- System Configuration
- Hardening
- Secure Coding
- Vulnerability Assessments
- Security Controls
- Cybersecurity
- Cryptography
- Open Web Application Security Project (OWASP)
- Vulnerability Management
- Encryption
- Application Security
- Authorization (Computing)
OWASP Top 10 - Welcome and Risks 1-5
Completed by Nithyanandh Sekar G
January 26, 2024
4 hours (approximately)
Nithyanandh Sekar G's account is verified. Coursera certifies their successful completion of OWASP Top 10 - Welcome and Risks 1-5
Skills you will gain

