 Part 2 MySQLDownload
14Tutorial 3 Part 3 MongoDBDownload
15Week-4.1 Privacy and Pictures on Online Social MediaDownload
16Week-5.1 Policing and Online Social MediaDownload
17Week-5.2 Policing and Online Social MediaDownload
18Week 5.3 Policing and Online Social MediaDownload
19Week 6.1: eCrime on Online Social MediaDownload
20Week 6.2 eCrime on Online Social MediaDownload
21Tutorial 4 Social Network AnalysisDownload
22Week-7.1: Link Farming in Online Social Media Download
23Week-7.2: NudgesDownload
24Week-7.3: Semantic attacks: Spear phishingDownload
25Tutorial 5: Analyzing text using Python NLTKDownload
26Week 8.1: Profile Linking on Online Social MediaDownload
27Week 8.2: Anonymous NetworksDownload
28Tutorial 6: Gephi Network VisualizationDownload
29Week 9.1: Privacy in Location Based Social Networks Part 1Download
30Week 9.2: Privacy in Location Based Social Networks Part 2Download
31Tutorial 7: Visualization - HighchartsDownload
32Week 10.1: Beware of What You Share Inferring Home Location in Social NetworksDownload
33Week 10.2: On the dynamics of username change behavior on TwitterDownload
34Week 10.3: Boston Marathon Analyzing Fake Content on TwitterDownload


Sl.No Language Book link
1EnglishDownload
2BengaliDownload
3GujaratiDownload
4HindiDownload
5KannadaDownload
6MalayalamDownload
7MarathiDownload
8TamilDownload
9TeluguDownload