Feedback details

(5.0)

Individual Endorsement

Vulnerability management Report writing Data extraction Ethical standards and conduct Cyber security Student engagement Cyber security management Collaboration Presentations Vulnerability
Great work. Stephen has learned the entire vulnerability management CVE software vulnerabilities analysis process.

Team feedback

Vulnerability management Report writing Data extraction Ethical standards and conduct Cyber security Student engagement Cyber security management Collaboration Presentations Vulnerability
A quick learner and great performer based on our objectives.
Custom Questions
  • Q1 - Checkbox
  • Q2 - Checkbox
  • Q3 - Checkbox