Catalog
Displaying 51 - 75 of 220 (page 3 of 9)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Arabic, Yemeni Listening Assessment Object 07 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
Arabic, Yemeni Listening Assessment Object 08 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
Arabic, Yemeni Listening Assessment Object 09 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
Arabic, Yemeni Listening Assessment Object 10 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
It Is Good to Have a Wise Mind #1: The Big Surprise | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #2: The Marriage Contract | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #3: A Family Lesson | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #4: Obtaining a Loan | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #5: Going on an Outing | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #6: A Tough Economy | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending Against Targeted Attacks | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Backup Methods in the Multi-Cloud Era | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Security Competition | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Preparing for Network Segmentation | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination