All Learning ObjectsDigital Technology

Network Systems & Cybersecurity

Learning Objects

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
AND Gates (Screencast)
In this learning activity you'll describe the operation of an AND gate by using a truth table, a waveform diagram, a Boolean Algebra equation, a switch analogy, and a written definition.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Main Categories
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Main Categories
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Main Categories
Bandwidth
In this learning activity you'll explore bandwidth.
Main Categories
Bandwidth Capacity Techniques
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Main Categories
Basic Logic Gates
The learner will understand the operation of the six fundamental logic gates and the inverter by using truth tables, Boolean Algebra equations, switch analogies, and written statements.
Main Categories
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Main Categories
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Main Categories
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Main Categories
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Data Conversion
Learners observe animations showing how data is converted between serial and parallel flow.
Main Categories
Data Flow on the Internet
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Main Categories
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Main Categories
Disk Encryption Simulation
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
Main Categories
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Main Categories
Fiber-Optic Cables
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Fibre Channel Storage Area Networks
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activitywill explain the benefits, components, and some basic configurations of fibre channel networks.
Main Categories
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Main Categories
Go-Back-N ARQ
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Main Categories
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
Main Categories
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Main Categories
IP Routing
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Main Categories
IT-Cybersecurity: Red Team, Blue Team, and Cybersecurity Policies
Think like a hacker. Respond like a pro. In this module, you’ll experience a simulated breach and learn how red and blue teams handle the heat.
Main Categories
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Main Categories
Logic Symbols (Screencast)
The schematic symbols of logic gates used in digital circuits are shown.
Main Categories
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Main Categories
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Main Categories
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Main Categories
Network Internet Protocol (IPv6)
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Main Categories
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Main Categories
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Main Categories
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Main Categories
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Main Categories
Port States
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Main Categories
Protecting Data in the Real World
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
Main Categories
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Main Categories
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Main Categories
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Main Categories
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Main Categories
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Main Categories
Secure Data Erasure
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.
Main Categories
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Main Categories
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
The Broadband Telco Services Subscriber Loop
Walk through the subscriber loop and learn how the signal travels from the central office to the subscriber.
Main Categories
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Main Categories
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
Main Categories
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Main Categories
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Main Categories
Web Applications Attack
Know the threats. Block the breach. This module breaks down how common web attacks like SQL Injection and Cross-Site Scripting work—and how to stop them.

Wisc-Online FAQs

Explore this section for helpful answers to common questions regarding Wisc-Online.