Catalog
Displaying 2501 - 2525 of 2748 (page 101 of 110)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Technical Specifications for Security (Antivirus) Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Securing Web Applications | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Fortinet | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Mirsis Backup Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Recommendations for Reducing Risk | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Device and Network Security Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
How Can Server Security Be Provided? | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Active Directory Restricted Groups Policy | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Network Security Defense Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cloud Computing's Role in Cybersecurity | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Security Needs and Solutions in the Enterprise Information Systems | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Account Control with the Protected Users Feature | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
All About Encryption | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Attack Scenarios | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Data Center Information Security Standards | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
What is a Pentest? | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Turkish ILR 2/2+ Reading Assessment Object 039 | Turkish | 2/2+ | Advanced Mid | Reading | Assessment Object |
Pagination
- First page
- Previous page
- …
- 99
- 100
- 101
- 102
- 103
- …
- Next page
- Last page