Catalog
Displaying 1 - 25 of 66 (page 1 of 3)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Thai ILR 2/2+/3 Listening Assessment Object 002 FY19 | Thai | 2/2+/3 | Superior | Listening | Assessment Object | |
Thai ILR 2/2+/3 Listening Assessment Object 003 FY19 | Thai | 2/2+/3 | Superior | Listening | Assessment Object | |
Thai ILR 2/2+/3 Listening Assessment Object 005 FY19 | Thai | 2/2+/3 | Superior | Listening | Assessment Object | |
Thai ILR 2/2+/3 Listening Assessment Object 008 FY19 | Thai | 2/2+/3 | Superior | Listening | Assessment Object | |
Thai ILR 2/2+/3 Listening Assessment Object 009 FY19 | Thai | 2/2+/3 | Superior | Listening | Assessment Object | |
The ForeScout CounterACT Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Using SCCM to Detect Unauthorized Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advanced Vulnerability Assessment with Metasploit | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Web Application Authentication Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Essential Tool for Wi-Fi Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
VMware vSphere Data Protection | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Importance of Information Security Awareness | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Smart Firewall Management | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Understanding Port Scanning | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Securing Web Applications | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Fortinet | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination