All Learning ObjectsDigital Technology

Learning Objects

Network Systems & Cybersecurity

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Why Wisc-Online Moved to WisTech Open

In January 2026, Wisc-Online transitioned to WisTech Open to better align with current educational standards and long-term goals. During this process, the catalog was reviewed and content that did not meet accessibility requirements or was outdated was removed. Games were also taken down, and the team is evaluating the possibility of adding them back in the future with accessibility and quality standards in mind.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Main Category
Digital Technology
Network Internet Protocol (IPv6)
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Main Category
Digital Technology
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Main Category
Digital Technology
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Main Category
Digital Technology
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Main Category
Digital Technology
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Main Category
Digital Technology
Port States
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Main Category
Digital Technology
Protecting Data in the Real World
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Main Category
Digital Technology
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Main Category
Digital Technology
Back to Top