- Threat Modeling
- Application Security
- Authentications
- Security Controls
- Data Security
- Vulnerability Management
- Personally Identifiable Information
- Exploitation techniques
- Encryption
- Vulnerability Assessments
- Open Web Application Security Project (OWASP)
- Cryptography
Identifying Security Vulnerabilities
Completed by Oleksii Bohusevych
June 1, 2022
13 hours (approximately)
Oleksii Bohusevych's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

