Intelligence Gathering

From the course by Система университетов штата Колорадо
Proactive Computer Security
23 ratings
Система университетов штата Колорадо
23 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Department of Computer Science