Nmap

Loading...
From the course by Система университетов штата Колорадо
Proactive Computer Security
23 ratings
Система университетов штата Колорадо
23 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Common Pen Testing Tools
This module will cover some of the tools used in the penetration testing methodology. These are just common tools used to gain information, find exploits and compromise systems. There are many more tools out there, but these are the most commonly used.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science