-
Course Overview 0
No items in this section -
[SEPM] - Importance Solutions Notes - Modulewise 6
-
[ SEPM ] [Module 1]:- Introduction To Software Engineering and Process Models 10
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
Lecture3.8
-
Lecture3.9
-
Lecture3.10
-
-
[ SEPM ] [Module 2]:- Requirements Analysis and Cost Estimation 5
-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
-
[ SEPM ] [Module 3]:- Software Risk and Configuration Management 8
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
Lecture5.6
-
Lecture5.7
-
Lecture5.8
-
-
[ SEPM ] [Module 4]:- Software Testing and Maintenance 6
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
-
[ SEPM ] IT Project Management and Project Scheduling 4
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
-
[ SEPM ] Software Engineering Importance (OLD) 7
-
Lecture8.1
-
Lecture8.2
-
Lecture8.3
-
Lecture8.4
-
Lecture8.5
-
Lecture8.6
-
Lecture8.7
-
-
[ SEPM ] Software Engineering Viva Question 6
-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
Lecture9.5
-
Lecture9.6
-
-
[ SEPM ] Software Engineering Notes 2
-
Lecture10.1
-
Lecture10.2
-
-
[ ML ] [Module 1]:- Introduction to Machine Learning 5
-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
Lecture11.5
-
-
[ ML ] [Module 2]:- Mathematical Foundation for ML 2
-
Lecture12.1
-
Lecture12.2
-
-
[ ML ] [Module 3]:- Linear Models 4
-
Lecture13.1
-
Lecture13.2
-
Lecture13.3
-
Lecture13.4
-
-
[ ML ] [Module 4]:- Clustering 2
-
Lecture14.1
-
Lecture14.2
-
-
[ ML ] [Module 5]:- CLassification 9
-
Lecture15.1
-
Lecture15.2
-
Lecture15.3
-
Lecture15.4
-
Lecture15.5
-
Lecture15.6
-
Lecture15.7
-
Lecture15.8
-
Lecture15.9
-
-
[ ML ] [Module 6]:- Dimensionality Reduction 4
-
Lecture16.1
-
Lecture16.2
-
Lecture16.3
-
Lecture16.4
-
-
[ML] Notes + IMP Soln 2025 6
-
Lecture17.1
-
Lecture17.2
-
Lecture17.3
-
Lecture17.4
-
Lecture17.5
-
Lecture17.6
-
-
[ CNS ] Module 01:- Introduction to Network Security & Cryptography 11
-
Lecture18.1
-
Lecture18.2
-
Lecture18.3
-
Lecture18.4
-
Lecture18.5
-
Lecture18.6
-
Lecture18.7
-
Lecture18.8
-
Lecture18.9
-
Lecture18.10
-
Lecture18.11
-
-
[ CNS ] Module 02:- Block Cipher and Public Key Cryptography 11
-
Lecture19.1
-
Lecture19.2
-
Lecture19.3
-
Lecture19.4
-
Lecture19.5
-
Lecture19.6
-
Lecture19.7
-
Lecture19.8
-
Lecture19.9
-
Lecture19.10
-
Lecture19.11
-
-
[ CNS ] Module 03:- Cryptographic Hashes, Message Digests - Digita 6
-
Lecture20.1
-
Lecture20.2
-
Lecture20.3
-
Lecture20.4
-
Lecture20.5
-
Lecture20.6
-
-
[ CNS ] Module 04:- Digital Signature Schemes & Authentication 4
-
Lecture21.1
-
Lecture21.2
-
Lecture21.3
-
Lecture21.4
-
-
[ CNS ] Module 05:-M5 - System Security 5
-
Lecture22.1
-
Lecture22.2
-
Lecture22.3
-
Lecture22.4
-
Lecture22.5
-
-
[ CNS ] Module 6 - Web Security 6
-
Lecture23.1
-
Lecture23.2
-
Lecture23.3
-
Lecture23.4
-
Lecture23.5
-
Lecture23.6
-
-
[ DAV ] [ Module 1 ] : Introduction to Data Analytics and Lifecycle 1
-
Lecture24.1
-
-
[ DAV ] [ Module 2 ] : Regression Model 3
-
Lecture25.1
-
Lecture25.2
-
Lecture25.3
-
-
[ DAV ] [ Module 3 ] : Time Series Analysis 4
Coming Soon
-
Lecture26.1
-
Lecture26.2
-
Lecture26.3
-
Lecture26.4
-
-
[ DAV ] [ Module 4 ] : Text Analytics 2
-
Lecture27.1
-
Lecture27.2
-
-
[ DAV ] [ Module 5 ] : Data analytics and visualization with R 12
-
Lecture28.1
-
Lecture28.2
-
Lecture28.3
-
Lecture28.4
-
Lecture28.5
-
Lecture28.6
-
Lecture28.7
-
Lecture28.8
-
Lecture28.9
-
Lecture28.10
-
Lecture28.11
-
Lecture28.12
-
-
[ DAV ] Notes 6
-
Module wise Imp 3
-
Lecture30.1
-
Lecture30.2
-
Lecture30.3
-