Portal Lessons
Link to content | Language | Level | Modality![]() |
Topic |
---|---|---|---|---|
White Lists and Embedded Computers | Hebrew | 2+/3 | Reading | Science/Technology |
Security Principles | Hebrew | 2+/3 | Reading | Science/Technology |
Malicious Input and Security Holes | Hebrew | 2+/3 | Reading | Science/Technology |
The Dangers of Privileged Accounts | Hebrew | 2+/3 | Reading | Science/Technology |
The KVM Solution to Workstation Management | Hebrew | 2+/3 | Reading | Science/Technology |
IDP Solutions | Hebrew | 2+/3 | Reading | Science/Technology |
Malware and Portable Devices | Hebrew | 2+/3 | Reading | Science/Technology |
Employee Training | Hebrew | 2+/3 | Reading | Science/Technology |
Preventing Data Leaks | Hebrew | 2+/3 | Reading | Science/Technology |
Predictive Approach to Malware Protection | Hebrew | 2+/3 | Reading | Science/Technology |