- Authentications
- Personally Identifiable Information
- Secure Coding
- Encryption
- Threat Modeling
- Open Web Application Security Project (OWASP)
- Application Security
- Data Security
- Exploitation techniques
- Cryptography
- Vulnerability Management
- Vulnerability Assessments
Identifying Security Vulnerabilities
Completed by Sandya Jalesh Kumar
May 27, 2020
13 hours (approximately)
Sandya Jalesh Kumar's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

