Friday, 23 January 2026

Problem Solving using Analytics and Design Thinking - problem statements & viable solution framework

Sunday, 14 December 2025

Installation step failed: Select and install software - Work around

What exactly went wrong? (In simple words)

The error says:

“Installation step failed: Select and install software”

This step downloads Kali software packages from the internet.
The failure usually happens due to one of these reasons:

Tuesday, 9 December 2025

Introduction to Cybersecurity — What, Why, and Basics

Cybersecurity is the practice of protecting our digital world—our devices, networks, and data—from theft, damage, and misuse.

In today’s hyper-connected age, almost everything we do relies on technology—banking, education, healthcare, travel, shopping, and communication.


Sunday, 23 November 2025

πŸ” Cyber Safety & Digital Citizenship: A Responsibility We Can’t Ignore

In today's hyperconnected world, technology has seamlessly woven itself into our daily lives. From online classrooms and digital assignments to video streaming, banking, and social media—our digital identity has become just as significant as our real one. Yet, with convenience comes vulnerability. Cyber threats are rising faster than awareness, and sadly, most victims are not careless—just unaware.

This is especially true for teachers, students, and parents navigating the digital space without adequate training or protective strategies.

Thursday, 14 August 2025

Master Your Keyboard: Totally Free and Engaging Online Typing Tutors

In today’s digital world, typing efficiently is more essential than ever—whether you’re working, studying, or just staying connected online. But did you know that you don’t have to spend money to sharpen your typing skills? There are fantastic free online typing tutors designed to make learning interactive, fun, and effective for everyone, from kids to adults. Here’s a guide to the best totally free typing tutor apps and websites that will turn practice into play!


Monday, 28 July 2025

Oracle Apps Trainers wanted for Mumbai & Bengaluru for Sep 2025 - Training Program ToC

Send your profile with the details of similar trainings facilitated to jobs@compassclock.in

56 day training program Rs.500 ~ 1,500/ hr for training. Total of (70 hours softskill & Technical of 300 hours (upto Rs. 4,50.000) in 56 working days. 

The hourly fee is based on trainer's experience and subject knowledge 
          (Program start date End of August 2025)

Trainer from Mumbai & Bengaluru are preferred (Good Communication in English & regional language is a must)

Tuesday, 1 April 2025

Standard Deviation P and Standard Deviation S - SD

In Power BI, Standard Deviation P and Standard Deviation S refer to two different methods for calculating standard deviation, and they differ in the way they handle sample data versus population data. Here’s an overview of each:

1. Standard Deviation P (Population Standard Deviation)

  • Formula:

    Οƒ=(XiΞΌ)2N\sigma = \sqrt{\frac{\sum{(X_i - \mu)^2}}{N}}

Thursday, 27 March 2025

DATASETS FOR CASE STUDIES - MS Excel, MS PowerBI, Python, R and other Analytical visualization tools.


πŸ“‚ DATASETS FOR CASE STUDIES

Here are the datasets for the case studies and hands-on activities. These datasets are structured in text format for easy use with Power BI, Excel, and Python. You can connect this blog link to the application and access all the tables or copy and paste each table as required.





2 Days : Data Analytics Foundation & Classification of Analytics - CRIP-DM Model, Data Analysis Techniques & Visualization

MODULE 1: DATA ANALYSIS FOUNDATION

Session 1: Data Analysis Introduction

πŸ•’ Time: 1 Hour
🎯 Objective: Understand what Data Analysis is, its importance, and how it is used in decision-making.

πŸ”Ή Example:

  • A retail store analyses customer purchases to identify the best-selling products.
  • Netflix analyses user watch history to recommend movies.

Saturday, 22 March 2025

Cybersecurity Assessment - 4.4.2 Attacking What We Do Quiz


4.4.2 Attacking What We Do Quiz









Lab - Reading Server Logs

 

Objectives

Part 1: Reading Log Files with Cat, More, Less, and Tail

Part 2: Log Files and Syslog

Part 3: Log Files and Journalctl


Lab - Attacking MySQL database - CISCO Cybersecurity


Lab - Attacking a mySQL Database

Objectives

In this lab, you will view a PCAP file from a previous attack against a SQL database.
Part 1: Open Wireshark and load the PCAP file.
Part 2: View the SQL Injection Attack.
Part 3: The SQL Injection Attack continues…
Part 4: The SQL Injection Attack provides system information.
Part 5: The SQL Injection Attack and Table Information
Part 6: The SQL Injection Attack Concludes.

1.6.2 Cybersecurity Threats, Vulnerabilities, and Attacks Quiz






Tuesday, 18 March 2025

Cybersecurity - Website Vulnerability check - Working on Linux - Lab

πŸ” Phase 1: Basic Reconnaissance & Scanning (Legal & Passive Tools)

Here are some initial commands and techniques you can safely use to gather information.