IT-Cybersecurity: Red Team, Blue Team, and Cybersecurity Policies
Think like a hacker. Respond like a pro. In this module, you’ll experience a simulated breach and learn how red and blue teams handle the heat.
Protecting Data in the Real World
By Steve Ebben
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
Web Applications Attack
Know the threats. Block the breach. This module breaks down how common web attacks like SQL Injection and Cross-Site Scripting work—and how to stop them.
Disk Encryption Simulation
By Baeten
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
Bandwidth
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll explore bandwidth.
An Algorithm for Converting a Binary Number to a Decimal Number
By Kevin Ritzman
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Normalization – 1st Normal Form
By jamiecchavez
In this learning activity you'll explore and practice the first step in normalizing a database.
Variables in Computer Programming (C#)
By carlfranklin
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Go-Back-N ARQ
By Dawn Rohm
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Achieve Persistence on the Web
By Joseph Wetzel
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Routers: Logical Addresses
By Joseph Wetzel, Jeff Sonnleitner
In this learning activity you'll examine how logical addresses work. The IP address is the logical address assigned to a connection by the ISP or network administrator.
IP Addressing and Subnetting
By Terry Bartelt
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
User Experience Design: User Experience Testing
By Kimberly Reed
In this learning activity, you'll be introduced to user experience testing.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Components of a Data Center
By tkenton
In this learning activity you'll describe the typical components of a data center.
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.