Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Visual Studio: Creating a New VSTS Repository
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Data Manipulation Language
By jamiecchavez
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Social Engineering Attacks
By Joseph Wetzel
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Digital-to-Analog Converters
By Terry Bartelt
In this animated activity, learners examine how an electronic converter changes digital signals to analog signals. Sections of a synthesizer are identified, and the operation of a D/A converter is demonstrated.
Comparing Analog and Digital Signals
Learners compare animations of analog and digital data signals. A short quiz completes the activity.
Firewall: Network Address Translation/Port Address Translation
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how network address translation works.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
IT Project Management: Agile Scrum
By Kimberly Reed
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
CRC – Cyclic Redundancy Check
By Dawn Rohm
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
Domain Model
In this learning activity you'll examine how a large computer network is configured.
Clients and Servers
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
Dynamic Host Configuration Protocol
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Firewalls: Packet Filters
In this learning activity you'll create a packet filter.
How to Send an E-mail Message
By Beth Baar
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.