All Learning ObjectsDigital Technology

Network Systems & Cybersecurity

Learning Objects

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
AND Gates (Screencast)
In this learning activity you'll describe the operation of an AND gate by using a truth table, a waveform diagram, a Boolean Algebra equation, a switch analogy, and a written definition.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Main Categories
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Main Categories
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Main Categories
Bandwidth
In this learning activity you'll explore bandwidth.
Main Categories
Bandwidth Capacity Techniques
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Main Categories
Basic Logic Gates
The learner will understand the operation of the six fundamental logic gates and the inverter by using truth tables, Boolean Algebra equations, switch analogies, and written statements.
Main Categories
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Main Categories
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Main Categories
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Main Categories
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Data Conversion
Learners observe animations showing how data is converted between serial and parallel flow.
Main Categories
Data Flow on the Internet
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Main Categories
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Main Categories
Disk Encryption Simulation
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
Main Categories
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Main Categories

Wisc-Online FAQs

Explore this section for helpful answers to common questions regarding Wisc-Online.