- Encryption
- Cryptography
- Personally Identifiable Information
- Data Security
- Secure Coding
- Exploitation techniques
- Threat Modeling
- Application Security
- Authentications
- Vulnerability Assessments
- Open Web Application Security Project (OWASP)
- Vulnerability Management
Identifying Security Vulnerabilities
Completed by Roy Voetman
June 14, 2023
13 hours (approximately)
Roy Voetman's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

