Mutillidae

Loading...
From the course by University of Colorado System
Proactive Computer Security
33 оценки
University of Colorado System
33 оценки
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Exploiting OWASP Top 20 Controls
This is the course project. The goal is for you to compromise or gain data from a test system.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.