Catalog
Displaying 1 - 25 of 63 (page 1 of 3)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Overview of Syria’s Ongoing Conflict | Arabic, Modern Standard | 2/2+/3 | Advanced Low | Multiple | Thematic Unit | |
| Egypt's Leadership and Power Struggles | Arabic, Modern Standard | 2/2+/3 | Advanced Low | Multiple | Thematic Unit | |
| Gulf Cooperation Council Activities | Arabic, Modern Standard | 2/2+/3 | Advanced Low | Multiple | Thematic Unit | |
| Post-Arab Spring | Arabic, Modern Standard | 2/2+/3 | Advanced Low | Multiple | Thematic Unit | |
| Weather Forecasting | Arabic, Sudanese | 2+/3 | Superior | Listening | Language Learning Object | |
| Software Management | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Practices for Protecting Data | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Promoting a Security Culture | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Ports from DDoS | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| The Problem with Parallel Permissions | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Preparing For and Conducting Audits | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Controlling Access through Segmentation | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| IAM in the Cloud | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How to Keep Data Safe | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Tips for Effective Incident Response | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Parameters of Pen Testing | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Using MDM for BYOD Inventory | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How Daqing Petrochemical Company Secures Its Network | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| The KVM Solution to Workstation Management | Hebrew | 2+/3 | Superior | Reading | Language Learning Object | |
| White Lists and Embedded Computers | Hebrew | 2+/3 | Superior | Reading | Language Learning Object | |
| Hardening Mobile Devices | Hebrew | 2+/3 | Superior | Reading | Language Learning Object | |
| Predictive Approach to Malware Protection | Hebrew | 2+/3 | Superior | Reading | Language Learning Object | |
| Malware and Portable Devices | Hebrew | 2+/3 | Superior | Reading | Language Learning Object | |
| Malicious Input and Security Holes | Hebrew | 2+/3 | Superior | Reading | Language Learning Object | |
| Securing Wireless Access Points | Hebrew | 2+/3 | Superior | Reading | Language Learning Object |
Pagination