Congratulations!
π‘
You have successfully finished the course about building a fully functional web application using the PERN stack!
What next?
- Firstly, please, fill in the questionnaire (opens in a new tab), which will provide me a valuable feedback.
- Continue to the next section of the course, which is dedicated to cybersecurity threads in web applications. During this course, you will expose multiple vulnerabilities in the application you just implemented. You will also learn how to prevent them and how to fix them.
- Happy hacking!