Catalog
Displaying 51 - 75 of 303 (page 3 of 13)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
The ForeScout CounterACT Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Using SCCM to Detect Unauthorized Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Securing the Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advanced Vulnerability Assessment with Metasploit | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Comprehensive Protection from Malware | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Web Application Authentication Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Essential Tool for Wi-Fi Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
VMware vSphere Data Protection | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Importance of Information Security Awareness | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Smart Firewall Management | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Understanding Port Scanning | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Policies for Allocating Privileges | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Firewalls, Filtering, and Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Technical Specifications for Security (Antivirus) Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination