Computer Science and Engineering (197 Video Courses in 4 TB USB HDD)
NPTEL Course Link: https://nptel.ac.in/course.html
Distributed Under: CC-BY-SA 4.0 License
https://creativecommons.org/licenses/by-sa/4.0/
Copyright: Ministry of Education (Govt. of India), IIT(s), IISc
The amount charged is only for Copying/Distribution
(Storage Media + Copying Charges + Shipping + Taxes)
The NPTEL Video Lectures are not edited or repurposed
and distributed in as-is format in physical medium.
COMPUTER SCIENCE AND ENGINEERING
Download Full Courses List and Lecture Topics
NPTEL Video Courses List
No |
Course ID |
Lec |
Name of the NPTEL Video Course |
|
MP4 |
SRT |
SIZE |
1 |
40 |
Natural Language Processing |
Y |
Y |
Y |
31 |
|
2 |
34 |
Design and Analysis of Algorithms |
Y |
Y |
Y |
8.3 |
|
3 |
39 |
Software Engineering |
Y |
Y |
Y |
11 |
|
4 |
40 |
Computational Geometry |
Y |
Y |
Y |
26 |
|
5 |
39 |
Logic for CS |
Y |
Y |
Y |
31 |
|
6 |
38 |
Computer Architecture (Prof. Anshul Kumar) |
Y |
Y |
Y |
9.0 |
|
7 |
36 |
Data Structures And Algorithms |
Y |
Y |
Y |
9.3 |
|
8 |
35 |
Introduction to Computer Graphics |
Y |
Y |
Y |
7.7 |
|
9 |
40 |
Principles of Programming Languages |
Y |
Y |
Y |
9.8 |
|
10 |
34 |
Parallel Computing |
Y |
Y |
Y |
8.8 |
|
11 |
44 |
Design Verification and Test of Digital VLSI Circuits |
Y |
Y |
Y |
25 |
|
12 |
35 |
Computer Algorithms - 2 |
Y |
Y |
Y |
18 |
|
13 |
42 |
Theory of Computation |
Y |
Y |
Y |
20 |
|
14 |
24 |
Introduction to Problem Solving and Programming |
Y |
Y |
Y |
2.5 |
|
15 |
30 |
Riemann Hypothesis and its Applications |
Y |
Y |
Y |
6.9 |
|
16 |
26 |
Biometrics |
Y |
Y |
Y |
11 |
|
17 |
25 |
Parallel Algorithm |
Y |
Y |
Y |
13 |
|
18 |
36 |
Computer Architecture (Dr. Mainak Chaudhuri) |
Y |
Y |
Y |
15 |
|
19 |
30 |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Y |
Y |
Y |
12 |
|
20 |
59 |
NOC:Introduction to Programming in C |
Y |
Y |
Y |
3.1 |
|
21 |
41 |
Cryptography and Network Security |
Y |
Y |
Y |
19 |
|
22 |
41 |
High Performance Computer Architecture |
Y |
Y |
Y |
11 |
|
23 |
40 |
Low Power VLSI Circuits and Systems |
Y |
Y |
Y |
19 |
|
24 |
40 |
Real Time Systems |
Y |
Y |
Y |
8.1 |
|
25 |
40 |
Artificial Intelligence (Prof. S. Sarkar, Prof. Anupam Basu) |
Y |
Y |
Y |
8.8 |
|
26 |
28 |
Artificial Intelligence (Prof.P. Dasgupta) |
Y |
Y |
Y |
7.6 |
|
27 |
40 |
Computer Networks |
Y |
Y |
Y |
12 |
|
28 |
41 |
Data Communication |
Y |
Y |
Y |
9.4 |
|
29 |
35 |
Electronic Design Automation |
Y |
Y |
Y |
7.5 |
|
30 |
40 |
