"Warning - only try this at home, or with written permission"

Loading...
En provenance du cours de University of Colorado System
Proactive Computer Security
28 notes
University of Colorado System
28 notes
Cours 4 sur 4 dans Specialization Cybersecurity for Business
À partir de la leçon
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.

Rencontrer les enseignants

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Explorer notre catalogue

Rejoignez-nous gratuitement et obtenez des recommendations, des mises à jour et des offres personnalisées.