Getting Started with Cloud IDS Reviews
10598 reviews
Marco Francesco P. · Reviewed almost 2 years ago
Jefferson D. · Reviewed almost 2 years ago
Good lab, would have liked to understand a bit more in detail all the individual steps (in particular some command line arguments and how/why we triggered the different levels of severity with each command). Small suggestion: In task 8, item 2 should be renamed: 2. Click the Threats tab. -> Click the IDS Threats tab. There is Threats tab inside Network security (under NGFW), but not the one we wanted. The above suggestion clarifies the desired tab
Konstantinos S. · Reviewed almost 2 years ago
Christian K. · Reviewed almost 2 years ago
Vladimir L. · Reviewed almost 2 years ago
Sandra B. · Reviewed almost 2 years ago
Julia G. · Reviewed almost 2 years ago
Volker H. · Reviewed almost 2 years ago
Simon W. · Reviewed almost 2 years ago
Javier O. · Reviewed almost 2 years ago
Sadanandan N. · Reviewed almost 2 years ago
Martin V. · Reviewed almost 2 years ago
Carl D. · Reviewed almost 2 years ago
Jan Z. · Reviewed almost 2 years ago
Gil Y. · Reviewed almost 2 years ago
Fabian-Florin N. · Reviewed almost 2 years ago
Arne C. · Reviewed almost 2 years ago
Astha S. · Reviewed almost 2 years ago
Shekhar K. · Reviewed almost 2 years ago
Avinash S. · Reviewed almost 2 years ago
Julia M. · Reviewed almost 2 years ago
s
Abdul H. · Reviewed almost 2 years ago
John R. · Reviewed almost 2 years ago
Uzma P. · Reviewed almost 2 years ago
PUREUM W. · Reviewed almost 2 years ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.