Internet Technology |
Y |
Y |
Y |
12 |
|
31 |
32 |
Programming and Data Structure |
Y |
Y |
Y |
4.8 |
|
32 |
43 |
Pattern Recognition |
Y |
Y |
Y |
19 |
|
33 |
42 |
Performance Evaluation of Computer Systems |
Y |
Y |
Y |
17 |
|
34 |
42 |
Theory of Automata, Formal Languages and Computation |
Y |
Y |
Y |
19 |
|
35 |
43 |
Computer Graphics |
Y |
Y |
Y |
11 |
|
36 |
33 |
Computer Organization |
Y |
Y |
Y |
7.6 |
|
37 |
43 |
Database Design |
Y |
Y |
Y |
12 |
|
38 |
40 |
Discrete Mathematical Structures |
Y |
Y |
Y |
11 |
|
39 |
48 |
Artificial Intelligence (Prof. Deepak Khemani) |
Y |
Y |
Y |
36 |
|
40 |
61 |
NOC:Programming, Data Structures and Algorithms |
Y |
Y |
Y |
13 |
|
41 |
65 |
NOC:Introduction to Information Security I |
Y |
Y |
Y |
8.8 |
|
42 |
18 |
NOC:Programming and Data structures (PDS) |
Y |
Y |
Y |
3.2 |
|
43 |
56 |
NOC:Design and Analysis of Algorithms |
Y |
Y |
Y |
2.2 |
|
44 |
55 |
NOC:Programming, Data Structures and Algorithms (Aricent) |
--- |
Y |
Y |
5.2 |
|
45 |
41 |
Combinatorics |
Y |
Y |
Y |
12 |
|
46 |
50 |
Compiler Design (Prof. Y.N. Srikanth) |
Y |
Y |
Y |
18 |
|
47 |
40 |
Graph Theory |
Y |
Y |
Y |
19 |
|
48 |
41 |
High Performance Computing |
Y |
Y |
Y |
16 |
|
49 |
41 |
Numerical Optimization |
Y |
Y |
Y |
11 |
|
50 |
43 |
Storage Systems |
Y |
Y |
Y |
12 |
|
51 |
40 |
System Analysis and Design |
Y |
Y |
Y |
11 |
|
52 |
46 |
Principles of Compiler Design |
Y |
Y |
Y |
13 |
|
53 |
33 |
NOC:Computer Architecture |
Y |
Y |
Y |
3.0 |
|
54 |
55 |
NOC:Model Checking |
Y |
Y |
Y |
2.2 |
|
55 |
28 |
NOC:Functional Programming in Haskell |
Y |
Y |
Y |
1.8 |
|
56 |
48 |
NOC:Fundamentals of Database Systems |
Y |
Y |
Y |
3.1 |
|
57 |
42 |
NOC:Information Security - II |
Y |
Y |
Y |
8.8 |
|
58 |
86 |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Y |
Y |
Y |
28 |
|
59 |
70 |
NOC:Artificial Intelligence: Knowledge Representation &Reasoning |
Y |
Y |
Y |
17 |
|
60 |
71 |
Virtual Reality |
--- |
Y |
Y |
20 |
|
61 |
48 |
NOC:Algorithms for Big Data |
Y |
Y |
--- |
11 |
|
62 |
21 |
NOC:Complex Network : Theory and Application |
Y |
Y |
Y |
5.1 |
|
63 |
52 |
NOC:Object-Oriented Analysis and Design |
Y |
Y |
Y |
12 |
|
64 |
44 |
NOC:Introduction to Machine Learning |
Y |
Y |
Y |
11 |
|
65 |
56 |
NOC:Programming in C++ |
Y |
Y |
Y |
13 |
|
66 |
20 |
NOC:Software Testing |
Y |
Y |
Y |
4.7 |
|
67 |
40 |
NOC:Theory of Computation |
Y |
Y |
Y |
3.7 |
|
68 |
20 |
NOC:Introduction to Cryptology |
Y |
Y |
Y |
5.4 |
|
69 |
18 |
NOC:Modern Algebra |
Y |
