Search
In this animated object, learners study the problems that develop if the scan time of a PLC is too slow.
By Terry Bartelt
Learners examine the three steps of a processor scan cycle.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
By Joseph Wetzel
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.