FTP - What You Need to Know
By Joseph Wetzel
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Variables in Computer Programming (JavaScript)
By carlfranklin
In this learning activity you'll review what a variable is, how to use variables in JavaScript, and how the computer works with variables.
Switches and Hubs
By Terry Bartelt
Learners view animations showing how hubs and switches work in local area network configurations.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
User Experience Design: Fitts Law
By Kimberly Reed
In this activity, you'll learn how Fitt's Law applies to user experience design.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
User Experience Design: What is Usability?
In this learning activity you'll explain how how Usability fits into User Experience Design.
Data Manipulation Language
By jamiecchavez
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
IT Stress Management - Root Cause
By mikhailvmatc
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
SEO - Site Organization and Structure
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
What is an Algorithm?
In this learning activity, we’ll learn what an algorithm is.
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.
CreateJS Cardioid
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
Customer Service Skills for IT Professionals - Controlling the Conversation
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.