Nessus

Loading...
From the course by University of Colorado System
Proactive Computer Security
2 ratings
University of Colorado System

Proactive Computer Security

2 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Common Pen Testing Tools
This module will cover some of the tools used in the penetration testing methodology. These are just common tools used to gain information, find exploits and compromise systems. There are many more tools out there, but these are the most commonly used.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science
Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online.
© 2017 Coursera Inc. All rights reserved.
Download on the App StoreGet it on Google Play