- Encryption
- Data Security
- Exploitation techniques
- Secure Coding
- Open Web Application Security Project (OWASP)
- Vulnerability Management
- Personally Identifiable Information
- Vulnerability Assessments
- Threat Modeling
- Cryptography
- Application Security
- Authentications
Identifying Security Vulnerabilities
Completed by POTHURI AKHILA
March 23, 2023
13 hours (approximately)
POTHURI AKHILA's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

