Setting Up Your Virtual Private Network (VPN)
By Joseph Wetzel
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Customer Service Skills for IT Professionals - Controlling the Conversation
By Kimberly Reed
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
User Experience Design: What is User Experience Design?
In this learning activity you'll explore an overview of User Experience Design and recognize how User Experience Design (UXD) can make you a better designer.
User Experience Design: Prototyping
In this learning activity, you'll explore the basics of prototyping for user experience design.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
Working with Zip Files
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
SEO - Site Organization and Structure
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
An Algorithm for Converting a Binary Number to a Decimal Number
By Kevin Ritzman
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
In this learning activity we will discuss breakpoints: what they are and how to use them.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Understanding HTML Pathing
In this animated activity, learners study the difference between relative and absolute paths and how each can be used to create links to html resources. A short quiz completes the activity.This learning object has audio content.
User Experience Design: Usability Research Methods
In this learning activity, you'll be introduced to three common usability research methods.