Portal Lessons
Link to content | Language | Level | Modality | Topic |
---|---|---|---|---|
The Security Cycle | Persian | 2+/3 | Reading | Defense/Security |
The Costs of a Data Breach | Persian | 2+/3 | Reading | Defense/Security |
Vulnerable Office Equipment | Persian | 2+/3 | Reading | Defense/Security |
Port Filtering | Persian | 2+/3 | Reading | Defense/Security |
Security Operations Centers | Persian | 2+/3 | Reading | Defense/Security |
Layered Security | Persian | 2+/3 | Reading | Defense/Security |
Vulnerabilities of Wireless Networks | Persian | 2+/3 | Reading | Defense/Security |
The First Group of Female Detectives Began Work | Persian | 2+/3 | Reading | Defense/Security |
Shah and a Shi'ite Cleric | Persian | 2+/3 | Reading | Defense/Security |
Conjoined Twins | Persian | 2+/3 | Reading | Defense/Security |