Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Cross-Site Scripting Defined
By Joseph Wetzel
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Firewalls: Packet Filters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll create a packet filter.
The Ethernet Frame
By Terry Bartelt
Learners view the seven segments of an Ethernet frame and the types of information each represents.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
IT Security Acronyms 1
Test your knowledge of acronyms related to IT security.
Basic Internet concepts for kids
Test your knowledge of the most common network protocol acronyms.
Creative Commons Attribution-NonCommercial 4.0 International License.
Learn more about the license »