IT Stress Management - Time Management
By mikhailvmatc
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Unshielded Twisted Pair Cables
By Terry Bartelt
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
Parameters and Arguments
By carlfranklin
In this learning activity, you’ll discover the difference between a parameter and an argument.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Visual Logic Basic Programming: Using Flow Charts
By Jason Vosters
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.
User Experience Design: Fitts Law
By Kimberly Reed
In this activity, you'll learn how Fitt's Law applies to user experience design.
IT Stress Management - Root Cause
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
User Experience Design: What is Usability?
In this learning activity you'll explain how how Usability fits into User Experience Design.
Variables in Computer Programming (JavaScript)
In this learning activity you'll review what a variable is, how to use variables in JavaScript, and how the computer works with variables.
Referential Integrity
By jamiecchavez
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.