- Deploy a Threat Protection System in different topologies
- Use aGalaxy to orchestrate TPS devices
- Monitor traffic and detect attacks
- Configure and apply mitigation strategies against the following DDoS attacks:
- volumetric
- protocol
- reflection
- resource
- Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
- Generate reports
- Examine network traffic at the packet level
- Deploy a Threat Protection System in different topologies
- Use aGalaxy to orchestrate TPS devices
- Monitor traffic and detect attacks
- Configure and apply mitigation strategies against the following DDoS attacks:
- volumetric
- protocol
- reflection
- resource
- Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
- Generate reports
- Examine network traffic at the packet level
- Deploy a Threat Protection System in different topologies
- Use aGalaxy to orchestrate TPS devices
- Monitor traffic and detect attacks
- Configure and apply mitigation strategies against the following DDoS attacks:
- volumetric
- protocol
- reflection
- resource
- Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
- Generate reports
- Examine network traffic at the packet level
- Deploy a Threat Protection System in different topologies
- Use aGalaxy to orchestrate TPS devices
- Monitor traffic and detect attacks
- Configure and apply mitigation strategies against the following DDoS attacks:
- volumetric
- protocol
- reflection
- resource
- Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
- Generate reports
- Examine network traffic at the packet level
- Deploy a Threat Protection System in different topologies
- Use aGalaxy to orchestrate TPS devices
- Monitor traffic and detect attacks
- Configure and apply mitigation strategies against the following DDoS attacks:
- volumetric
- protocol
- reflection
- resource
- Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
- Generate reports
- Examine network traffic at the packet level
- Deploy a Threat Protection System in different topologies
- Use aGalaxy to orchestrate TPS devices
- Monitor traffic and detect attacks
- Configure and apply mitigation strategies against the following DDoS attacks:
- volumetric
- protocol
- reflection
- resource
- Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
- Generate reports
- Examine network traffic at the packet level