Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
IT Stress Management - Root Cause
By mikhailvmatc
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
Name Servers
By Terry Bartelt
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Setting Up Your Virtual Private Network (VPN)
By Joseph Wetzel
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Database Naming Conventions
By jamiecchavez
In this learning activity, you'll discover and then follow established rules when naming database objects.
Asymmetric Encryption: How It Works
By jheathma
In this learning activity you'll explore public key encryption and conclude with a short quiz.
What is an Algorithm?
By carlfranklin
In this learning activity, we’ll learn what an algorithm is.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Domain Model
In this learning activity you'll examine how a large computer network is configured.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Referential Integrity
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Routers: Acronyms
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
Customer Service Skills for IT Professionals - Engaging the Customer
By Kimberly Reed
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.
Programming in C++ Using Constants
In this learning activity you'll discover the const keyword and it’s uses in C++.