- Cryptography
- Security Controls
- Vulnerability Assessments
- Cybersecurity
- System Configuration
- Application Security
- Vulnerability Management
- Secure Coding
- Authorization (Computing)
- Encryption
- Hardening
- Open Web Application Security Project (OWASP)
OWASP Top 10 - Welcome and Risks 1-5
Completed by Jan Lüthi
September 23, 2022
4 hours (approximately)
Jan Lüthi's account is verified. Coursera certifies their successful completion of OWASP Top 10 - Welcome and Risks 1-5
Skills you will gain

