Catalog
Displaying 1 - 25 of 49 (page 1 of 2)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Cebuano ILR 2/2+/3 Listening Assessment Object 030 FY19 | Cebuano | 2/2+/3 | Superior | Listening | Assessment Object | |
Cebuano ILR 2/2+/3 Listening Assessment Object 028 FY19 | Cebuano | 2/2+/3 | Superior | Listening | Assessment Object | |
Cebuano ILR 2/2+/3 Listening Assessment Object 029 FY19 | Cebuano | 2/2+/3 | Superior | Listening | Assessment Object | |
Cebuano ILR 2/2+ Listening Assessment Object 012 | Cebuano | 2/2+ | Advanced High | Listening | Assessment Object | |
Cebuano ILR 2/2+ Listening Assessment Object 014 | Cebuano | 2/2+ | Advanced High | Listening | Assessment Object | |
Cebuano ILR 2/2+ Listening Assessment Object 015 | Cebuano | 2/2+ | Advanced High | Listening | Assessment Object | |
Cebuano ILR 2/2+ Listening Assessment Object 018 | Cebuano | 2/2+ | Advanced High | Listening | Assessment Object | |
Cebuano ILR 2/2+ Listening Assessment Object 019 | Cebuano | 2/2+ | Advanced High | Listening | Assessment Object | |
Cebuano ILR 2/2+/3 Listening Assessment Object 026 FY19 | Cebuano | 2/2+/3 | Superior | Listening | Assessment Object | |
Cebuano ILR 2/2+/3 Listening Assessment Object 027 FY19 | Cebuano | 2/2+/3 | Superior | Listening | Assessment Object | |
BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Preparing for Network Segmentation | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Performing a Security Audit in Event Viewer | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Data Encryption | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
VMware Solutions | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination