Skip to main content

Catalog

Displaying 226 - 250 of 392 (page 10 of 16)
Title Language ILR ACTFL Modality Type
Levantine Arabic Listening Assessment Object 56 Arabic, Levantine 2/2+ Advanced Mid Listening Assessment Object launch
Levantine Arabic Listening Assessment Object 48 Arabic, Levantine 2/2+ Advanced Mid Listening Assessment Object launch
Levantine Arabic Listening Assessment Object 57 Arabic, Levantine 2/2+ Advanced Mid Listening Assessment Object launch
Levantine Arabic Listening Assessment Object 43 Arabic, Levantine 2/2+ Advanced Mid Listening Assessment Object launch
Levantine Arabic Listening Assessment Object 46 Arabic, Levantine 2/2+ Advanced Mid Listening Assessment Object launch
Levantine Arabic Listening Assessment Object 44 Arabic, Levantine 2/2+ Advanced Mid Listening Assessment Object launch
Levantine Arabic Listening Assessment Object 60 Arabic, Levantine 2/2+ Advanced Mid Listening Assessment Object launch
BYOD Security in Japan Japanese 2+/3 Superior Reading Language Learning Object launch
White List Defense against Unauthorized Software Japanese 2+/3 Superior Reading Language Learning Object launch
The Benefits of Configuration Management Japanese 2+/3 Superior Reading Language Learning Object launch
Vulnerability Testing Japanese 2+/3 Superior Reading Language Learning Object launch
Defending Against Targeted Attacks Japanese 2+/3 Superior Reading Language Learning Object launch
Building Vulnerability-Free Applications Japanese 2+/3 Superior Reading Language Learning Object launch
The Basics of Wireless LAN Security Japanese 2+/3 Superior Reading Language Learning Object launch
Backup Methods in the Multi-Cloud Era Japanese 2+/3 Superior Reading Language Learning Object launch
Security Competition Japanese 2+/3 Superior Reading Language Learning Object launch
Firewall Configuration Options Japanese 2+/3 Superior Reading Language Learning Object launch
What Are Ports and Port Scans Japanese 2+/3 Superior Reading Language Learning Object launch
Group Policy Settings for Server Management Control Japanese 2+/3 Superior Reading Language Learning Object launch
Defending the Boundary in Depth Japanese 2+/3 Superior Reading Language Learning Object launch
Log Analysis with SIEM Japanese 2+/3 Superior Reading Language Learning Object launch
Preparing for Network Segmentation Japanese 2+/3 Superior Reading Language Learning Object launch
Group Policy Settings for Performing a Security Audit in Event Viewer Japanese 2+/3 Superior Reading Language Learning Object launch
Data Encryption Japanese 2+/3 Superior Reading Language Learning Object launch
Power Companies Coming Under Cyber Attack Japanese 2+/3 Superior Reading Language Learning Object launch