Portal Lessons
Link to content | Language![]() |
Level | Modality | Topic |
---|---|---|---|---|
The Problem with Parallel Permissions | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Practices for Protecting Data | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Parameters of Pen Testing | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Preparing For and Conducting Audits | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Controlling Access through Segmentation | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Promoting a Security Culture | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Tips for Effective Incident Response | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
IAM in the Cloud | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Protecting Ports from DDoS | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
How Daqing Petrochemical Company Secures Its Network | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |