Catalog
Displaying 1 - 25 of 40 (page 1 of 2)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| The ForeScout CounterACT Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Using SCCM to Detect Unauthorized Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Securing the Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Advanced Vulnerability Assessment with Metasploit | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Comprehensive Protection from Malware | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Web Application Authentication Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Essential Tool for Wi-Fi Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| VMware vSphere Data Protection | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| The Importance of Information Security Awareness | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Smart Firewall Management | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Understanding Port Scanning | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Policies for Allocating Privileges | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Firewalls, Filtering, and Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Technical Specifications for Security (Antivirus) Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination