Catalog
Displaying 1 - 23 of 23 (page 1 of 1)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Arabic, Yemeni Listening Assessment Object 01 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 02 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 03 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 04 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 05 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 06 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 07 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 08 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 09 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Arabic, Yemeni Listening Assessment Object 10 | Arabic, Yemeni | 2/2+ | Advanced High | Listening | Assessment Object | |
| Software Management | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Practices for Protecting Data | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Promoting a Security Culture | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Ports from DDoS | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| The Problem with Parallel Permissions | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Preparing For and Conducting Audits | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Controlling Access through Segmentation | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| IAM in the Cloud | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How to Keep Data Safe | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Tips for Effective Incident Response | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Parameters of Pen Testing | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Using MDM for BYOD Inventory | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How Daqing Petrochemical Company Secures Its Network | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object |