- Personally Identifiable Information
- Encryption
- Authentications
- Vulnerability Management
- Exploitation techniques
- Data Security
- Secure Coding
- Vulnerability Assessments
- Threat Modeling
- Security Controls
- Cryptography
- Open Web Application Security Project (OWASP)
Identifying Security Vulnerabilities
Completed by Jaykumar Sharma
December 9, 2024
13 hours (approximately)
Jaykumar Sharma's account is verified. Coursera certifies their successful completion of Identifying Security Vulnerabilities
Skills you will gain

