25.9.2
This website uses cookies to ensure you get the best experience on our website.
Learn more
Got it!
Skip to main content
Sign in
PV
Puja Vijayrao Patil
88 Credentials
1 Issuer
ChatGPT Prompt Engineering Examples & Use Cases
ChatGPT Prompt Engineering Examples & Use Cases
COURSE
COMPLETION
ChatGPT Prompt Engineering Examples & Use Cases
October 26, 2023
Skillsoft
ChatGPT & Its Practical Use Cases
ChatGPT & Its Practical Use Cases
COURSE
COMPLETION
ChatGPT & Its Practical Use Cases
October 26, 2023
Skillsoft
OWASP Top 10: Securing Web Applications
OWASP Top 10: Securing Web Applications
COURSE
COMPLETION
OWASP Top 10: Securing Web Applications
April 4, 2023
Skillsoft
Agile & TDD Best Practices for APIs: Test-driven Development Strategy
Agile & TDD Best Practices for APIs: Test-driven Development Strategy
COURSE
COMPLETION
Agile & TDD Best Practices for APIs: Test-driven Development Strategy
November 14, 2022
Skillsoft
Need for Design Patterns & the Principles Guiding Design Patterns
Need for Design Patterns & the Principles Guiding Design Patterns
COURSE
COMPLETION
Need for Design Patterns & the Principles Guiding Design Patterns
November 14, 2022
Skillsoft
OWASP Top 10: A1 - Injection
OWASP Top 10: A1 - Injection
COURSE
COMPLETION
OWASP Top 10: A1 - Injection
June 27, 2022
Skillsoft
OWASP Top 10: A2 - Broken Authentication
OWASP Top 10: A2 - Broken Authentication
COURSE
COMPLETION
OWASP Top 10: A2 - Broken Authentication
June 27, 2022
Skillsoft
OWASP Top 10: A4 - XML External Entities
OWASP Top 10: A4 - XML External Entities
COURSE
COMPLETION
OWASP Top 10: A4 - XML External Entities
June 27, 2022
Skillsoft
OWASP Top 10: Web Application Security
OWASP Top 10: Web Application Security
COURSE
COMPLETION
OWASP Top 10: Web Application Security
June 27, 2022
Skillsoft
OWASP Top 10: A3 - Sensitive Data Exposure
OWASP Top 10: A3 - Sensitive Data Exposure
COURSE
COMPLETION
OWASP Top 10: A3 - Sensitive Data Exposure
June 27, 2022
Skillsoft
OWASP Top 10: A5 - Broken Access Control
OWASP Top 10: A5 - Broken Access Control
COURSE
COMPLETION
OWASP Top 10: A5 - Broken Access Control
June 27, 2022
Skillsoft
OWASP Top 10: A8 - Insecure Deserialization
OWASP Top 10: A8 - Insecure Deserialization
COURSE
COMPLETION
OWASP Top 10: A8 - Insecure Deserialization
June 27, 2022
Skillsoft
OWASP Top 10: A6 - Security Misconfiguration
OWASP Top 10: A6 - Security Misconfiguration
COURSE
COMPLETION
OWASP Top 10: A6 - Security Misconfiguration
June 27, 2022
Skillsoft
OWASP Top 10: A7 - Cross-site Scripting
OWASP Top 10: A7 - Cross-site Scripting
COURSE
COMPLETION
OWASP Top 10: A7 - Cross-site Scripting
June 27, 2022
Skillsoft
OWASP Top 10: A9 - Using Components with Known Vulnerabilities
OWASP Top 10: A9 - Using Components with Known Vulnerabilities
COURSE
COMPLETION
OWASP Top 10: A9 - Using Components with Known Vulnerabilities
June 27, 2022
Skillsoft
OWASP Top 10: A10 - Insufficient Logging & Monitoring
OWASP Top 10: A10 - Insufficient Logging & Monitoring
COURSE
COMPLETION
OWASP Top 10: A10 - Insufficient Logging & Monitoring
June 27, 2022
Skillsoft