- Vulnerability Management
- Vulnerability Assessments
- Cryptography
- Threat Modeling
- Security Controls
- Personally Identifiable Information
- Secure Coding
- Application Security
- Open Web Application Security Project (OWASP)
- Authentications
- Encryption
- Exploitation techniques
Identifying Security Vulnerabilities
Completed by Ajibola Ayomipo
July 2, 2020
13 hours (approximately)
Ajibola Ayomipo's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

