Portal Lessons
Link to content | Language![]() |
Level | Modality | Topic |
---|---|---|---|---|
Making BYOD Work | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Defense/Security |
Heartbleed Vulnerabilities | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Router Security Issues | Chinese, Mandarin (Simplified) | 2+/3 | Reading | Science/Technology |
Data Backup Strategies | Persian | 2+/3 | Reading | Science/Technology |
Strategies for Data Loss Prevention | Persian | 2+/3 | Reading | Science/Technology |
Vulnerabilities of Wireless Networks | Persian | 2+/3 | Reading | Defense/Security |
Data Corruption | Persian | 2+/3 | Reading | Science/Technology |
Web Application Firewalls | Persian | 2+/3 | Reading | Science/Technology |
Data Loss Strategies | Persian | 2+/3 | Reading | Science/Technology |
Perimeter Security | Persian | 2+/3 | Reading | Science/Technology |