/
Bandwidth Requirements

Bandwidth Requirements

Introduction

If you are planning an on-premise cyber security event, then the question becomes WiFi requirements for attendees. Below you will find some data and images to help you plan your event.

Event Configuration

  • 80 cyber security participants

  • 3 docker-based challenges

  • 6 artifact based challenges

Number of Clients (Logon)

image-20250326-142627.png

Bandwidth Usage

image-20250326-142636.png

Up/Down Load

image-20250326-142645.png

Related content