Exploitation

Loading...
From the course by University of Colorado System
Proactive Computer Security
2 ratings
University of Colorado System

Proactive Computer Security

2 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science