Customer Service Skills for IT Professionals - Communication
By Kimberly Reed
In this learning activity you'll be introduced to the communication model and how it impacts your work as an IT professional.
Intrusion Detection Systems
By Joseph Wetzel
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
By Rose Guthrie, Donna Gehl
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
By Terry Bartelt
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
In this learning activity you'll examine how a large computer network is configured.
User Experience Design: Developing Personas
In this learning activity, you'll be introduced to what personas are, explore how to create one, and understand why they're important.
User Experience Design : Remote vs. In-Person Usability Testing
In this activity, you'll discover the differences, advantages, and disadvantages of remote and in-person usability testing.
SEO - A Brief Overview
This learning activity provides an overview of Search Engine Optimization, or SEO.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Instantiation: Constructing an Object
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.