User Experience Design: What is User Experience Design?
By Kimberly Reed
In this learning activity you'll explore an overview of User Experience Design and recognize how User Experience Design (UXD) can make you a better designer.
Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Working with Zip Files
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
User Experience Design: What is Usability?
In this learning activity you'll explain how how Usability fits into User Experience Design.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
JOINs (Inner, Left, Right, Full)
In this learning activity, you’ll explore four different types of JOINs and understand how they help programmers produce readable reports.
User Experience Design: Prototyping
In this learning activity, you'll explore the basics of prototyping for user experience design.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Customer Service Skills for IT Professionals - Controlling the Conversation
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Attributes of a Class: Fields and Properties
By Ryan Appel
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Finding Factorials with Recursion
By Brett Sheleski
In this activity we will discover when recursion is the best solution for your computer programming task.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.