Unshielded Twisted Pair Cables
By Terry Bartelt
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Man in the Middle Attacks with ARP Poisoning
By Joseph Wetzel
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
In this learning activity we will discuss breakpoints: what they are and how to use them.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Customer Service Skills for IT Professionals - Controlling the Conversation
By Kimberly Reed
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Visual Studio: Creating a New VSTS Repository
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
Subtracting Binary Numbers by Adding the 2's Complement
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.