Catalog
Displaying 1 - 25 of 29 (page 1 of 2)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
A Neighborhood Conflict | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Third Party #2: Bribery and Blackmail | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
Salah al-Abyadh #13: Shoot-Out at the School | Arabic, Libyan | 2+/3 | Superior | Video | Video Learning Object | |
Phobia #5: Cut! | Arabic, Libyan | 2+/3 | Superior | Video | Video Learning Object | |
The NSA's Interest in Smartphones | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
Hacking Smartphones | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
Methods of Protection | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
Firewalls | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
Mobile Payment Security | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Making BYOD Work | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Penetration Testing | French | 2+/3 | Superior | Reading | Language Learning Object | |
Public Wi-Fi Insecurity | French | 2+/3 | Superior | Reading | Language Learning Object | |
The State of the National Cyber Command | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Reviewing Traditional Security Methods | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Bringing Security to the Wild West of IT | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Network Security and the Financial Sector | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Ten Suggestions on Cybersecurity | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Defending Automation | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
The Security Cycle | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
The Costs of a Data Breach | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerable Office Equipment | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Port Filtering | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Security Operations Centers | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Layered Security | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerabilities of Wireless Networks | Persian | 2+/3 | Superior | Reading | Language Learning Object |
Pagination