- Secure Coding
- Vulnerability Management
- Open Web Application Security Project (OWASP)
- Cybersecurity
- Cryptography
- Hardening
- Vulnerability Assessments
- Application Security
- Authorization (Computing)
- System Configuration
- Encryption
- Security Controls
OWASP Top 10 - Welcome and Risks 1-5
Completed by Jan Lüthi
September 23, 2022
4 hours (approximately)
Jan Lüthi's account is verified. Coursera certifies their successful completion of OWASP Top 10 - Welcome and Risks 1-5
Skills you will gain

