Catalog
Displaying 776 - 800 of 892 (page 32 of 36)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Technical Specifications for Security (Antivirus) Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Securing Web Applications | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Fortinet | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| The Mirsis Backup Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Recommendations for Reducing Risk | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Device and Network Security Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| How Can Server Security Be Provided? | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Active Directory Restricted Groups Policy | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Network Security Defense Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cloud Computing's Role in Cybersecurity | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Security Needs and Solutions in the Enterprise Information Systems | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Account Control with the Protected Users Feature | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| All About Encryption | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Attack Scenarios | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Data Center Information Security Standards | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| What is a Pentest? | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Turkish ILR 2/2+ Reading Assessment Object 039 | Turkish | 2/2+ | Advanced Mid | Reading | Assessment Object | |
| Turkish ILR 2/2+ Reading Assessment Object 035 | Turkish | 2/2+ | Advanced Mid | Reading | Assessment Object | |
| Turkish ILR 2/2+ Reading Assessment Object 038 | Turkish | 2/2+ | Advanced Mid | Reading | Assessment Object | |
| Turkish ILR 3 Reading Assessment Object 041 | Turkish | 3 | Superior | Reading | Assessment Object |
Pagination
- First page
- Previous page
- …
- 30
- 31
- 32
- 33
- 34
- …
- Next page
- Last page