Port Scanning
By Joseph Wetzel
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
IT Stress Management - Diet and Exercise
By mikhailvmatc
In this learning activity you'll examine how diet and exercise affect stress.
Normalization – 1st Normal Form
By jamiecchavez
In this learning activity you'll explore and practice the first step in normalizing a database.
Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Debugging: Breakpoints
By carlfranklin
In this learning activity we will discuss breakpoints: what they are and how to use them.
The CLR: Overview of the Common Language Runtime
In this learning activity, you’ll explore the Common Language Runtime, or CLR.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Angular JS
By Rose Guthrie, Donna Gehl
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Instantiation: Constructing an Object
By Jay Stulo
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
User Experience Design: Developing Personas
By Kimberly Reed
In this learning activity, you'll be introduced to what personas are, explore how to create one, and understand why they're important.
User Experience Design : Remote vs. In-Person Usability Testing
In this activity, you'll discover the differences, advantages, and disadvantages of remote and in-person usability testing.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.