Respond and recover from a data breach Reviews
6635 reviews
ok
Adriana F. · Reviewed about 1 year ago
José A. · Reviewed about 1 year ago
muaaz i. · Reviewed about 1 year ago
Adam J. · Reviewed about 1 year ago
LAXMI N. · Reviewed about 1 year ago
Adriana F. · Reviewed about 1 year ago
muaaz i. · Reviewed about 1 year ago
Ryan H. · Reviewed about 1 year ago
WIDMAER E. · Reviewed about 1 year ago
Mirna W. · Reviewed about 1 year ago
The instructions are unclear and clearly outdated
Kaungkhant H. · Reviewed about 1 year ago
Maged E. · Reviewed about 1 year ago
Bilal A. · Reviewed about 1 year ago
too many bugs
Maurice A. B. · Reviewed about 1 year ago
Maurice A. B. · Reviewed about 1 year ago
The lab is great! There are couple issues though: task 2 should be updated because the dialog foe VM creation has changed a bit since the task was written. And in task 4 please specify the firewall rule name because it is mentioned in task 5 and if not named correctly, will render task 5 unworkable (even if you recreate the rule with the correct name), and that's why I got to do this lab the second time
Daniil K. · Reviewed about 1 year ago
Antony G. · Reviewed about 1 year ago
M. H. · Reviewed about 1 year ago
Shubham S. · Reviewed about 1 year ago
Ahmed T. · Reviewed about 1 year ago
Jenine M. · Reviewed about 1 year ago
bad
JEROME T U. · Reviewed about 1 year ago
Pooja P. · Reviewed about 1 year ago
Everette P. · Reviewed about 1 year ago
set
Abel M. · Reviewed about 1 year ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.