Step 2: Testing applications for vulnerabilities Learn how to test vulnerabilities identified in an application.