All Learning ObjectsDigital Technology

Learning Objects

Network Systems & Cybersecurity

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Why Wisc-Online Moved to WisTech Open

In January 2026, Wisc-Online transitioned to WisTech Open to better align with current educational standards and long-term goals. During this process, the catalog was reviewed and content that did not meet accessibility requirements or was outdated was removed. Games were also taken down, and the team is evaluating the possibility of adding them back in the future with accessibility and quality standards in mind.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Main Category
Digital Technology
Go-Back-N ARQ
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Main Category
Digital Technology
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
Main Category
Digital Technology
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Main Category
Digital Technology
IP Routing
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Main Category
Digital Technology
IT-Cybersecurity: Red Team, Blue Team, and Cybersecurity Policies
Think like a hacker. Respond like a pro. In this module, you’ll experience a simulated breach and learn how red and blue teams handle the heat.
Main Category
Digital Technology
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Main Category
Digital Technology
Logic Symbols (Screencast)
The schematic symbols of logic gates used in digital circuits are shown.
Main Category
Digital Technology
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Main Category
Digital Technology
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Main Category
Digital Technology
Back to Top