Metasploit

Loading...
来自 科罗拉多大学系统 的课程
Proactive Computer Security
23 评分
科罗拉多大学系统
23 评分
课程 4(共 4 门,Specialization Cybersecurity for Business
从本节课中
Common Pen Testing Tools
This module will cover some of the tools used in the penetration testing methodology. These are just common tools used to gain information, find exploits and compromise systems. There are many more tools out there, but these are the most commonly used.

与讲师见面

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science