All Learning ObjectsDigital Technology

Learning Objects

Network Systems & Cybersecurity

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Why Wisc-Online Moved to WisTech Open

In January 2026, Wisc-Online transitioned to WisTech Open to better align with current educational standards and long-term goals. During this process, the catalog was reviewed and content that did not meet accessibility requirements or was outdated was removed. Games were also taken down, and the team is evaluating the possibility of adding them back in the future with accessibility and quality standards in mind.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Main Category
Digital Technology
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Main Category
Digital Technology
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Main Category
Digital Technology
Secure Data Erasure
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.
Main Category
Digital Technology
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Main Category
Digital Technology
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Main Category
Digital Technology
The Broadband Telco Services Subscriber Loop
Walk through the subscriber loop and learn how the signal travels from the central office to the subscriber.
Main Category
Construction
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Main Category
Digital Technology
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
Main Category
Digital Technology
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Main Category
Digital Technology
Back to Top