- Vulnerability Assessments
- Application Security
- Vulnerability Management
- Secure Coding
- Exploitation techniques
- Threat Modeling
- Security Controls
- Encryption
- Data Security
- Open Web Application Security Project (OWASP)
- Personally Identifiable Information
- Cryptography
Identifying Security Vulnerabilities
Completed by PONUKUMATI SRI HARSHA
March 27, 2023
13 hours (approximately)
PONUKUMATI SRI HARSHA 's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

