By Terry Bartelt
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Async and Await
By Joseph Wetzel
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
IT Project Management: Combined Methodologies
By Kimberly Reed
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Attributes of a Class: Fields and Properties
By Ryan Appel
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Visual Studio: Connecting to Team Foundation Service
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
The CLR: Overview of the Common Language Runtime
In this learning activity, you’ll explore the Common Language Runtime, or CLR.
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity we will discuss breakpoints: what they are and how to use them.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
What is an Algorithm?
In this learning activity, we’ll learn what an algorithm is.
SEO - Promoting your Website
This learning object explains new, free, and traditional ways to market your website.