Request Response: How the Web Works
By carlfranklin
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
What is an Algorithm?
In this learning activity, we’ll learn what an algorithm is.
Port Scanning
By Joseph Wetzel
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Database Naming Conventions
By jamiecchavez
In this learning activity, you'll discover and then follow established rules when naming database objects.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
IT Project Management: Waterfall Methodology
By Kimberly Reed
In this learning activity, you’ll explore the Waterfall model and its application to software development.
SEO - A Brief Overview
This learning activity provides an overview of Search Engine Optimization, or SEO.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Analog and Digital Converters
By Terry Bartelt
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Referential Integrity
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
IT Stress Management - Diet and Exercise
By mikhailvmatc
In this learning activity you'll examine how diet and exercise affect stress.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
CreateJS Cardioid
By Brett Sheleski
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
User Experience Design: Fitts Law
In this activity, you'll learn how Fitt's Law applies to user experience design.
User Experience Design: What is Usability?
In this learning activity you'll explain how how Usability fits into User Experience Design.
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).