SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
User Experience Design: Prototyping
By Kimberly Reed
In this learning activity, you'll explore the basics of prototyping for user experience design.
By Terry Bartelt
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
IT Stress Management - Root Cause
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
User Experience Design: Fitts Law
In this activity, you'll learn how Fitt's Law applies to user experience design.
User Experience Design: Testing
In this learning activity, you will learn about testing for user experience design.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
User Experience Design: What is Usability?
In this learning activity you'll explain how how Usability fits into User Experience Design.
In this activity, you will explore what web analytics are and how to use them for site optimization.
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
High Speed Ethernet
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Attributes of a Class: Fields and Properties
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.