Portal Lessons
Link to content | Language![]() |
Level | Modality | Topic |
---|---|---|---|---|
Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Reading | Defense/Security |
Rules for Network Security | Turkish | 2+/3 | Reading | Defense/Security |
What is a Pentest? | Turkish | 2+/3 | Reading | Defense/Security |
Cyber Attack Scenarios | Turkish | 2+/3 | Reading | Defense/Security |
Comprehensive Protection from Malware | Turkish | 2+/3 | Reading | Defense/Security |
Network Security Defense Guidelines | Turkish | 2+/3 | Reading | Defense/Security |
Policies for Allocating Privileges | Turkish | 2+/3 | Reading | Defense/Security |
Tanzanian Patriotism | Swahili | 2+/3 | Listening | Defense/Security |
Concerning the International Criminal Court | Swahili | 2+/3 | Listening | Defense/Security |
Strained Tanzanian-Rwandan Relations | Swahili | 2+/3 | Listening | Defense/Security |