Catalog
Displaying 451 - 475 of 542 (page 19 of 22)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Siri ya Mtungi #15: Nusura's Wedding Plans | Swahili | 2+/3 | Superior | Video | Video Learning Object | |
| The ForeScout CounterACT Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Using SCCM to Detect Unauthorized Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Securing the Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Advanced Vulnerability Assessment with Metasploit | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Comprehensive Protection from Malware | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Web Application Authentication Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Essential Tool for Wi-Fi Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| VMware vSphere Data Protection | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| The Importance of Information Security Awareness | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Smart Firewall Management | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Understanding Port Scanning | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Policies for Allocating Privileges | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Firewalls, Filtering, and Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination
- First page
- Previous page
- …
- 17
- 18
- 19
- 20
- 21
- …
- Next page
- Last page