- JSON
- Application Security
- Java Programming
- Open Web Application Security Project (OWASP)
- Dependency Analysis
- Penetration Testing
- Secure Coding
- Vulnerability Assessments
- Vulnerability Management
- Authentications
- Code Review
- Authorization (Computing)
Exploiting and Securing Vulnerabilities in Java Applications
Completed by Kumar Singh Raman (Telenor Sverige AB)
April 1, 2024
23 hours (approximately)
Kumar Singh Raman (Telenor Sverige AB)'s account is verified. Coursera certifies their successful completion of Exploiting and Securing Vulnerabilities in Java Applications
What you will learn
Practice protecting against various kinds of cross-site scripting (XSS) attacks.
Form plans to mitigate injection vulnerabilities in your web application.
Create strategies and controls to provide secure authentication.
Examine code to find and patch vulnerable components.
Skills you will gain

