Vulnerability Scanning

Loading...
Do curso por University of Colorado System
Proactive Computer Security
28 ratings
University of Colorado System
28 ratings
Curso 4 de 4 em Specialization Cybersecurity for Business
Na lição
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.

Conheça os instrutores

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Explore nosso catálogo

Registre-se gratuitamente e obtenha recomendações, atualizações e ofertas personalizadas.