关于“Identify Application Vulnerabilities with Security Command Center”的评价
正在加载…
未找到任何结果。

在 Google Cloud 控制台中运用您的技能

关于“Identify Application Vulnerabilities with Security Command Center”的评价

12705 条评价

Joita P. · 已于 about 1 year前审核

Sainath B. · 已于 about 1 year前审核

Mohammed Zaid U. · 已于 about 1 year前审核

Rishita y. · 已于 about 1 year前审核

MUKESH MANOJA R. · 已于 about 1 year前审核

Vaishnavi S. · 已于 about 1 year前审核

this was great!

Anna Lena F. · 已于 about 1 year前审核

Had fun this!!

Kevin M. · 已于 about 1 year前审核

Madhuri G. · 已于 about 1 year前审核

Pranay G. · 已于 about 1 year前审核

Venkata Phanisai J. · 已于 about 1 year前审核

Sudhir M. · 已于 about 1 year前审核

Sarthak R. · 已于 about 1 year前审核

Nupur K. · 已于 about 1 year前审核

Raj s. · 已于 about 1 year前审核

Arbaz Ahmed A. · 已于 about 1 year前审核

Multi B. S. · 已于 about 1 year前审核

Gururaj A. · 已于 about 1 year前审核

R Vashni M. · 已于 about 1 year前审核

KANABAR R. · 已于 about 1 year前审核

Very (too) light lab. We have not even browsed the sections of the Security Command Center like "Vulnerabilities" and how to reproduce the XSS exploit found. Quite deceiving like many others in this training. At least I have seen where the product is, so I can use later in my work.

Juan G. · 已于 about 1 year前审核

Vikas D. · 已于 about 1 year前审核

Debi M. · 已于 about 1 year前审核

Sleepy P. · 已于 about 1 year前审核

Onkar K. · 已于 about 1 year前审核

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。