- Data Security
- Cryptography
- Vulnerability Management
- Personally Identifiable Information
- Open Web Application Security Project (OWASP)
- Authentications
- Threat Modeling
- Security Controls
- Security Testing
- Encryption
- Vulnerability Assessments
- Secure Coding
Identifying Security Vulnerabilities
Completed by Ruby Thomas Veppineth
May 27, 2021
13 hours (approximately)
Ruby Thomas Veppineth's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

