Mutillidae

Loading...
From the course by University of Colorado System
Proactive Computer Security
2 ratings
University of Colorado System

Proactive Computer Security

2 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Exploiting OWASP Top 20 Controls
This is the course project. The goal is for you to compromise or gain data from a test system.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science