Catalog
Displaying 1 - 25 of 91 (page 1 of 4)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Azeri, Northern ILR 2/2+/3 Listening Assessment Object 004 FY19 | Azeri, Northern | 2/2+/3 | Superior | Listening | Assessment Object | |
| Azeri, Northern ILR 2/2+/3 Listening Assessment Object 007 FY19 | Azeri, Northern | 2/2+/3 | Superior | Listening | Assessment Object | |
| Azeri, Northern ILR 2/2+/3 Listening Assessment Object 008 FY19 | Azeri, Northern | 2/2+/3 | Superior | Listening | Assessment Object | |
| Azeri, Northern ILR 2/2+/3 Listening Assessment Object 009 FY19 | Azeri, Northern | 2/2+/3 | Superior | Listening | Assessment Object | |
| Azeri, Northern ILR 2/2+/3 Listening Assessment Object 010 FY19 | Azeri, Northern | 2/2+/3 | Superior | Listening | Assessment Object | |
| Malicious Programs in Mobile Apps | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Heartbleed Vulnerabilities | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Tracking Down "The Moon" | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Android Malware | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Arbor Networks and Security Challenges | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Repairing Data Breaches | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Wireless Attacks | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| DEDECMS Vulnerabilities | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Router Security Issues | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Mobile Phone Data Traffic | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Software Management | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Practices for Protecting Data | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Promoting a Security Culture | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Ports from DDoS | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| The Problem with Parallel Permissions | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Preparing For and Conducting Audits | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Controlling Access through Segmentation | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| IAM in the Cloud | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How to Keep Data Safe | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Tips for Effective Incident Response | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object |
Pagination