- Encryption
- Secure Coding
- Personally Identifiable Information
- Threat Modeling
- Data Security
- Exploitation techniques
- Application Security
- Cryptography
- Security Controls
- Authentications
- Open Web Application Security Project (OWASP)
- Vulnerability Management
Identifying Security Vulnerabilities
Completed by Zahra Valipour Dehnoo
August 10, 2024
13 hours (approximately)
Zahra Valipour Dehnoo's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

