Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
Working with Zip Files
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
User Experience Design: What is Usability?
By Kimberly Reed
In this learning activity you'll explain how how Usability fits into User Experience Design.
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
User Experience Design: What is User Experience Design?
In this learning activity you'll explore an overview of User Experience Design and recognize how User Experience Design (UXD) can make you a better designer.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Programming in C++ Using Constants
In this learning activity you'll discover the const keyword and it’s uses in C++.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
IT Stress Management - Setting Goals
In this learning activity you'll explore how to set goals based on realistic expectations.
Instantiation: Constructing an Object
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.