Exploitation

Loading...
From the course by University of Colorado System
Proactive Computer Security
1 rating
University of Colorado System

Proactive Computer Security

1 rating
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science