Catalog
Displaying 1 - 25 of 29 (page 1 of 2)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| A Neighborhood Conflict | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
| Third Party #2: Bribery and Blackmail | Arabic, Egyptian | 2+/3 | Superior | Video | Video Learning Object | |
| Salah al-Abyadh #13: Shoot-Out at the School | Arabic, Libyan | 2+/3 | Superior | Video | Video Learning Object | |
| Phobia #5: Cut! | Arabic, Libyan | 2+/3 | Superior | Video | Video Learning Object | |
| The NSA's Interest in Smartphones | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
| Hacking Smartphones | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
| Methods of Protection | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
| Firewalls | Arabic, Modern Standard | 2+/3 | Superior | Reading | Language Learning Object | |
| Mobile Payment Security | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Making BYOD Work | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Penetration Testing | French | 2+/3 | Superior | Reading | Language Learning Object | |
| Public Wi-Fi Insecurity | French | 2+/3 | Superior | Reading | Language Learning Object | |
| The State of the National Cyber Command | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
| Reviewing Traditional Security Methods | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
| Bringing Security to the Wild West of IT | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
| Network Security and the Financial Sector | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
| Ten Suggestions on Cybersecurity | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
| Defending Automation | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
| The Security Cycle | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
| The Costs of a Data Breach | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
| Vulnerable Office Equipment | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
| Port Filtering | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
| Security Operations Centers | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
| Layered Security | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
| Vulnerabilities of Wireless Networks | Persian | 2+/3 | Superior | Reading | Language Learning Object |
Pagination