Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Customer Service Skills for IT Professionals - Controlling the Conversation
By Kimberly Reed
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
User Experience Design: Usability Research Methods
In this learning activity, you'll be introduced to three common usability research methods.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
SEO - A Brief Overview
This learning activity provides an overview of Search Engine Optimization, or SEO.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
In this learning activity we will discuss breakpoints: what they are and how to use them.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
In this activity, you will explore what web analytics are and how to use them for site optimization.
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
User Experience Design: Testing
In this learning activity, you will learn about testing for user experience design.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
User Experience Design: Prototyping
In this learning activity, you'll explore the basics of prototyping for user experience design.
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.