"Warning - only try this at home, or with written permission"

Loading...
From the course by University of Colorado System
Proactive Computer Security
ratings
University of Colorado System

Proactive Computer Security

ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science