From the course by University of Colorado System
Proactive Computer Security
76 ratings
University of Colorado System
76 ratings
Course 4 of 4 in the Specialization Cybersecurity for Business
From the lesson
Exploiting OWASP Top 20 Controls
This is the course project. The goal is for you to compromise or gain data from a test system.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Department of Computer Science

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.