Tuesday, 1 April 2025

Standard Deviation P and Standard Deviation S - SD

In Power BI, Standard Deviation P and Standard Deviation S refer to two different methods for calculating standard deviation, and they differ in the way they handle sample data versus population data. Here’s an overview of each:

1. Standard Deviation P (Population Standard Deviation)

  • Formula:

    σ=(Xiμ)2N\sigma = \sqrt{\frac{\sum{(X_i - \mu)^2}}{N}}

Thursday, 27 March 2025

DATASETS FOR CASE STUDIES - MS Excel, MS PowerBI, Python, R and other Analytical visualization tools.


📂 DATASETS FOR CASE STUDIES

Here are the datasets for the case studies and hands-on activities. These datasets are structured in text format for easy use with Power BI, Excel, and Python. You can connect this blog link to the application and access all the tables or copy and paste each table as required.





2 Days : Data Analytics Foundation & Classification of Analytics - CRIP-DM Model, Data Analysis Techniques & Visualization

MODULE 1: DATA ANALYSIS FOUNDATION

Session 1: Data Analysis Introduction

🕒 Time: 1 Hour
🎯 Objective: Understand what Data Analysis is, its importance, and how it is used in decision-making.

🔹 Example:

  • A retail store analyses customer purchases to identify the best-selling products.

  • Netflix analyses user watch history to recommend movies.

Saturday, 22 March 2025

Cybersecurity Assessment - 4.4.2 Attacking What We Do Quiz


4.4.2 Attacking What We Do Quiz









Lab - Reading Server Logs

 

Objectives

Part 1: Reading Log Files with Cat, More, Less, and Tail

Part 2: Log Files and Syslog

Part 3: Log Files and Journalctl


Lab - Attacking MySQL database - CISCO Cybersecurity


Lab - Attacking a mySQL Database

Objectives

In this lab, you will view a PCAP file from a previous attack against a SQL database.
Part 1: Open Wireshark and load the PCAP file.
Part 2: View the SQL Injection Attack.
Part 3: The SQL Injection Attack continues…
Part 4: The SQL Injection Attack provides system information.
Part 5: The SQL Injection Attack and Table Information
Part 6: The SQL Injection Attack Concludes.

1.6.2 Cybersecurity Threats, Vulnerabilities, and Attacks Quiz






Tuesday, 18 March 2025

Monday, 17 March 2025

MEC - Cybersecurity Gamification in Education

Gamification in Education
Through gamification the students are motivated and their involvement and interaction is enhanced by segregating them into groups or teams and awarding them with points across various parameters like, punctuality, attendance, adherence to break timings, assignments, tasks, quiz, leadership ability, etc.

CrackStation: The Ultimate Password Cracking Tool for Cybersecurity

In today's digital world, password security is a crucial concern. Cybercriminals are constantly finding ways to breach online accounts using weak or stolen credentials. This is where CrackStation.net comes into play—a powerful online tool designed to crack password hashes using an extensive database of precomputed hashes.


Saturday, 15 March 2025

Exploring CrypTool: Your Gateway to Cryptographic Education

In the evolving landscape of cybersecurity and cryptography, having access to reliable educational resources is crucial for students, researchers, and professionals alike. CrypTool (CT) stands out as a powerful, open-source platform designed to demystify cryptographic concepts through interactive learning. If you’re eager to dive into encryption, decryption, and cryptanalysis, CrypTool provides an excellent foundation.

Thursday, 13 March 2025

Compass Animations React Code on Blogger

Compass Trial code Animations