Catalog
Displaying 151 - 175 of 342 (page 7 of 14)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Third Party #8: Rising Tensions | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #9: Marriage | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #10: Diab's Dreams | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #11: The Kidnapping | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #12: Suffering | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #13: Shaymaa and Ahmed's Paths | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #14: Corruption | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #15: Confessions | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #16: Murder | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #17: Taking Things to the Next Level | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #18: Diab's Return | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #19: Trouble in the Neighborhood | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending Against Targeted Attacks | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Backup Methods in the Multi-Cloud Era | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Security Competition | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination