-
About The Course 0
No items in this section -
[ IP ] Module 01:- Web Programming Fundamentals 6
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
Lecture2.6
-
-
[ IP ] Module 02:- JavaScript 25
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
Lecture3.8
-
Lecture3.9
-
Lecture3.10
-
Lecture3.11
-
Lecture3.12
-
Lecture3.13
-
Lecture3.14
-
Lecture3.15
-
Lecture3.16
-
Lecture3.17
-
Lecture3.18
-
Lecture3.19
-
Lecture3.20
-
Lecture3.21
-
Lecture3.22
-
Lecture3.23
-
Lecture3.24
-
Lecture3.25
-
-
[ IP ] Module 03 & 04- React Js & Advanced React Js 7
-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
-
[ IP ] Module 05 - Node Js 4
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
-
[ IP ] Module 06 - Express Js 3
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
-
[ IP ] Viva Question:- 4
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
-
[ CNS ] Module 01:- Introduction to Network Security & Cryptography 8
-
Lecture8.1
-
Lecture8.2
-
Lecture8.3
-
Lecture8.4
-
Lecture8.5
-
Lecture8.6
-
Lecture8.7
-
Lecture8.8
-
-
[ CNS ] Module 02:- Cryptography: Key management, Distribution and Use 12
-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
Lecture9.5
-
Lecture9.6
-
Lecture9.7
-
Lecture9.8
-
Lecture9.9
-
Lecture9.10
-
Lecture9.11
-
Lecture9.12
-
-
[ CNS ] Module 03:- Malicious Software 5
-
Lecture10.1
-
Lecture10.2
-
Lecture10.3
-
Lecture10.4
-
Lecture10.5
-
-
[ CNS ] Module 04:- IP Security, Transport level security and Email Se 4
-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
-
[ CNS ] Module 05:- Network Security Management 3
-
Lecture12.1
-
Lecture12.2
-
Lecture12.3
-
-
[ CNS ] Module 06:- System Security 3
-
Lecture13.1
-
Lecture13.2
-
Lecture13.3
-
-
[ CNS ] NOTES 9
-
[ CNS ] IMP 6
-
[ CNS ] Viva 7
-
[ CNS ] Extra 13
-
Lecture17.1
-
Lecture17.2
-
Lecture17.3
-
Lecture17.4
-
Lecture17.5
-
Lecture17.6
-
Lecture17.7
-
Lecture17.8
-
Lecture17.9
-
Lecture17.10
-
Lecture17.11
-
Lecture17.12
-
Lecture17.13
-
-
[ Entrepreneurship ] Module 1 : Introduction 4
-
Lecture18.1
-
Lecture18.2
-
Lecture18.3
-
Lecture18.4
-
-
[ Entrepreneurship ] Module 2 : Entrepreneurship Development and Leader 4
-
Lecture19.1
-
Lecture19.2
-
Lecture19.3
-
Lecture19.4
-
-
[ Entrepreneurship ] Module 3 : New Venture Planning 3
-
Lecture20.1
-
Lecture20.2
-
Lecture20.3
-
-
[ Entrepreneurship ] Module 4 : Financing & Managing Venture 5
-
Lecture21.1
-
Lecture21.2
-
Lecture21.3
-
Lecture21.4
-
Lecture21.5
-
-
[ Entrepreneurship ] Module 5 : Overview of E-Business 3
-
Lecture22.1
-
Lecture22.2
-
Lecture22.3
-
-
[ Entrepreneurship ] Module 6 : Strategic Initiatives for Technology 4
-
Lecture23.1
-
Lecture23.2
-
Lecture23.3
-
Lecture23.4
-
-
[ Entrepreneurship ] IMP 6
-
[ Software Engineering ] Module 1:- Introduction To Software Engineering and Process Models 10
-
Lecture25.1
-
Lecture25.2
-
Lecture25.3
-
Lecture25.4
-
Lecture25.5
-
Lecture25.6
-
Lecture25.7
-
Lecture25.8
-
Lecture25.9
-
Lecture25.10
-
-
[ Software Engineering ] Module 2:- Software Requirements Analysis and Modeling 4
-
Lecture26.1
-
Lecture26.2
-
Lecture26.3
-
Lecture26.4
-
-
[ Software Engineering ] Module 3:- Software Estimation Metrics 2
-
Lecture27.1
-
Lecture27.2
-
-
[ Software Engineering ] Module 4:- Software Design 6
-
Lecture28.1
-
Lecture28.2
-
Lecture28.3
-
Lecture28.4
-
Lecture28.5
-
Lecture28.6
-
-
[ Software Engineering ] Module 5:- Software Testing 6
-
Lecture29.1
-
Lecture29.2
-
Lecture29.3
-
Lecture29.4
-
Lecture29.5
-
Lecture29.6
-
-
[ Software Engineering ] Module 6:- Software Configuration Management, Quality Assurance and Maintenance 8
-
Lecture30.1
-
Lecture30.2
-
Lecture30.3
-
Lecture30.4
-
Lecture30.5
-
Lecture30.6
-
Lecture30.7
-
Lecture30.8
-
-
[ Software Engineering ] Notes:- Software Engineering Full Notes 1
-
Lecture31.1
-
-
[ Software Engineering ] Viva Question:- 1
-
Lecture32.1
-
-
[ Software Engineering ] Importance :- 6
-
Lecture33.1
-
Lecture33.2
-
Lecture33.3
-
Lecture33.4
-
Lecture33.5
-
Lecture33.6
-
-
[ Entrepreneurship ] Viva 7
This content is protected, please login and enroll course to view this content!
Prev
DOS and DDOS Attack
Next
Malware