"Warning - only try this at home, or with written permission"

Loading...
来自 科罗拉多大学系统 的课程
Proactive Computer Security
23 评分
科罗拉多大学系统
23 评分
课程 4(共 4 门,Specialization Cybersecurity for Business
从本节课中
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.

与讲师见面

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science