- Threat Modeling
- Vulnerability Assessments
- Cryptography
- Secure Coding
- Security Controls
- Authentications
- Data Security
- Personally Identifiable Information
- Application Security
- Open Web Application Security Project (OWASP)
- Vulnerability Management
- Exploitation techniques
Identifying Security Vulnerabilities
Completed by Saarthak Kapil
June 8, 2020
13 hours (approximately)
Saarthak Kapil's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

