Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Firewall: Network Address Translation/Port Address Translation
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how network address translation works.
IT Project Management: Waterfall Methodology
By Kimberly Reed
In this learning activity, you’ll explore the Waterfall model and its application to software development.
By Joseph Wetzel
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
By Terry Bartelt
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Test your knowledge of the most common network protocol acronyms.
IT Security Acronyms 1
Test your knowledge of acronyms related to IT security.
Windows Server 2012
You'll be introduced to the Windows 2012 Server.
Creative Commons Attribution-NonCommercial 4.0 International License.
Learn more about the license »