Y |
Y |
1.9 |
|
70 |
34 |
NOC:Privacy and Security in Online Social Networks |
Y |
Y |
Y |
5.5 |
|
71 |
45 |
NOC:Programming, Data Structures and Algorithms in Python |
Y |
Y |
Y |
2.5 |
|
72 |
39 |
NOC:Introduction to Operating Systems |
Y |
Y |
Y |
13 |
|
73 |
39 |
NOC:Mobile Computing |
Y |
Y |
Y |
4.6 |
|
74 |
64 |
NOC:Reinforcement Learning |
Y |
Y |
Y |
36 |
|
75 |
37 |
NOC:Introduction to Modern Application Development |
Y |
Y |
Y |
1.4 |
|
76 |
20 |
Fundamental Algorithms:Design and Analysis |
Y |
Y |
Y |
5.2 |
|
77 |
42 |
NOC:AI:Constraint Satisfaction |
Y |
Y |
Y* |
31 |
|
78 |
33 |
NOC:Computer Architecture |
Y |
Y |
Y |
12 |
|
79 |
60 |
NOC:Information Security-3 |
Y |
Y |
Y |
20 |
|
80 |
40 |
NOC:Wireless Ad Hoc and Sensor Networks |
Y |
Y |
Y |
9.9 |
|
81 |
65 |
NOC:Natural Language Processing |
Y |
Y |
Y |
16 |
|
82 |
64 |
NOC:VLSI Physical Design |
Y |
Y |
Y |
17 |
|
83 |
49 |
NOC:Embedded Systems Design |
Y |
Y |
Y |
8.5 |
|
84 |
60 |
NOC:InterNetwork Security |
Y |
Y |
Y |
15 |
|
85 |
64 |
NOC:Computer Architecture and Organization |
Y |
Y |
Y |
18 |
|
86 |
60 |
NOC:Introduction to Algorithms and Analysis |
Y |
Y |
Y |
15 |
|
87 |
41 |
NOC:Hardware Modeling using Verilog |
Y |
Y |
Y |
11 |
|
88 |
60 |
NOC:Introduction to Internet of Things |
Y |
Y |
Y |
13 |
|
89 |
40 |
NOC:Cloud Computing |
Y |
Y |
Y |
8.7 |
|
90 |
60 |
NOC:Software Testing |
Y |
Y |
Y |
28 |
|
91 |
52 |
NOC:Computer Organization |
Y |
Y |
Y |
23 |
|
92 |
56 |
NOC:Introduction to Wireless and Cellular Communications |
Y |
Y |
Y |
40 |
|
93 |
37 |
NOC:Introduction to Parallel Programming in OpenMP |
Y |
Y |
Y |
3.8 |
|
94 |
27 |
NOC:Distributed Systems |
Y |
Y |
Y |
2.6 |
|
95 |
166 |
NOC:Social Networks |
Y |
Y |
Y |
43 |
|
96 |
20 |
NOC:Real Time Operating System |
Y |
Y |
Y |
5.0 |
|
97 |
26 |
NOC:An Introduction to Probability in Computing |
Y |
Y |
Y |
8.5 |
|
98 |
23 |
NOC:Advanced Graph Theory |
Y |
Y |
Y |
11 |
|
99 |
40 |
NOC:Introduction to Soft Computing |
Y |
Y |
Y |
10 |
|
100 |
44 |
NOC:Data Mining |
Y |
Y |
Y |
11 |
|
101 |
42 |
NOC:Data Base Management System |
Y |
Y |
Y |
13 |
|
102 |
28 |
NOC:Introduction to Human Computer Interaction |
Y |
Y |
Y |
12 |
|
103 |
60 |
NOC:Information Security - IV |
Y |
Y |
Y |
43 |
|
104 |
50 |
NOC:Data Science for Engineers |
Y |
Y |
Y |
15 |
|
105 |
39 |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Y |
Y |
Y |
9.8 |
|
106 |
61 |
NOC:Problem Solving through Programming in C |
Y |
Y |
Y |
15 |
|
107 |
26 |
NOC:Synthesis of Digital Systems |
