Denial of Service Attacks
By Joseph Wetzel
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
IT Project Management: Methodologies
By Kimberly Reed
You'll explore two unique project management methodologies for developing software.
By Terry Bartelt
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
Instantiation: Constructing an Object
By Jay Stulo
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
Window and Desktop Elements
By Dawn Matott
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.
User Experience Design: Fitts Law
In this activity, you'll learn how Fitt's Law applies to user experience design.
User Experience Design: Prototyping
In this learning activity, you'll explore the basics of prototyping for user experience design.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
High Speed Ethernet
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.