Curriculum
- 18 Sections
- 135 Lessons
- 34 Weeks
Expand all sectionsCollapse all sections
- Introduction to Machine Learning4
- Learning with Regression and Trees - Machine Learning5
- Learning with Classification and clustering - Machine Learning13
- 4.1Bayesian Belief Network9 Minutes
- 4.2Bayes Theorem and Naive Bayes Classifier8 Minutes
- 4.3Markov Models
- 4.4Hidden Markov Model11 Minutes
- 4.5Support Vector Machine10 Minutes
- 4.6K mean Clustering Algorithm12 Minutes
- 4.7Apriori Algorithm with solved Example12 Minutes
- 4.8Agglomerative Algorithm with solved Example Part #113 Minutes
- 4.9Agglomerative Algorithm with solved Example Part #25 Minutes
- 4.10FP Tree Algorithm with Solved Example15 Minutes
- 4.11Hidden Markov model Basic Part 110 Minutes
- 4.12Hidden Markov model Basic Part 27 Minutes
- 4.13Hidden Markov model Basic Part 38 Minutes
- Dimensionality Reduction - Machine Learning5
- Introduction to Neural Network - Machine Learning13
- 6.1Introduction to ANN and structure of ANN6 Minutes
- 6.2Activation functions in ANN (Discrete and Continuous)4 Minutes
- 6.3Neural Network Architecture5 Minutes
- 6.4Linear Separability4 Minutes
- 6.5Mc-Culloch-Pitts Neural Model3 Minutes
- 6.6Hebbs Network/Hebbian Learning (with solved example)17 Minutes
- 6.7Winners-Takes-All5 Minutes
- 6.8Self Organizing Maps and KSOMs10 Minutes
- 6.9Linear Vector Quantization (LVQs)5 Minutes
- 6.10Derivation of Unipolar Continuous Function.7 Minutes
- 6.11Derivation of Bipolar Continuous Function11 Minutes
- 6.12Perceptron Learning (with solved example)11 Minutes
- 6.13Backpropagation Network (with solved example)19 Minutes
- Introduction to Optimization Techniques - Machine Learning7
- Machine Learning - Notes8
- Data Warehouse and Data Mining INDEX29
- 9.1Introduction to Data Warehouse11 Minutes
- 9.2Meta Data5 Minutes
- 9.3Data Mart6 Minutes
- 9.4Architecture of data warehouse7 Minutes
- 9.5How to draw star schema10 Minutes
- 9.6Olap operation8 Minutes
- 9.7OLAP VS OLTP8 Minutes
- 9.8K Mean8 Minutes
- 9.9Introduction to data mining10 Minutes
- 9.10Naive Bayes 1
- 9.11Apriori algorithm12 Minutes
- 9.12Agglomerative clustering13 Minutes
- 9.13KDD9 Minutes
- 9.14ETL9 Minutes
- 9.15FP Tree15 Minutes
- 9.16Decision Tree
- 9.17K Medoid21 Minutes
- 9.18Naive Bayes 225 Minutes
- 9.19Agglomerative Adjacency Matrix5 Minutes
- 9.20DBSCAN4 Minutes
- 9.21Design Strategy of Data warehouse and Data Mining12 Minutes
- 9.22Types of Attribute for Data Exploration9 Minutes
- 9.23K mean clustering Sum – Type 2 where K=223 Minutes
- 9.24Data Pre-processing Part 117 Minutes
- 9.25Data Pre-processing Part 29 Minutes
- 9.26Data Visualization Part 111 Minutes
- 9.27Data Visualization Part 2
- 9.28Schema Design – Dimension Modeling Part 116 Minutes
- 9.29Schema Design – Dimension Modeling Part 211 Minutes
- Data Warehouse and Data Mining - Notes1
- Introduction - Cryptography and System Security7
- Symmetric and Asymmetric key Cryptography and key Management - Cryptography and System Security9
- 12.1Stream and Block Cipher4 Minutes
- 12.2DES Algorithm Full Working12 Minutes
- 12.3DES key Generation Explain Step by Step11 Minutes
- 12.4AES Algorithm Full working26 Minutes
- 12.5Modes of Operation8 Minutes
- 12.6Public Key cryptogrpahy3 Minutes
- 12.7RSA Algorithm with Solved Example14 Minutes
- 12.8Diffie Hellman7 Minutes
- 12.9How to find modulus of Exponential Number (high power value )12 Minutes
- Hashes, Message Digests and Digital Certificates - Cryptography and System Security4
- Authentication Protocols & Digital signature schemes - Cryptography and System Security2
- Network Security and Applications - Cryptography and System Security6
- System Security - Cryptography and System Security4
- Extra - Cryptography and System Security8
- 17.1IDEA Algorithm Full Working14 Minutes
- 17.2Blowfish Algorithm Full working13 Minutes
- 17.3Confusion and Diffusion2 Minutes
- 17.4Meet in the Middle3 Minutes
- 17.5Phishing Attack11 Minutes
- 17.6Session Hijacking and Spoofing Attack11 Minutes
- 17.7OS Security Memory and Address Protection11 Minutes
- 17.8E commerce Security and Payment gateway9 Minutes
- Cryptography and System Security - Notes9
- 18.1Index
- 18.2Module 1 ( Introduction to Cryptography )
- 18.3Module 2 ( Basics of Cryptography )
- 18.4Module 3 ( Secret Key Cryptography )
- 18.5Module 4 ( Public Key Cryptography )
- 18.6Module 5 ( Cryptographic Hash Function )
- 18.7Module 6 ( Authentication Application )
- 18.8Module 7 ( Security and Firewalls)
- 18.9Module 8 ( IP Security )
- Software Engineering Full Notes1
Module 8 ( IP Security )
Prev