Y |
Y |
Y |
27 |
|
108 |
22 |
NOC:Design and Pedagogy of the Introductory Programming Course |
Y |
Y |
Y |
17 |
|
109 |
37 |
NOC:Embedded Systems-Design Verification and Test |
Y |
Y |
Y |
14 |
|
110 |
29 |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Y |
Y |
Y |
12 |
|
111 |
21 |
NOC:Cloud Computing and Distributed Systems |
Y |
Y |
Y |
9.0 |
|
112 |
60 |
NOC:Software Engineering |
Y |
Y |
Y |
15 |
|
113 |
60 |
NOC:Computer Networks and Internet Protocol |
Y |
Y |
Y |
15 |
|
114 |
60 |
NOC:Blockchain Architecture Design and Use Cases |
Y |
Y |
Y |
32 |
|
115 |
60 |
NOC:Switching Circuits and Logic Design |
Y |
Y |
Y |
15 |
|
116 |
40 |
NOC:Scalable Data Science |
Y |
Y |
Y |
8.0 |
|
117 |
226 |
NOC:The Joy of Computing using Python |
Y |
Y |
Y |
44 |
|
118 |
465 |
NOC:Discrete Mathematics |
Y |
Y |
Y |
31 |
|
119 |
117 |
NOC:Deep Learning |
Y |
Y |
Y |
41 |
|
120 |
40 |
NOC:Randomized Algorithms |
Y |
Y |
Y |
28 |
|
121 |
37 |
NOC:Parallel Algorithms |
Y |
Y |
Y |
14 |
|
122 |
34 |
NOC:Big Data Computing |
Y |
Y |
Y |
14 |
|
123 |
61 |
NOC:Compiler Design |
Y |
Y |
Y |
16 |
|
124 |
60 |
NOC:Programming in Java |
Y |
Y |
Y |
17 |
|
125 |
60 |
NOC:Discrete Structures |
Y |
Y |
Y |
20 |
|
126 |
42 |
NOC:Embedded System Design with ARM |
Y |
Y |
Y |
9.6 |
|
127 |
60 |
NOC:Hardware Security |
Y |
Y |
Y |
16 |
|
128 |
65 |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Y |
Y |
Y |
25 |
|
129 |
60 |
NOC:Introduction to Automata, Languages and Computation |
Y |
Y |
Y |
15 |
|
130 |
77 |
NOC:Foundations to Computer Systems Design |
Y |
Y |
Y* |
121 |
|
131 |
106 |
NOC:Machine Learning for Engineering and Science Applications |
Y |
Y |
Y |
70 |
|
132 |
59 |
NOC:Information Security 5 - Secure Systems Engineering |
Y |
Y |
Y |
27 |
|
133 |
56 |
NOC:Multimodal Interaction |
Y |
Y |
Y |
30 |
|
134 |
37 |
NOC:Deep Learning - Part 2 |
Y |
Y |
Y |
18 |
|
135 |
50 |
NOC:Machine Learning, ML |
Y |
Y |
Y |
21 |
|
136 |
120 |
NOC:An Introduction to Programming Through C++ |
Y |
Y |
Y |
47 |
|
137 |
100 |
NOC:Demystifying Networking |
Y |
Y |
Y |
7.6 |
|
138 |
43 |
NOC:Discrete Mathematics |
Y |
Y |
Y |
26 |
|
139 |
33 |
NOC:Advanced Computer Architecture |
Y |
Y |
Y |
6.7 |
|
140 |
60 |
NOC:Operating System Fundamentals |
Y |
Y |
Y |
16 |
|
141 |
60 |
NOC:Deep Learning (2019) |
Y |
Y |
Y |
16 |
|
142 |
60 |
NOC:Computer Vision |
Y |
Y |
Y |
17 |
|
143 |
62 |
NOC:Ethical Hacking |
Y |
Y |
Y |
12 |
|
144 |
60 |
NOC:Software Project Management |
Y |
Y |
Y |
