IT Stress Management - Root Cause
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
What is an Algorithm?
In this learning activity, we’ll learn what an algorithm is.
SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
User Experience Design: What is Usability?
By Kimberly Reed
In this learning activity you'll explain how how Usability fits into User Experience Design.
User Experience Design: Testing
In this learning activity, you will learn about testing for user experience design.
Unshielded Twisted Pair Cables
By Terry Bartelt
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
User Experience Design: Fitts Law
In this activity, you'll learn how Fitt's Law applies to user experience design.
User Experience Design: Prototyping
In this learning activity, you'll explore the basics of prototyping for user experience design.
SEO - A Brief Overview
This learning activity provides an overview of Search Engine Optimization, or SEO.
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Attributes of a Class: Fields and Properties
By Ryan Appel
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Programming in C++ Using Constants
In this learning activity you'll discover the const keyword and it’s uses in C++.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Window 10 and Desktop Elements
By Dawn Matott
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.