Portal Lessons
Link to content | Language | Level | Modality![]() |
Topic |
---|---|---|---|---|
The Costs of a Data Breach | Persian | 2+/3 | Reading | Defense/Security |
The Security Cycle | Persian | 2+/3 | Reading | Defense/Security |
Establishing a LUA Environment | Persian | 2+/3 | Reading | Science/Technology |
Anti-Malware Software | Persian | 2+/3 | Reading | Science/Technology |
Restricting Network Access | Persian | 2+/3 | Reading | Science/Technology |
Securing a Wireless Network | Persian | 2+/3 | Reading | Science/Technology |
Trends in Hacking | Persian | 2+/3 | Reading | Science/Technology |
Madi Virus | Persian | 2+/3 | Reading | Science/Technology |
Item Set-A14RFASC20 | Persian | 3/3+ | Reading | Multiple |
Item Set-A14RFASC17 | Persian | 3/3+ | Reading | Multiple |