Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
In this learning activity we will discuss breakpoints: what they are and how to use them.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
JOINs (Inner, Left, Right, Full)
In this learning activity, you’ll explore four different types of JOINs and understand how they help programmers produce readable reports.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
By Rose Guthrie, Donna Gehl
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Man in the Middle Attacks with ARP Poisoning
By Joseph Wetzel
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
The CLR: Overview of the Common Language Runtime
In this learning activity, you’ll explore the Common Language Runtime, or CLR.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
User Experience Design: Developing Personas
By Kimberly Reed
In this learning activity, you'll be introduced to what personas are, explore how to create one, and understand why they're important.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.