Respond and recover from a data breach Reviews
927 reviews
Great !
Carlos C. · Reviewed 10 days ago
Steven P. · Reviewed 10 days ago
Galakattu C. · Reviewed 10 days ago
Chaitanya sreya A. · Reviewed 10 days ago
Zaidan R. · Reviewed 10 days ago
Shivam K. · Reviewed 10 days ago
Ethan T. · Reviewed 10 days ago
l
Muhammad Z. · Reviewed 10 days ago
João Pedro B. · Reviewed 10 days ago
last task always get frozen no matter how you try you will need another 2 credit in order to pass the module
Muhammad Z. · Reviewed 10 days ago
Ambiorix S. · Reviewed 10 days ago
Blademir R. · Reviewed 11 days ago
Stefan I. · Reviewed 11 days ago
That was awesome.
Tarran I. · Reviewed 11 days ago
super
kavya t. · Reviewed 11 days ago
Beng C. · Reviewed 11 days ago
*Important missing information In step 4, you have to name your new firewall rule "limit-ports", or else you can not complete step 6. Other than that, great lab that walks you through several of the steps earlier to check if you really understood the previous lessons.
Mayer U. · Reviewed 11 days ago
Emmanuel V. · Reviewed 11 days ago
#5 not clear: rule name was not mentioned before and RDP port had to removed to be accepted.
Antti M. · Reviewed 11 days ago
ahmadou t. · Reviewed 12 days ago
M.Moiz N. · Reviewed 12 days ago
Nandipati S. · Reviewed 12 days ago
Ethakota E. · Reviewed 12 days ago
good
S.Sanjay S. · Reviewed 12 days ago
RYAN HONG JIA JING _. · Reviewed 12 days ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.