أبرز محتويات الدورة
In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.
حول مقدم الدورة
Coursera provides access to more than 3000+ courses across a wide variety of subjects in parntership with different universities and organizations.