IT Project Management: Combined Methodologies
By Kimberly Reed
Explore how to combine Waterfall and Agile methodologies for your next software development project.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
IP Addressing and Subnetting
By Terry Bartelt
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Intrusion Detection Systems
By Joseph Wetzel
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Instantiation: Constructing an Object
By Jay Stulo
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
High Speed Ethernet
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
Hexadecimal Numbering System
By Patrick Hoppe
In this learning activity you'll review the hexadecimal numbering system.
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Firewalls: Packet Filters
In this learning activity you'll create a packet filter.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Firewall: Network Address Translation/Port Address Translation
In this learning activity you'll examine how network address translation works.
Finding Factorials with Recursion
By Brett Sheleski
In this activity we will discover when recursion is the best solution for your computer programming task.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Excel: Locking Cell References
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
Dynamic Host Configuration Protocol
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
In this learning activity you'll examine how a large computer network is configured.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.