This is especially true for teachers, students, and parents navigating the digital space without adequate training or protective strategies.
Technically Technical
Sunday, 23 November 2025
π Cyber Safety & Digital Citizenship: A Responsibility We Can’t Ignore
Tuesday, 18 November 2025
Best Cyber Coach - Digital Assests
Thursday, 14 August 2025
Master Your Keyboard: Totally Free and Engaging Online Typing Tutors
Monday, 28 July 2025
Oracle Apps Trainers wanted for Mumbai & Bengaluru for Sep 2025 - Training Program ToC
Send your profile with the details of similar trainings facilitated to jobs@compassclock.in
56 day training program Rs.500 ~ 1,500/ hr for training. Total of (70 hours softskill & Technical of 300 hours (upto Rs. 4,50.000) in 56 working days.
The hourly fee is based on trainer's experience and subject knowledge
(Program start date End of August 2025)
Trainer from Mumbai & Bengaluru are preferred (Good Communication in English & regional language is a must)
Monday, 9 June 2025
Tuesday, 1 April 2025
Standard Deviation P and Standard Deviation S - SD
1. Standard Deviation P (Population Standard Deviation)
-
Formula:
Thursday, 27 March 2025
DATASETS FOR CASE STUDIES - MS Excel, MS PowerBI, Python, R and other Analytical visualization tools.
π DATASETS FOR CASE STUDIES
2 Days : Data Analytics Foundation & Classification of Analytics - CRIP-DM Model, Data Analysis Techniques & Visualization
MODULE 1: DATA ANALYSIS FOUNDATION
Session 1: Data Analysis
Introduction
π Time: 1
Hour
π― Objective: Understand
what Data Analysis is, its importance, and how it is used in decision-making.
πΉ Example:
- A retail store analyses customer purchases to
identify the best-selling products.
- Netflix analyses user watch history to recommend movies.
Saturday, 22 March 2025
Lab - Reading Server Logs
Part 1: Reading Log Files with Cat, More, Less, and Tail
Part 2: Log Files and Syslog
Part 3: Log Files and Journalctl
Lab - Attacking MySQL database - CISCO Cybersecurity
Part 1: Open Wireshark and load the PCAP file.
Part 2: View the SQL Injection Attack.
Part 3: The SQL Injection Attack continues…
Part 4: The SQL Injection Attack provides system information.
Part 5: The SQL Injection Attack and Table Information
Part 6: The SQL Injection Attack Concludes.
Tuesday, 18 March 2025
Cybersecurity - Website Vulnerability check - Working on Linux - Lab
π Phase 1: Basic
Reconnaissance & Scanning (Legal & Passive Tools)
Here are some initial commands and techniques you can safely use to gather information.
Errors and fixes for VM workstation - Virtual Machine errors
Errors and its work arounds and fixes for Virtual Machine installation or execution
Virtual Machine - Aborted:Monday, 17 March 2025
MEC - Cybersecurity Gamification in Education
Gamification in EducationThrough gamification the students are motivated and their involvement and interaction is enhanced by segregating them into groups or teams and awarding them with points across various parameters like, punctuality, attendance, adherence to break timings, assignments, tasks, quiz, leadership ability, etc.
CrackStation: The Ultimate Password Cracking Tool for Cybersecurity
In today's digital world, password security is a crucial concern. Cybercriminals are constantly finding ways to breach online accounts using weak or stolen credentials. This is where CrackStation.net comes into play—a powerful online tool designed to crack password hashes using an extensive database of precomputed hashes.




