Getting Started with Cloud IDS Reviews
8671 reviews
Nicolas L. · Reviewed yaklaşık 1 yıl ago
Thanks
Oluwafemi A. · Reviewed yaklaşık 1 yıl ago
Peter S. · Reviewed yaklaşık 1 yıl ago
Alec S. · Reviewed yaklaşık 1 yıl ago
Nagakumar Raju P. · Reviewed yaklaşık 1 yıl ago
so clear to me
Sergei O. · Reviewed yaklaşık 1 yıl ago
Diego M. · Reviewed yaklaşık 1 yıl ago
Pierre-Yves A. · Reviewed yaklaşık 1 yıl ago
Nicolas L. · Reviewed yaklaşık 1 yıl ago
Vasilii G. · Reviewed yaklaşık 1 yıl ago
Adir B. · Reviewed yaklaşık 1 yıl ago
Meir R. · Reviewed yaklaşık 1 yıl ago
Natalio Q. · Reviewed yaklaşık 1 yıl ago
Ben W. · Reviewed yaklaşık 1 yıl ago
Ghita Razvan L. · Reviewed yaklaşık 1 yıl ago
Diego A. · Reviewed yaklaşık 1 yıl ago
Marco Francesco P. · Reviewed yaklaşık 1 yıl ago
Jefferson D. · Reviewed yaklaşık 1 yıl ago
Good lab, would have liked to understand a bit more in detail all the individual steps (in particular some command line arguments and how/why we triggered the different levels of severity with each command). Small suggestion: In task 8, item 2 should be renamed: 2. Click the Threats tab. -> Click the IDS Threats tab. There is Threats tab inside Network security (under NGFW), but not the one we wanted. The above suggestion clarifies the desired tab
Konstantinos S. · Reviewed yaklaşık 1 yıl ago
Christian K. · Reviewed yaklaşık 1 yıl ago
Vladimir L. · Reviewed yaklaşık 1 yıl ago
Sandra B. · Reviewed yaklaşık 1 yıl ago
Julia G. · Reviewed yaklaşık 1 yıl ago
Volker H. · Reviewed yaklaşık 1 yıl ago
Simon W. · Reviewed yaklaşık 1 yıl ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.