Catalog
Displaying 1 - 13 of 13 (page 1 of 1)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Software Management | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Practices for Protecting Data | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Promoting a Security Culture | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Ports from DDoS | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| The Problem with Parallel Permissions | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Preparing For and Conducting Audits | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Controlling Access through Segmentation | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| IAM in the Cloud | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How to Keep Data Safe | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Tips for Effective Incident Response | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Parameters of Pen Testing | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Using MDM for BYOD Inventory | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How Daqing Petrochemical Company Secures Its Network | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object |