Portal Lessons
Link to content | Language | Level | Modality![]() |
Topic |
---|---|---|---|---|
Security Principles | Hebrew | 2+/3 | Reading | Science/Technology |
Malicious Input and Security Holes | Hebrew | 2+/3 | Reading | Science/Technology |
The Dangers of Privileged Accounts | Hebrew | 2+/3 | Reading | Science/Technology |
The KVM Solution to Workstation Management | Hebrew | 2+/3 | Reading | Science/Technology |
IDP Solutions | Hebrew | 2+/3 | Reading | Science/Technology |
Malware and Portable Devices | Hebrew | 2+/3 | Reading | Science/Technology |
Employee Training | Hebrew | 2+/3 | Reading | Science/Technology |
Preventing Data Leaks | Hebrew | 2+/3 | Reading | Science/Technology |
Predictive Approach to Malware Protection | Hebrew | 2+/3 | Reading | Science/Technology |
Network Separation and Development Labs | Hebrew | 2+/3 | Reading | Science/Technology |