Catalog
Displaying 1 - 25 of 70 (page 1 of 3)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Ethiopian Traitors | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| The Media in Ethiopia | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| International Festival for the Tigrayan Diaspora | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| Equality and Femininity | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| Prison Experience | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| Academic Awards Ceremony | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| Traffic Accidents in Addis Ababa | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| Public Health Officer Training | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| Heroism and the Ethiopian Military | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| Ethiopia and the United Nations | Amharic | 2+/3 | Superior | Listening | Language Learning Object | |
| BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Defending Against Targeted Attacks | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Backup Methods in the Multi-Cloud Era | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Security Competition | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Preparing for Network Segmentation | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination