All Learning ObjectsDigital Technology

Network Systems & Cybersecurity

Learning Objects

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
AND Gates (Screencast)
In this learning activity you'll describe the operation of an AND gate by using a truth table, a waveform diagram, a Boolean Algebra equation, a switch analogy, and a written definition.
Main Category
Digital Technology
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Main Category
Digital Technology
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Main Category
Digital Technology
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Main Category
Digital Technology
Bandwidth
In this learning activity you'll explore bandwidth.
Main Category
Digital Technology
Bandwidth Capacity Techniques
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Main Category
Digital Technology
Basic Logic Gates
The learner will understand the operation of the six fundamental logic gates and the inverter by using truth tables, Boolean Algebra equations, switch analogies, and written statements.
Main Category
Construction
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Main Category
Digital Technology
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Main Category
Construction
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Main Category
Digital Technology
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Main Category
Digital Technology
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Main Category
Digital Technology
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Main Category
Digital Technology
Data Conversion
Learners observe animations showing how data is converted between serial and parallel flow.
Main Category
Digital Technology
Data Flow on the Internet
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Main Category
Digital Technology
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Main Category
Digital Technology
Disk Encryption Simulation
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Main Category
Digital Technology
Fiber-Optic Cables
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Main Category
Construction
Fibre Channel Storage Area Networks
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activitywill explain the benefits, components, and some basic configurations of fibre channel networks.
Main Category
Digital Technology
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Main Category
Digital Technology
Go-Back-N ARQ
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Main Category
Digital Technology
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
Main Category
Digital Technology
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Main Category
Digital Technology
IP Routing
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Main Category
Digital Technology
IT-Cybersecurity: Red Team, Blue Team, and Cybersecurity Policies
Think like a hacker. Respond like a pro. In this module, you’ll experience a simulated breach and learn how red and blue teams handle the heat.
Main Category
Digital Technology
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Main Category
Digital Technology
Logic Symbols (Screencast)
The schematic symbols of logic gates used in digital circuits are shown.
Main Category
Digital Technology
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Main Category
Digital Technology
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Main Category
Digital Technology
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Main Category
Digital Technology
Network Internet Protocol (IPv6)
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Main Category
Digital Technology
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Main Category
Digital Technology
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Main Category
Digital Technology
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Main Category
Digital Technology
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Main Category
Digital Technology
Port States
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Main Category
Digital Technology
Protecting Data in the Real World
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Main Category
Digital Technology
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Main Category
Digital Technology
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Main Category
Digital Technology
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Main Category
Digital Technology
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Main Category
Digital Technology
Secure Data Erasure
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.
Main Category
Digital Technology
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Main Category
Digital Technology
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Main Category
Digital Technology
The Broadband Telco Services Subscriber Loop
Walk through the subscriber loop and learn how the signal travels from the central office to the subscriber.
Main Category
Construction
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Main Category
Digital Technology
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
Main Category
Digital Technology
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Main Category
Digital Technology
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Main Category
Digital Technology
Web Applications Attack
Know the threats. Block the breach. This module breaks down how common web attacks like SQL Injection and Cross-Site Scripting work—and how to stop them.
Back to Top