Mutillidae

Loading...
From the course by University of Colorado System
Proactive Computer Security
28 ratings
University of Colorado System
28 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Exploiting OWASP Top 20 Controls
This is the course project. The goal is for you to compromise or gain data from a test system.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.