Portal Lessons
Link to content | Language | Level | Modality![]() |
Topic |
---|---|---|---|---|
Data Center Information Security Standards | Turkish | 2+/3 | Reading | Defense/Security |
Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Reading | Defense/Security |
Rules for Network Security | Turkish | 2+/3 | Reading | Defense/Security |
What is a Pentest? | Turkish | 2+/3 | Reading | Defense/Security |
Cyber Attack Scenarios | Turkish | 2+/3 | Reading | Defense/Security |
Comprehensive Protection from Malware | Turkish | 2+/3 | Reading | Defense/Security |
Network Security Defense Guidelines | Turkish | 2+/3 | Reading | Defense/Security |
Policies for Allocating Privileges | Turkish | 2+/3 | Reading | Defense/Security |
Sectarian Violence Forces Some to Flee | Arabic, Iraqi | 2+/3 | Listening | Defense/Security |
Interview With an Al-Qaeda Member | Arabic, Iraqi | 2+/3 | Listening | Defense/Security |