Mutillidae

Loading...
From the course by University of Colorado System
Proactive Computer Security
2 ratings
University of Colorado System

Proactive Computer Security

2 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Exploiting OWASP Top 20 Controls
This is the course project. The goal is for you to compromise or gain data from a test system.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science
Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online.
© 2017 Coursera Inc. All rights reserved.
Download on the App StoreGet it on Google Play