- Application Security
- Data Security
- Authentications
- Cryptography
- Encryption
- Open Web Application Security Project (OWASP)
- Secure Coding
- Vulnerability Management
- Exploitation techniques
- Security Controls
- Personally Identifiable Information
- Vulnerability Assessments
Identifying Security Vulnerabilities
Completed by AKASH SANJAY GUPTA
September 25, 2020
13 hours (approximately)
AKASH SANJAY GUPTA's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

