- Threat Modeling
- Data Security
- Security Controls
- Authentications
- Secure Coding
- Encryption
- Application Security
- Open Web Application Security Project (OWASP)
- Exploitation techniques
- Personally Identifiable Information
- Cryptography
- Vulnerability Management
Identifying Security Vulnerabilities
Completed by Ashutosh Adhuria
November 7, 2020
13 hours (approximately)
Ashutosh Adhuria's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

