Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
An Overview of the Raspberry Pi
By Joseph Wetzel
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Visual Logic Basic Programming: Using Flow Charts
By Jason Vosters
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Instantiation: Constructing an Object
By Jay Stulo
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
IT Stress Management - Setting Goals
In this learning activity you'll explore how to set goals based on realistic expectations.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Value Types and Reference Types in the .Net Framework
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Pointers In C++
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
User Experience Design: What is User Experience Design?
By Kimberly Reed
In this learning activity you'll explore an overview of User Experience Design and recognize how User Experience Design (UXD) can make you a better designer.
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.