Respond and recover from a data breach Reviews
1180 reviews
ARBIN SABA A. · Reviewed 14 days ago
Blademir R. · Reviewed 14 days ago
Shyamal R. · Reviewed 14 days ago
Great !
Carlos C. · Reviewed 14 days ago
Steven P. · Reviewed 14 days ago
Galakattu C. · Reviewed 14 days ago
Chaitanya sreya A. · Reviewed 14 days ago
Zaidan R. · Reviewed 15 days ago
Shivam K. · Reviewed 15 days ago
Ethan T. · Reviewed 15 days ago
l
Muhammad Z. · Reviewed 15 days ago
João Pedro B. · Reviewed 15 days ago
last task always get frozen no matter how you try you will need another 2 credit in order to pass the module
Muhammad Z. · Reviewed 15 days ago
Ambiorix S. · Reviewed 15 days ago
Blademir R. · Reviewed 15 days ago
Stefan I. · Reviewed 15 days ago
That was awesome.
Tarran I. · Reviewed 15 days ago
super
kavya t. · Reviewed 15 days ago
Rommuel C. · Reviewed 15 days ago
*Important missing information In step 4, you have to name your new firewall rule "limit-ports", or else you can not complete step 6. Other than that, great lab that walks you through several of the steps earlier to check if you really understood the previous lessons.
Mayer U. · Reviewed 16 days ago
Emmanuel V. · Reviewed 16 days ago
#5 not clear: rule name was not mentioned before and RDP port had to removed to be accepted.
Antti M. · Reviewed 16 days ago
ahmadou t. · Reviewed 16 days ago
M.Moiz N. · Reviewed 16 days ago
Nandipati S. · Reviewed 16 days ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.