Portal Lessons
Link to content | Language | Level | Modality | Topic![]() |
---|---|---|---|---|
Controlling Access through Segmentation | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
IAM in the Cloud | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
How to Keep Data Safe | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Tips for Effective Incident Response | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Parameters of Pen Testing | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Using MDM for BYOD Inventory | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
How Daqing Petrochemical Company Secures Its Network | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
The KVM Solution to Workstation Management | Hebrew | 2+/3 | Reading | Science/Technology |
White Lists and Embedded Computers | Hebrew | 2+/3 | Reading | Science/Technology |
Hardening Mobile Devices | Hebrew | 2+/3 | Reading | Science/Technology |