Portal Lessons
Link to content | Language | Level | Modality | Topic |
---|---|---|---|---|
Better Access Control with DAC | Turkish | 2+/3 | Reading | Science/Technology |
Device and Network Security Guidelines | Turkish | 2+/3 | Reading | Science/Technology |
Rules for Network Security | Turkish | 2+/3 | Reading | Defense/Security |
Cloud Computing's Role in Cybersecurity | Turkish | 2+/3 | Reading | Science/Technology |
Fortinet | Turkish | 2+/3 | Reading | Science/Technology |
Using SCCM to Detect Unauthorized Software | Turkish | 2+/3 | Reading | Science/Technology |
Understanding Port Scanning | Turkish | 2+/3 | Reading | Science/Technology |
Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Reading | Science/Technology |
What is a Pentest? | Turkish | 2+/3 | Reading | Defense/Security |
Cyber Attack Scenarios | Turkish | 2+/3 | Reading | Defense/Security |