Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Port Scanning - Common Network Protocols
By Joseph Wetzel
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Pointers In C++
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Peer-to-Peer Operating Systems
By Terry Bartelt
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Parameters and Arguments
By carlfranklin
In this learning activity, you’ll discover the difference between a parameter and an argument.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Normalization – 3rd Normal Form
By jamiecchavez
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
JOINs (Inner, Left, Right, Full)
In this learning activity, you’ll explore four different types of JOINs and understand how they help programmers produce readable reports.
IT Stress Management - Volunteerism
By mikhailvmatc
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
IT Stress Management - Setting Goals
In this learning activity you'll explore how to set goals based on realistic expectations.
IT Stress Management - Root Cause
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.
IT Project Management: Waterfall Methodology
By Kimberly Reed
In this learning activity, you’ll explore the Waterfall model and its application to software development.
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.