By Terry Bartelt
You need to be logged in to use this feature.
Log In or Register
Learners examine how metal detectors function. This object includes animation and sound.
In this animated lesson, learners examine how a VPN “tunnel” allows encrypted data to be transmitted over the Internet.
In this animated activity, learners examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Test your knowledge of the most common network protocol acronyms.
You'll test your familiarity with some commonplace Linux acronyms.
You'll be introduced to categories of attackers who target computer systems and networks.