Download Our Latest Course Catalog | Download Now

Frequently asked questions

  • Deploy a Threat Protection System in different topologies
  • Use aGalaxy to orchestrate TPS devices
  • Monitor traffic and detect attacks
  • Configure and apply mitigation strategies against the following DDoS attacks:
    • volumetric
    • protocol
    • reflection
    • resource
  • Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
  • Generate reports
  • Examine network traffic at the packet level  
  • Deploy a Threat Protection System in different topologies
  • Use aGalaxy to orchestrate TPS devices
  • Monitor traffic and detect attacks
  • Configure and apply mitigation strategies against the following DDoS attacks:
    • volumetric
    • protocol
    • reflection
    • resource
  • Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
  • Generate reports
  • Examine network traffic at the packet level

     
  • Deploy a Threat Protection System in different topologies
  • Use aGalaxy to orchestrate TPS devices
  • Monitor traffic and detect attacks
  • Configure and apply mitigation strategies against the following DDoS attacks:
    • volumetric
    • protocol
    • reflection
    • resource
  • Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
  • Generate reports
  • Examine network traffic at the packet level

     
  • Deploy a Threat Protection System in different topologies
  • Use aGalaxy to orchestrate TPS devices
  • Monitor traffic and detect attacks
  • Configure and apply mitigation strategies against the following DDoS attacks:
    • volumetric
    • protocol
    • reflection
    • resource
  • Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
  • Generate reports
  • Examine network traffic at the packet level

     
  • Deploy a Threat Protection System in different topologies
  • Use aGalaxy to orchestrate TPS devices
  • Monitor traffic and detect attacks
  • Configure and apply mitigation strategies against the following DDoS attacks:
    • volumetric
    • protocol
    • reflection
    • resource
  • Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
  • Generate reports
  • Examine network traffic at the packet level

     
  • Deploy a Threat Protection System in different topologies
  • Use aGalaxy to orchestrate TPS devices
  • Monitor traffic and detect attacks
  • Configure and apply mitigation strategies against the following DDoS attacks:
    • volumetric
    • protocol
    • reflection
    • resource
  • Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
  • Generate reports
  • Examine network traffic at the packet level