- Exploitation techniques
- Personally Identifiable Information
- Security Controls
- Vulnerability Management
- Authentications
- Threat Modeling
- Cryptography
- Encryption
- Vulnerability Assessments
- Secure Coding
- Data Security
- Open Web Application Security Project (OWASP)
Identifying Security Vulnerabilities
Completed by LEIDY TATIANA VELEZ LONDONO
August 26, 2020
13 hours (approximately)
LEIDY TATIANA VELEZ LONDONO's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

