Respond and recover from a data breach Reviews
2028 reviews
MITHIN KARISHNAMOORTHY G. · Reviewed about 1 month ago
It was an excellent opportunity to apply my skills and knowledge, and I believe this project will be a valuable addition to my career in cybersecurity. I'm excited about the impact this experience will have on my professional growth. Thanks a lot :)
S. K. · Reviewed about 1 month ago
Phyo Min T. · Reviewed about 1 month ago
Phyo Min T. · Reviewed about 1 month ago
Uzziah B. · Reviewed about 1 month ago
made 80/100
Rebecca P. · Reviewed about 1 month ago
22DIT010 V. · Reviewed about 1 month ago
Task 3 - issues with access to buckets
Rebecca P. · Reviewed about 1 month ago
bem legal
Lucas C. · Reviewed about 1 month ago
HEMANTH L. · Reviewed about 1 month ago
Ćukasz B. · Reviewed about 1 month ago
Deepika V. · Reviewed about 1 month ago
Antony J. · Reviewed about 1 month ago
22DIT077 K. · Reviewed about 1 month ago
Kanwaljit S. · Reviewed about 1 month ago
Goldy S. · Reviewed about 1 month ago
Shreyash D. · Reviewed about 1 month ago
In the section where I had to create an SSH firewall rule, it was not mentioned that it had to be named as "limit-ports". Since I'd named it as per my convenience, it caused problems in the next part where I'd to enable Logging. I'd enabled logs yet the progress indicator said that I was wrong. Later, I deleted my firewall rule & created the rule with your convention , the progress indicator was working. I would like u to address it ASAP.
Vineet P. · Reviewed about 1 month ago
Lakshan S. · Reviewed about 1 month ago
Nox F. · Reviewed about 1 month ago
Levi V. · Reviewed about 1 month ago
Allan D. · Reviewed about 1 month ago
Arasu G. · Reviewed about 1 month ago
Juan Carlo A. · Reviewed about 1 month ago
Daijiro T. · Reviewed about 1 month ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.