An Overview of the Raspberry Pi
By Joseph Wetzel
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Visual Logic Basic Programming: Using Flow Charts
By Jason Vosters
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Instantiation: Constructing an Object
By Jay Stulo
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
IT Stress Management - Setting Goals
In this learning activity you'll explore how to set goals based on realistic expectations.
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Value Types and Reference Types in the .Net Framework
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Pointers In C++
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
IT Project Management: Methodologies
By Kimberly Reed
You'll explore two unique project management methodologies for developing software.
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.