Catalog
Displaying 1 - 25 of 48 (page 1 of 2)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 030 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 031 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 022 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 024 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 025 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 026 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 028 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 032 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| Arabic, Gulf ILR 2/2+/3 Listening Assessment Object 037 FY19 | Arabic, Gulf | 2/2+/3 | Superior | Listening | Assessment Object | |
| BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Preparing for Network Segmentation | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Group Policy Settings for Performing a Security Audit in Event Viewer | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Data Encryption | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| VMware Solutions | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Sony's Security Mishap | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination