Respond and recover from a data breach Reviews

6635 reviews

ok

Adriana F. · Reviewed about 1 year ago

José A. · Reviewed about 1 year ago

muaaz i. · Reviewed about 1 year ago

Adam J. · Reviewed about 1 year ago

LAXMI N. · Reviewed about 1 year ago

Adriana F. · Reviewed about 1 year ago

muaaz i. · Reviewed about 1 year ago

Ryan H. · Reviewed about 1 year ago

WIDMAER E. · Reviewed about 1 year ago

Mirna W. · Reviewed about 1 year ago

The instructions are unclear and clearly outdated

Kaungkhant H. · Reviewed about 1 year ago

Maged E. · Reviewed about 1 year ago

Bilal A. · Reviewed about 1 year ago

too many bugs

Maurice A. B. · Reviewed about 1 year ago

Maurice A. B. · Reviewed about 1 year ago

The lab is great! There are couple issues though: task 2 should be updated because the dialog foe VM creation has changed a bit since the task was written. And in task 4 please specify the firewall rule name because it is mentioned in task 5 and if not named correctly, will render task 5 unworkable (even if you recreate the rule with the correct name), and that's why I got to do this lab the second time

Daniil K. · Reviewed about 1 year ago

Antony G. · Reviewed about 1 year ago

M. H. · Reviewed about 1 year ago

Shubham S. · Reviewed about 1 year ago

Ahmed T. · Reviewed about 1 year ago

Jenine M. · Reviewed about 1 year ago

bad

JEROME T U. · Reviewed about 1 year ago

Pooja P. · Reviewed about 1 year ago

Everette P. · Reviewed about 1 year ago

set

Abel M. · Reviewed about 1 year ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.