16 |
|
145 |
40 |
NOC:Spatial Innformatics |
Y |
Y |
Y |
12 |
|
146 |
22 |
NOC:C Programming and Assembly Language |
Y |
Y |
Y |
33 |
|
147 |
92 |
NOC:Applied Natural Language Processing |
Y |
Y |
Y |
69 |
|
148 |
40 |
NOC:Python for Data Science |
Y |
Y |
Y |
50 |
|
149 |
38 |
NOC:Practical Machine Learning with Tensorflow |
Y |
Y |
Y |
21 |
|
150 |
40 |
Y |
Y |
--- |
5.0 |
||
151 |
96 |
NOC:An Introduction to Artificial Intelligence |
Y |
Y |
Y |
24 |
|
152 |
24 |
NOC:Arithmetic Circuit Complexity |
Y |
Y |
Y |
21 |
|
153 |
60 |
NOC:Data Analytics with Python |
Y |
Y |
Y |
4.4 |
|
154 |
59 |
NOC:Foundations of Cryptography |
Y |
Y |
Y |
8.3 |
|
155 |
63 |
NOC:GPU Architectures and Programming |
Y |
Y |
Y |
13 |
|
156 |
29 |
NOC:Introduction to Blockchain Technology and Applications |
Y |
Y |
Y |
9.5 |
|
157 |
41 |
NOC:Introduction to Database Systems |
Y |
Y |
Y |
32 |
|
158 |
37 |
NOC:Modern Application Development (2020.S1) |
Y |
Y |
Y |
20 |
|
159 |
31 |
NOC:User-centric Computing for Human-Computer Interaction |
Y |
Y |
Y |
22 |
|
160 |
83 |
Y |
Y |
--- |
1.2 |
||
161 |
60 |
NOC:Bandit Algorithm (Online Machine Learning) |
--- |
Y |
--- |
37 |
|
162 |
32 |
NOC:Computer Graphics |
Y |
Y |
Y |
6.0 |
|
163 |
60 |
NOC:Data Structure and Algorithms using Java |
--- |
Y |
--- |
32 |
|
164 |
79 |
NOC:Deep Learning for Computer Vision |
--- |
Y |
Y |
6.1 |
|
165 |
60 |
NOC:Object Oriented System Development using UML, Java and Patterns |
Y |
Y |
Y |
19 |
|
166 |
95 |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Y |
Y |
--- |
11 |
|
167 |
41 |
NOC:Computational Complexity Theory |
--- |
Y |
--- |
9.5 |
|
168 |
26 |
NOC:Randomized Methods in Complexity |
--- |
Y |
--- |
5.4 |
|
169 |
72 |
NOC:Discrete Mathematics (IIITB) |
--- |
Y |
--- |
5.2 |
|
170 |
33 |
NOC:Advanced Computer Architecture |
--- |
Y |
--- |
3.6 |
|
171 |
43 |
NOC:C-Based VLSI Design |
--- |
Y |
--- |
5.6 |
|
172 |
61 |
NOC:Real-Time Systems |
--- |
Y |
--- |
5.5 |
|
173 |
60 |
NOC:Algorithms for Protein Modelling and Engineering |
--- |
Y |
--- |
7.0 |
|
174 |
63 |
NOC:Computational Complexity |
--- |
Y |
--- |
6.2 |
|
175 |
50 |
NOC:Parameterized Algorithms |
--- |
Y |
--- |
5.3 |
|
176 |
54 |
NOC:Getting Started with Competitive Programming |
--- |
Y |
--- |
1.9 |
|
177 |
25 |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
--- |
Y |
--- |
1.8 |
|
178 |
59 |
NOC:Secure Computation: Part I |
--- |
Y |
--- |
5.1 |
|
179 |
32 |
NOC:Probability for Computer Science |
--- |
Y |
--- |
4.7 |