Normalization – 2nd Normal Form
By jamiecchavez
In this activity you'll practice designing a table in second normal form.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Variables in Computer Programming (C#)
By carlfranklin
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Bandwidth
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll explore bandwidth.
Secure Data Erasure
By Baeten
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.
Protecting Data in the Real World
By Steve Ebben
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
JOINs (Inner, Left, Right, Full)
In this learning activity, you’ll explore four different types of JOINs and understand how they help programmers produce readable reports.
Web Applications Attack
Know the threats. Block the breach. This module breaks down how common web attacks like SQL Injection and Cross-Site Scripting work—and how to stop them.
IT-Cybersecurity: Red Team, Blue Team, and Cybersecurity Policies
Think like a hacker. Respond like a pro. In this module, you’ll experience a simulated breach and learn how red and blue teams handle the heat.