SEO - A Brief Overview
By Kimberly Reed
This learning activity provides an overview of Search Engine Optimization, or SEO.
Database Naming Conventions
By jamiecchavez
In this learning activity, you'll discover and then follow established rules when naming database objects.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
What is an Algorithm?
By carlfranklin
In this learning activity, we’ll learn what an algorithm is.
Port Scanning
By Joseph Wetzel
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
SEO: Analytics
In this activity, you will explore what web analytics are and how to use them for site optimization.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
Asymmetric Encryption: How It Works
By jheathma
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Value Types and Reference Types in the .Net Framework
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Debugging: Breakpoints
In this learning activity we will discuss breakpoints: what they are and how to use them.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Customer Service Skills for IT Professionals - Controlling the Conversation
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
Routers: Acronyms
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
IT Stress Management - Setting Goals
By mikhailvmatc
In this learning activity you'll explore how to set goals based on realistic expectations.
User Experience Design: Usability Research Methods
In this learning activity, you'll be introduced to three common usability research methods.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.