Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Firewall: Gateway Servers
By Joseph Wetzel, Douglas Tabbutt
In this animated object, learners examine how a gateway server operates.
Firewall: Network Address Translation/Port Address Translation
In this learning activity you'll examine how network address translation works.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Firewalls: Packet Filters
In this learning activity you'll create a packet filter.
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Routers: Acronyms
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
Routers: Logical Addresses
In this learning activity you'll examine how logical addresses work. The IP address is the logical address assigned to a connection by the ISP or network administrator.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.