By Dennis Fontaine, Terry Bartelt
In this learning activity you'll explore bandwidth.
Firewalls: Packet Filters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll create a packet filter.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
Dynamic Host Configuration Protocol
By Terry Bartelt
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
Firewall: Network Address Translation/Port Address Translation
In this learning activity you'll examine how network address translation works.
Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Hexadecimal Numbering System
By Patrick Hoppe
In this learning activity you'll review the hexadecimal numbering system.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Visual Studio: Creating a New VSTS Repository
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
User Experience Design: User Experience Testing
By Kimberly Reed
In this learning activity, you'll be introduced to user experience testing.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.